Analysis
-
max time kernel
91s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
05-02-2024 07:25
Behavioral task
behavioral1
Sample
invoice-1580727057.pdf
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
invoice-1580727057.pdf
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
invoice-1580727057.pdf
-
Size
50KB
-
MD5
feac523f300947e52e2e5ca44221d9d9
-
SHA1
ac6dc611f760b48779bded9a5e6816c91375fd2a
-
SHA256
a2e7f3210ef4f7fb06606399dd09b873715abc2ce4a45900bd2434f37d55c559
-
SHA512
53cd297d814b2e4b99926502c49a95128c1e4ed564476c8c67f19bb0d5423889a4be60384975a2d35545fdfaf21785dc2d0c9e7828a5dfac4ed988eab11ff332
-
SSDEEP
384:86SDvX7hWFcTPm/K7Uzzzzzzzzzzzzzzzzz3SkYTZvL:86ST7hWGTO/KQ8ZvL
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
AcroRd32.exepid process 3768 AcroRd32.exe 3768 AcroRd32.exe 3768 AcroRd32.exe 3768 AcroRd32.exe 3768 AcroRd32.exe 3768 AcroRd32.exe