Overview
overview
10Static
static
8eicar-stan...nt.pdf
windows7-x64
3eicar-stan...nt.pdf
windows10-2004-x64
3eicar-stan...rt.pdf
windows7-x64
3eicar-stan...rt.pdf
windows10-2004-x64
3eicar-stan...om.com
windows7-x64
eicar-stan...om.com
windows10-2004-x64
eicar-stan...ho.xls
windows7-x64
10eicar-stan...ho.xls
windows10-2004-x64
1eicar-stan...o.xlsx
windows7-x64
10eicar-stan...o.xlsx
windows10-2004-x64
1eicar-stan...ho.xls
windows7-x64
10eicar-stan...ho.xls
windows10-2004-x64
10eicar-stan...o.xlsm
windows7-x64
10eicar-stan...o.xlsm
windows10-2004-x64
10eicar-stan...ox.xls
windows7-x64
3eicar-stan...ox.xls
windows10-2004-x64
1eicar-stan...x.xlsm
windows7-x64
3eicar-stan...x.xlsm
windows10-2004-x64
1eicar-stan...ho.xls
windows7-x64
10eicar-stan...ho.xls
windows10-2004-x64
10eicar-stan...o.xlsm
windows7-x64
10eicar-stan...o.xlsm
windows10-2004-x64
10eicar-stan...le.xls
windows7-x64
3eicar-stan...le.xls
windows10-2004-x64
1eicar-stan...e.xlsm
windows7-x64
3eicar-stan...e.xlsm
windows10-2004-x64
1eicar-stan...ox.pps
windows7-x64
3eicar-stan...ox.pps
windows10-2004-x64
1eicar-stan...x.pptm
windows7-x64
3eicar-stan...x.pptm
windows10-2004-x64
1eicar-stan...ho.pps
windows7-x64
10eicar-stan...ho.pps
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 20:40
Behavioral task
behavioral1
Sample
eicar-standard-antivirus-test-files/eicar-adobe-acrobat-attachment.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eicar-standard-antivirus-test-files/eicar-adobe-acrobat-attachment.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
eicar-standard-antivirus-test-files/eicar-adobe-acrobat-javascript-alert.pdf
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
eicar-standard-antivirus-test-files/eicar-adobe-acrobat-javascript-alert.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
eicar-standard-antivirus-test-files/eicar-com.com
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
eicar-standard-antivirus-test-files/eicar-com.com
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
eicar-standard-antivirus-test-files/eicar-excel-dde-cmd-powershell-echo.xls
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
eicar-standard-antivirus-test-files/eicar-excel-dde-cmd-powershell-echo.xls
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
eicar-standard-antivirus-test-files/eicar-excel-dde-cmd-powershell-echo.xlsx
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
eicar-standard-antivirus-test-files/eicar-excel-dde-cmd-powershell-echo.xlsx
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-cmd-echo.xls
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-cmd-echo.xls
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-cmd-echo.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-cmd-echo.xlsm
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-msgbox.xls
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-msgbox.xls
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-msgbox.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-msgbox.xlsm
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-powershell-echo.xls
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-powershell-echo.xls
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-powershell-echo.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-powershell-echo.xlsm
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-write-file.xls
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-write-file.xls
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-write-file.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-write-file.xlsm
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
eicar-standard-antivirus-test-files/eicar-powerpoint-action-macro-msgbox.pps
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
eicar-standard-antivirus-test-files/eicar-powerpoint-action-macro-msgbox.pps
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
eicar-standard-antivirus-test-files/eicar-powerpoint-action-macro-msgbox.pptm
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
eicar-standard-antivirus-test-files/eicar-powerpoint-action-macro-msgbox.pptm
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
eicar-standard-antivirus-test-files/eicar-powerpoint-action-powershell-echo.pps
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
eicar-standard-antivirus-test-files/eicar-powerpoint-action-powershell-echo.pps
Resource
win10v2004-20241007-en
General
-
Target
eicar-standard-antivirus-test-files/eicar-adobe-acrobat-attachment.pdf
-
Size
6KB
-
MD5
