Analysis
-
max time kernel
93s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 18:36
Behavioral task
behavioral1
Sample
43fb4e9dc30cf354ae887ecdc6788ca0_NeikiAnalytics.pdf
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
43fb4e9dc30cf354ae887ecdc6788ca0_NeikiAnalytics.pdf
Resource
win10v2004-20240508-en
General
-
Target
43fb4e9dc30cf354ae887ecdc6788ca0_NeikiAnalytics.pdf
-
Size
70KB
-
MD5
43fb4e9dc30cf354ae887ecdc6788ca0
-
SHA1
a83961bc72a0c97b25c6234c90a8f6c8d73cfddc
-
SHA256
5f0d073683b83cad0bb7630e300a14fceac864d976c8a33570a95f2a6c0022a4
-
SHA512
3968ca099989922d3af9d59c83919be444478ea757d9a055a231cb72b676931ee34ac8838dd8f4c192f29bf4187c58db5982dc2701419b1429f31d15808cea94
-
SSDEEP
1536:N3Mg5GzULa0u9j3orV+SmkN09Pt121Ha65QJ3JdX00dDqadh1Wg:ug0Iubor5mkN09PtcHj2bdX0uvhv
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1492 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1492 AcroRd32.exe 1492 AcroRd32.exe 1492 AcroRd32.exe 1492 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1492 wrote to memory of 4728 1492 AcroRd32.exe 87 PID 1492 wrote to memory of 4728 1492 AcroRd32.exe 87 PID 1492 wrote to memory of 4728 1492 AcroRd32.exe 87 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 4224 4728 RdrCEF.exe 88 PID 4728 wrote to memory of 632 4728 RdrCEF.exe 89 PID 4728 wrote to memory of 632 4728 RdrCEF.exe 89 PID 4728 wrote to memory of 632 4728 RdrCEF.exe 89 PID 4728 wrote to memory of 632 4728 RdrCEF.exe 89 PID 4728 wrote to memory of 632 4728 RdrCEF.exe 89 PID 4728 wrote to memory of 632 4728 RdrCEF.exe 89 PID 4728 wrote to memory of 632 4728 RdrCEF.exe 89 PID 4728 wrote to memory of 632 4728 RdrCEF.exe 89 PID 4728 wrote to memory of 632 4728 RdrCEF.exe 89 PID 4728 wrote to memory of 632 4728 RdrCEF.exe 89 PID 4728 wrote to memory of 632 4728 RdrCEF.exe 89 PID 4728 wrote to memory of 632 4728 RdrCEF.exe 89 PID 4728 wrote to memory of 632 4728 RdrCEF.exe 89 PID 4728 wrote to memory of 632 4728 RdrCEF.exe 89 PID 4728 wrote to memory of 632 4728 RdrCEF.exe 89 PID 4728 wrote to memory of 632 4728 RdrCEF.exe 89 PID 4728 wrote to memory of 632 4728 RdrCEF.exe 89 PID 4728 wrote to memory of 632 4728 RdrCEF.exe 89 PID 4728 wrote to memory of 632 4728 RdrCEF.exe 89 PID 4728 wrote to memory of 632 4728 RdrCEF.exe 89
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\43fb4e9dc30cf354ae887ecdc6788ca0_NeikiAnalytics.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=C4B3B1E1A6CC0A7D6C6F057E4CB3C14B --mojo-platform-channel-handle=1736 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4224
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=9613612EC0C60CBFCC0C2F154D0DE674 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=9613612EC0C60CBFCC0C2F154D0DE674 --renderer-client-id=2 --mojo-platform-channel-handle=1744 --allow-no-sandbox-job /prefetch:13⤵PID:632
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=26984ABDF7F8E540825B8B7EAB8AF793 --mojo-platform-channel-handle=2300 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:5056
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=EBB1EA32AB923303D562D915C37BE06A --mojo-platform-channel-handle=1904 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1888
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=76A4C1DF4491C84B33700D85B5EEE6E5 --mojo-platform-channel-handle=2360 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4688
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=CC74428F4D03F90CC066011ADDF064CF --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=CC74428F4D03F90CC066011ADDF064CF --renderer-client-id=7 --mojo-platform-channel-handle=1896 --allow-no-sandbox-job /prefetch:13⤵PID:2948
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD52cea2ed56b21c65f2623600aebda28a7
SHA1d5a3f113815a1ffd97737fdb7ca35b28d75f5726
SHA256e64e6626cfdb93659226969b4c254c59b1befa0eb1aa5c2a39c9f39842a0de58
SHA5127654a05fde57ad61e9ff98f8cff6b4f1785b19e5904d205f819a4e28a5a48a768bb0801cad39ee8ac97fa402a8a0448f17488086130c256364d6296aca92b541
-
Filesize
64KB
MD5f0ad8bd85ee4d6e4710643a2edd67aba
SHA16b27f4dafe9ba6953054516930fcc60deb1c1932
SHA25629a0fa0a797cefb8aa1040814fe587d40f2a0759dabe9dcad70431644bc69d32
SHA5127199c19f39baf214ccdfc54d4369fb6bf7139f5756ea6716f5bc1bbd49c7795e6aff904fbdf99e052fb5544e01ad5fd67534cf6a8cf61dbc4e3624371205c333