Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-02-2024 18:05
Behavioral task
behavioral1
Sample
ac83506456e390d433ca09675d911c49.pdf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ac83506456e390d433ca09675d911c49.pdf
Resource
win10v2004-20240226-en
General
-
Target
ac83506456e390d433ca09675d911c49.pdf
-
Size
75KB
-
MD5
ac83506456e390d433ca09675d911c49
-
SHA1
960f76ae6d3a64dcbd4482ed427eac6b46bd9aff
-
SHA256
99e16016b0f2bfb1bfae3b744bab0a029de391a8bec5b7847b1b89645bf408f6
-
SHA512
7bd9c59acdf9e0ecec371011abf668d6a5326bd4a7887ed0bd6937145dd6da352984ccd259eae48ab6a29ff8f4994ad1951db131782c2a47761e5aa365064c4d
-
SSDEEP
1536:kVTl6TJ70E8eIRscfNyfZVuLV8EQ5neG09D1+IOuyRrWUpO9FWb/Dt36YKM:iTl6TJYE8eLcFyf7uLVzDoxuWm9eDd6M
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4556 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4556 AcroRd32.exe 4556 AcroRd32.exe 4556 AcroRd32.exe 4556 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4556 wrote to memory of 4044 4556 AcroRd32.exe 92 PID 4556 wrote to memory of 4044 4556 AcroRd32.exe 92 PID 4556 wrote to memory of 4044 4556 AcroRd32.exe 92 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 4372 4044 RdrCEF.exe 93 PID 4044 wrote to memory of 1752 4044 RdrCEF.exe 94 PID 4044 wrote to memory of 1752 4044 RdrCEF.exe 94 PID 4044 wrote to memory of 1752 4044 RdrCEF.exe 94 PID 4044 wrote to memory of 1752 4044 RdrCEF.exe 94 PID 4044 wrote to memory of 1752 4044 RdrCEF.exe 94 PID 4044 wrote to memory of 1752 4044 RdrCEF.exe 94 PID 4044 wrote to memory of 1752 4044 RdrCEF.exe 94 PID 4044 wrote to memory of 1752 4044 RdrCEF.exe 94 PID 4044 wrote to memory of 1752 4044 RdrCEF.exe 94 PID 4044 wrote to memory of 1752 4044 RdrCEF.exe 94 PID 4044 wrote to memory of 1752 4044 RdrCEF.exe 94 PID 4044 wrote to memory of 1752 4044 RdrCEF.exe 94 PID 4044 wrote to memory of 1752 4044 RdrCEF.exe 94 PID 4044 wrote to memory of 1752 4044 RdrCEF.exe 94 PID 4044 wrote to memory of 1752 4044 RdrCEF.exe 94 PID 4044 wrote to memory of 1752 4044 RdrCEF.exe 94 PID 4044 wrote to memory of 1752 4044 RdrCEF.exe 94 PID 4044 wrote to memory of 1752 4044 RdrCEF.exe 94 PID 4044 wrote to memory of 1752 4044 RdrCEF.exe 94 PID 4044 wrote to memory of 1752 4044 RdrCEF.exe 94
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ac83506456e390d433ca09675d911c49.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=FEF17B0A7758F86F148CFD0087EDD809 --mojo-platform-channel-handle=1760 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4372
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=629CD767087708033918BCB8601ABB7B --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=629CD767087708033918BCB8601ABB7B --renderer-client-id=2 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job /prefetch:13⤵PID:1752
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=011D72BA5F2E399A30D30435E4DC8565 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=011D72BA5F2E399A30D30435E4DC8565 --renderer-client-id=4 --mojo-platform-channel-handle=2300 --allow-no-sandbox-job /prefetch:13⤵PID:3112
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D12D3E67352636BC9C3B42CD7524E45D --mojo-platform-channel-handle=2428 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1536
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8E57B9AD38F008209EF815BA49541E3A --mojo-platform-channel-handle=2592 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1148
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=0996E959ABE5F3046071B4A55D9FC1F8 --mojo-platform-channel-handle=2472 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3580
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD568f72cea4abffcc6b02fc408ba27214a
SHA1a7fc5634e6e58972eb0c2b66c3cf1c60f759f7af
SHA256b926ea7dcf6eef88b49f1711551a31863ba23284b6213534d0f8fc78c9088d51
SHA512872d6ee968c6ff8146bec328e8121ffce28b9ae14b098916724be8c028d51c2d7affb31b3794760d6677fcab9c7a4c60b2378552fd5ecb526cbd25162ede1523
-
Filesize
64KB
MD5d9946ff05221935b49d70c497b28b99f
SHA1745a8bb10272762d50a2dc3f9bb6a3a83d7773ae
SHA2568368ac655bcf7b3204c2a0b0127761b44e34bdf26ad058ef02095c7cada7e347
SHA51203e4e5e3d13c211ee1c803d1e9edd5b2ff950413f88cd508a806385700ba2eeda2a11d97e224096c06761fe1dc253ed91ac01c579637a5ebacb4d81b37af7bc6