Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 02:58
Behavioral task
behavioral1
Sample
d72f922377641fbdd1636edd8cf40740_NEIKI.pdf
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d72f922377641fbdd1636edd8cf40740_NEIKI.pdf
Resource
win10v2004-20240508-en
General
-
Target
d72f922377641fbdd1636edd8cf40740_NEIKI.pdf
-
Size
6.0MB
-
MD5
d72f922377641fbdd1636edd8cf40740
-
SHA1
506726965b0f6cb663bf0cae6d761804440f1464
-
SHA256
ed5be7cba7761e32c212598bec1ec73fb72fdfc5242da4fe3e0fb0997b57dadd
-
SHA512
35ad19c599e4d6b941b7c0ad3fbe6a6e4bf93748d8e163040d503b24debf006df502e7713f47f6db32a9daedc84da894050c828847b7108f73ad97211152d8d4
-
SSDEEP
98304:jtRfRY0GrzZR5cYVL3DDs1bwiGXyVy537vHuVmZJilPUszwZ:6/vBgbHGXy637OVmZSoZ
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4464 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4464 AcroRd32.exe 4464 AcroRd32.exe 4464 AcroRd32.exe 4464 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4464 wrote to memory of 4844 4464 AcroRd32.exe 82 PID 4464 wrote to memory of 4844 4464 AcroRd32.exe 82 PID 4464 wrote to memory of 4844 4464 AcroRd32.exe 82 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 916 4844 RdrCEF.exe 83 PID 4844 wrote to memory of 4944 4844 RdrCEF.exe 84 PID 4844 wrote to memory of 4944 4844 RdrCEF.exe 84 PID 4844 wrote to memory of 4944 4844 RdrCEF.exe 84 PID 4844 wrote to memory of 4944 4844 RdrCEF.exe 84 PID 4844 wrote to memory of 4944 4844 RdrCEF.exe 84 PID 4844 wrote to memory of 4944 4844 RdrCEF.exe 84 PID 4844 wrote to memory of 4944 4844 RdrCEF.exe 84 PID 4844 wrote to memory of 4944 4844 RdrCEF.exe 84 PID 4844 wrote to memory of 4944 4844 RdrCEF.exe 84 PID 4844 wrote to memory of 4944 4844 RdrCEF.exe 84 PID 4844 wrote to memory of 4944 4844 RdrCEF.exe 84 PID 4844 wrote to memory of 4944 4844 RdrCEF.exe 84 PID 4844 wrote to memory of 4944 4844 RdrCEF.exe 84 PID 4844 wrote to memory of 4944 4844 RdrCEF.exe 84 PID 4844 wrote to memory of 4944 4844 RdrCEF.exe 84 PID 4844 wrote to memory of 4944 4844 RdrCEF.exe 84 PID 4844 wrote to memory of 4944 4844 RdrCEF.exe 84 PID 4844 wrote to memory of 4944 4844 RdrCEF.exe 84 PID 4844 wrote to memory of 4944 4844 RdrCEF.exe 84 PID 4844 wrote to memory of 4944 4844 RdrCEF.exe 84
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\d72f922377641fbdd1636edd8cf40740_NEIKI.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=93FC26D465E035533953478C7E4F2C82 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:916
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=C81F3746F7021E8DEF7A240198757B69 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=C81F3746F7021E8DEF7A240198757B69 --renderer-client-id=2 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job /prefetch:13⤵PID:4944
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=4DF580268EE400383F32E77E10AD11AC --mojo-platform-channel-handle=2288 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2820
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3E0E760A6AB0D2AE6061D7AC5CB795F0 --mojo-platform-channel-handle=2432 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3984
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=C41398FC33BDCCD057866321471EC282 --mojo-platform-channel-handle=1728 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3192
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=C38087EE18AB410DDE5F1A75C2E7B444 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=C38087EE18AB410DDE5F1A75C2E7B444 --renderer-client-id=7 --mojo-platform-channel-handle=2364 --allow-no-sandbox-job /prefetch:13⤵PID:3304
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD50fa72dbb1c2377df5791e603310b6a5c
SHA1442a135a95102b11f93339de235414f7c98e85cb
SHA2565a9d71668285997dd28b3d58e1ebb69adbf176825b22c010177a47046fe4a863
SHA512626b06290af74642b8a1b3fc056fd3fd09de0a0af231704499cfd4d73f0736d48d0b47f26ade7a61eb30cfb4b4bd300092e766130448d30eb32b5f3ed7ea706c
-
Filesize
64KB
MD54f3d941d9b0ca478736ff23039067043
SHA17a970183de8370df97eb95a94356ebc91b28e423
SHA256bf708fdbdfe47c39be4ef616052c11ad5268bc444bc5180ac795c2fea32d6345
SHA51234697d746af82f6ae3e661eeaee7636f7ab02013a4804bdba41f2f6cee3fc12fcd13b1de522ce97da0095de054d112ce80c43dde4dba217255633a62b738bb2f