13486b57cc3ad49227174f86fd4df606
-
SHA1
6e42b5372e017f45e6afbeee02bd55dd856c3f21
-
SHA256
851d1e02b134b222d0e4012c2bbb61828f1219c66ec5ed9ca291c406cb83461f
-
SHA512
2e9e9d63c274b0eee827a45ada7c2e44675756cf4d4f38eba2b158781a84eb3908039444b24e0b3d7de4511d3042ea6b2c8421dbd60da1e66a8760e3de81c71e
-
SSDEEP
48:F678q1DRROQk+FQJeG88dDpPRujpk3YGv5v2BrlQqUC+kGInKxI1OVx6zTazBQMJ:Y7dDjNsJn8ob2Mv5eATkxneV/B9Ddh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\MuiCache RdrCEF.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 760 AcroRd32.exe 760 AcroRd32.exe 760 AcroRd32.exe 760 AcroRd32.exe 760 AcroRd32.exe 760 AcroRd32.exe 760 AcroRd32.exe 760 AcroRd32.exe 760 AcroRd32.exe 760 AcroRd32.exe 760 AcroRd32.exe 760 AcroRd32.exe 760 AcroRd32.exe 760 AcroRd32.exe 760 AcroRd32.exe 760 AcroRd32.exe 760 AcroRd32.exe 760 AcroRd32.exe 760 AcroRd32.exe 760 AcroRd32.exe 4036 msedge.exe 4036 msedge.exe 916 msedge.exe 916 msedge.exe 2032 identity_helper.exe 2032 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 760 AcroRd32.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 760 AcroRd32.exe 760 AcroRd32.exe 760 AcroRd32.exe 760 AcroRd32.exe 760 AcroRd32.exe 760 AcroRd32.exe 760 AcroRd32.exe 760 AcroRd32.exe 760 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 760 wrote to memory of 4796 760 AcroRd32.exe 84 PID 760 wrote to memory of 4796 760 AcroRd32.exe 84 PID 760 wrote to memory of 4796 760 AcroRd32.exe 84 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4680 4796 RdrCEF.exe 85 PID 4796 wrote to memory of 4860 4796 RdrCEF.exe 86 PID 4796 wrote to memory of 4860 4796 RdrCEF.exe 86 PID 4796 wrote to memory of 4860 4796 RdrCEF.exe 86 PID 4796 wrote to memory of 4860 4796 RdrCEF.exe 86 PID 4796 wrote to memory of 4860 4796 RdrCEF.exe 86 PID 4796 wrote to memory of 4860 4796 RdrCEF.exe 86 PID 4796 wrote to memory of 4860 4796 RdrCEF.exe 86 PID 4796 wrote to memory of 4860 4796 RdrCEF.exe 86 PID 4796 wrote to memory of 4860 4796 RdrCEF.exe 86 PID 4796 wrote to memory of 4860 4796 RdrCEF.exe 86 PID 4796 wrote to memory of 4860 4796 RdrCEF.exe 86 PID 4796 wrote to memory of 4860 4796 RdrCEF.exe 86 PID 4796 wrote to memory of 4860 4796 RdrCEF.exe 86 PID 4796 wrote to memory of 4860 4796 RdrCEF.exe 86 PID 4796 wrote to memory of 4860 4796 RdrCEF.exe 86 PID 4796 wrote to memory of 4860 4796 RdrCEF.exe 86 PID 4796 wrote to memory of 4860 4796 RdrCEF.exe 86 PID 4796 wrote to memory of 4860 4796 RdrCEF.exe 86 PID 4796 wrote to memory of 4860 4796 RdrCEF.exe 86 PID 4796 wrote to memory of 4860 4796 RdrCEF.exe 86
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\eicar-standard-antivirus-test-files\eicar-adobe-acrobat-attachment.pdf"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=68F167890406A0625C6BC02928E5355C --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:4680
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=5E8008EEA81171CFF5F63CD8056F988B --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=5E8008EEA81171CFF5F63CD8056F988B --renderer-client-id=2 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job /prefetch:13⤵
- System Location Discovery: System Language Discovery
PID:4860
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=040550FDF6BE01328D8FCEF926F98262 --mojo-platform-channel-handle=2300 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:3992
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=81DEE7F8D08B9A3769C6408D5DFDA86A --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=81DEE7F8D08B9A3769C6408D5DFDA86A --renderer-client-id=5 --mojo-platform-channel-handle=2332 --allow-no-sandbox-job /prefetch:13⤵
- System Location Discovery: System Language Discovery
PID:368
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E2ABAB4E56EFEDE8F3E0CFF08FEF6102 --mojo-platform-channel-handle=2692 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:4696
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=6A951FD77EF08482C81F3C62DF5E19A6 --mojo-platform-channel-handle=2864 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:4960
