Analysis
-
max time kernel
139s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 04:21
Behavioral task
behavioral1
Sample
Doc.pdf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Doc.pdf
Resource
win10v2004-20240508-en
General
-
Target
Doc.pdf
-
Size
35KB
-
MD5
0b4bcef3673a28effe3cfc87250cfbda
-
SHA1
fb7d8da3825bf16927c05b73dc30fc45303a1bf8
-
SHA256
05855ac2ce9c8d23b5c68aaa4f619c24b460d3fd510bdf1f7f58946b88f6bcd5
-
SHA512
8faab763cb86535547198b91ecd828c0a4b8efc52a2aa7fb62b31331104771b68fa588584d61904f454041628a7871c1956a0bf244f368c8f87f0098315613e4
-
SSDEEP
768:ijXWvw8dPwsWBykagaCvCYHq2yYYRhImaWSYEwHs:sXwJh4VZrVypRhlTSYdHs
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 4508 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 4508 AcroRd32.exe 4508 AcroRd32.exe 4508 AcroRd32.exe 4508 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 4508 wrote to memory of 3212 4508 AcroRd32.exe RdrCEF.exe PID 4508 wrote to memory of 3212 4508 AcroRd32.exe RdrCEF.exe PID 4508 wrote to memory of 3212 4508 AcroRd32.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 5040 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 4900 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 4900 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 4900 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 4900 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 4900 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 4900 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 4900 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 4900 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 4900 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 4900 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 4900 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 4900 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 4900 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 4900 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 4900 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 4900 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 4900 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 4900 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 4900 3212 RdrCEF.exe RdrCEF.exe PID 3212 wrote to memory of 4900 3212 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Doc.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=015634126FC337017CF9678691F607AC --mojo-platform-channel-handle=1732 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:5040
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=984D0661C4919F28F13AF955CD876957 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=984D0661C4919F28F13AF955CD876957 --renderer-client-id=2 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job /prefetch:13⤵PID:4900
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D5FC77764864365FA65F53A5AF31EB53 --mojo-platform-channel-handle=2304 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1968
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A196FA0FFAB2CF6263A0C5999D8414A7 --mojo-platform-channel-handle=1796 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:628
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=4E3500B6DBB09631A037A3A34B7A61AE --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=4E3500B6DBB09631A037A3A34B7A61AE --renderer-client-id=6 --mojo-platform-channel-handle=1988 --allow-no-sandbox-job /prefetch:13⤵PID:2740
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B6C762959374CD9E4E9C0C3532296395 --mojo-platform-channel-handle=2684 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1344
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD55e597b14216e257808d09d08c8664135
SHA1423507ba08c98629fcb1100170da2e8b9546f0d8
SHA25660c678488abaa97132d617b5f752cde1e69540c27ad215f4ff061411b6c84cdd
SHA512f50b381c5199ca3c943dcc75aaefbdab35f29be7365d997c7c03596ff9ef97153e832609b403fee4f38895fe1cf117a79f485f4e7c104222da9c518edf85755a
-
Filesize
64KB
MD5c9d2fac54f209c0d5abab0a0d328632f
SHA150375a39ff44171aacd4518ebd2cfc7f258ded32
SHA256002537112313742724694b90552e7f01b1dbd1647596e837ede6ae1e5cf79857
SHA512e192c3c39014ae190a4b2241e52d763a54b4f5bc4593147e002118e5d8f5b2a3811bda30d15c9b6da15ad0503a16d55ac9ebe99de566666fccb8d9403bb8e155