Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 04:59
Behavioral task
behavioral1
Sample
85fe5fe761a8d0a734e56128b5148528.pdf
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
85fe5fe761a8d0a734e56128b5148528.pdf
Resource
win10v2004-20231215-en
General
-
Target
85fe5fe761a8d0a734e56128b5148528.pdf
-
Size
20KB
-
MD5
85fe5fe761a8d0a734e56128b5148528
-
SHA1
4b63f0c99f6fe94d5adec7666c886d82daed5b2a
-
SHA256
96ad0cd245f2633b2ba138039a11eac3a3d33750eabc113a9dc5487a6fb87267
-
SHA512
b0ebb853f9992f4a2744c558b786f99f81862d7a0de6e88de537105379e648794eb29a6e87f95254039c9f322425134f705fb3089f67fb62ffbc617aa6595e72
-
SSDEEP
384:4Nzdnzv+7GWB3evCgF/buoIKXPh3Tj4gmZms1PW+sN2VJgL9GtZC:4pdnj1/bnfhjMr3WbNsJg4m
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4328 AcroRd32.exe 4328 AcroRd32.exe 4328 AcroRd32.exe 4328 AcroRd32.exe 4328 AcroRd32.exe 4328 AcroRd32.exe 4328 AcroRd32.exe 4328 AcroRd32.exe 4328 AcroRd32.exe 4328 AcroRd32.exe 4328 AcroRd32.exe 4328 AcroRd32.exe 4328 AcroRd32.exe 4328 AcroRd32.exe 4328 AcroRd32.exe 4328 AcroRd32.exe 4328 AcroRd32.exe 4328 AcroRd32.exe 4328 AcroRd32.exe 4328 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4328 AcroRd32.exe 4328 AcroRd32.exe 4328 AcroRd32.exe 4328 AcroRd32.exe 4328 AcroRd32.exe 4328 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4328 wrote to memory of 2212 4328 AcroRd32.exe 87 PID 4328 wrote to memory of 2212 4328 AcroRd32.exe 87 PID 4328 wrote to memory of 2212 4328 AcroRd32.exe 87 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 3376 2212 RdrCEF.exe 91 PID 2212 wrote to memory of 2504 2212 RdrCEF.exe 90 PID 2212 wrote to memory of 2504 2212 RdrCEF.exe 90 PID 2212 wrote to memory of 2504 2212 RdrCEF.exe 90 PID 2212 wrote to memory of 2504 2212 RdrCEF.exe 90 PID 2212 wrote to memory of 2504 2212 RdrCEF.exe 90 PID 2212 wrote to memory of 2504 2212 RdrCEF.exe 90 PID 2212 wrote to memory of 2504 2212 RdrCEF.exe 90 PID 2212 wrote to memory of 2504 2212 RdrCEF.exe 90 PID 2212 wrote to memory of 2504 2212 RdrCEF.exe 90 PID 2212 wrote to memory of 2504 2212 RdrCEF.exe 90 PID 2212 wrote to memory of 2504 2212 RdrCEF.exe 90 PID 2212 wrote to memory of 2504 2212 RdrCEF.exe 90 PID 2212 wrote to memory of 2504 2212 RdrCEF.exe 90 PID 2212 wrote to memory of 2504 2212 RdrCEF.exe 90 PID 2212 wrote to memory of 2504 2212 RdrCEF.exe 90 PID 2212 wrote to memory of 2504 2212 RdrCEF.exe 90 PID 2212 wrote to memory of 2504 2212 RdrCEF.exe 90 PID 2212 wrote to memory of 2504 2212 RdrCEF.exe 90 PID 2212 wrote to memory of 2504 2212 RdrCEF.exe 90 PID 2212 wrote to memory of 2504 2212 RdrCEF.exe 90
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\85fe5fe761a8d0a734e56128b5148528.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=4B7C22C7E626AEFB02A0050294CA73CE --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=4B7C22C7E626AEFB02A0050294CA73CE --renderer-client-id=2 --mojo-platform-channel-handle=1724 --allow-no-sandbox-job /prefetch:13⤵PID:2504
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=0B7081159E8D977EB089BB29B98BC3D5 --mojo-platform-channel-handle=1732 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3376
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=953F53D4927FBF5730EFEC80534CFCA3 --mojo-platform-channel-handle=2280 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1140
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=37443F7937B3F4692C1FF5F00D03D49B --mojo-platform-channel-handle=1880 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3016
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F2FCE5B1CE723610F0C96CCF5BE6CE88 --mojo-platform-channel-handle=2316 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:5064
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD55fbd67f1cf187970459fb94bc0191829
SHA130e909919a272606dfbbb2c49e6989c3f7f74312
SHA256ff1210d449244526ca2d3dbe35093388b223081d25e5da3762cfeea4a6f6277d
SHA512c988800dd2d38f83b79cc6c0e04c565af84ca05a4b184e770fa0baed94e4db405ac64caaf4e4c065b2e77887ac722ceaac664cc0ff4a51f99cec14b841c9694a
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
11KB
MD5b38cfa59039e5585b2f7d01c6aa8ca89
SHA1c65876693a8089b1b1cdc349b5ff7c0267cc3c8d
SHA256d47ef2893949e31525465b86c4abf718fe86f9afef35a280d4f750cc710bb130
SHA512c810c8914ba9e08d18b7eafad5c087987f55c7c3712a773b182bccd50529bc4d64c7c1aacad63043022d98d4160b0bb1cf88d826959b52eaa01e12cde47614b7