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.adobe.com/go/epdfrhprdr1_12_0_0?DTProd=Reader&DTServLvl=SignedOut2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:916 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbc2a046f8,0x7ffbc2a04708,0x7ffbc2a047183⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,14107112541206168527,5484498383056516699,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:23⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,14107112541206168527,5484498383056516699,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2396 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,14107112541206168527,5484498383056516699,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:83⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14107112541206168527,5484498383056516699,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:13⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14107112541206168527,5484498383056516699,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:13⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14107112541206168527,5484498383056516699,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:13⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,14107112541206168527,5484498383056516699,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:83⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,14107112541206168527,5484498383056516699,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14107112541206168527,5484498383056516699,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:13⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14107112541206168527,5484498383056516699,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:13⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14107112541206168527,5484498383056516699,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:13⤵PID:5212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14107112541206168527,5484498383056516699,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:13⤵PID:5220
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1592
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD548164cede83e4e4628633dd4ffd62f1d
SHA194d55b3d14df1f46d272b36f9019074e58554876
SHA2564a1298644c8d5b1fdc6cc2757a59a490c9fc7dca4330afd6b38c18c5ae22a8b2
SHA5121ef7313411515bbf42266ba6d40a309fc8bba7061066f0a128daba6d723322aff28b9b3c717d9b4d19cfb2fd5e825091e3544b2d54f12c70e645410e182327eb
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_FB287BEB63DB9E8D59A799779773B97C
Filesize471B
MD5203d10bbf0b3c21a8f092d4f6d4b63a8
SHA16ba4705448e5eec8efc763a65c05c6c8c1fa307e
SHA256cc206020602404c921ae95d2b1221bc33827d338d8702a0ee6ea357523dea6df
SHA512fc5a201ff13310661288dc8e6afb08275a8cb48e3bc1f24e7095859b6989205e06a332c57cfb44a55fbb023f48ece4083b2a067b1f9ab9e4a35f01b96e00bc13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize471B
MD5fb09a91cdb648e89f1d71de0fc599cea
SHA1de6856f3a9ace425277198f49149dd1e5b309bc9
SHA256501cdbddac9768fded5603e6eab13ebca05cae910645ec416857066f0e36e642
SHA512d4872954958f2b294df247fb021d8873a96c8c277a841a7ff5dcd232268a63e32c4bb939b0459b391b62266c72d73de3a816b473728dac8e64060e5a05733bb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_FB287BEB63DB9E8D59A799779773B97C
Filesize420B
MD502580cadd29a42b48c879e727f93b301
SHA158f460d62ea2afa46492882e4cf7838c0af22121
SHA2568918deaf21033dd6d13c4b629bd70a0fb6f699178752d506b62a23990b0a3e0f
SHA512c2de1798f989b5c566d7d77b960d4e9d106af686e02fa355f0245f1f1f2c0176ac4e048b1d772f2df579b36f90b77f4dcaf4d211120ddbe354e940dc523eaee3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize400B
MD5231aa87c868c494946cdec5e4b96167e
SHA116ca23d128d4ef838d74fb531b020dc4f8e54c14
SHA256b5182e4efec49c8ade4adfb4745a2b9abb019ce45872e7a11f69ef8ea7be03a6
SHA5129eed63f94233f6981eb48d2e3896c698ebb6bc1097984e3dbed3717ba1804e6de9affd62a2b8c3e995e605dfe35379a29c997ed4d0e5ad733335925ebcfbb4e2
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize912B
MD5812db13d5eb048bf8063449665fbef1f
SHA153cf43a8f013f21d095c29d9b5b65eeef12d75e2
SHA25688694cd9feb6da3d0bafa8789dc540b153c505edd12ee6f3779099dfcea81ccb
SHA512fd70ea604a5e88121da32069d274d85f720b1f447ffba0dcd80d29a3943d57935776ccfce20762c05d99665f1033adb410e6aaa19826b494c5fc2f522348cb8e
-
Filesize
644B
MD52b900063d8ff8bf92f089bddd43f6a6b
SHA11b7e80aa67a5df442fa6f4805d64348cde086882
SHA256fdbc62e22fa6cc815af933f5306ca50da90427b793fd9254d473e8133081230c
SHA512c8799179e37de1defd4325c817e36e1dbdedf67f63faa130254a7f3bdb08a056fb727afc9a8b7e397e76de83974ac6be638c5c1357d6d447d4de959b49478dfc
-
Filesize
5KB
MD5245acad16d7b5514dd1c314c6c0d6679
SHA1831d6efdb33bb098893d40437b12d792491e170d
SHA256a1123949f576aba941c7622aac06477a46e6eca0675a978dafdcaafb1c992751
SHA5127431bbfca501d8f7f1119e834863385f7eca31f38218fd4adfcf39bae89225825d3dc7ad6f46e29e036c4f127c9ce037f865ce9733ecda32cc58c15ca5bc7d0b
-
Filesize
6KB
MD5e3aa435e4a069edfaca5dbd0581c2ef4
SHA1490ac57b15b624f8f52e2d1327dd69a37515dd9c
SHA256b1a6650822de3d5869dd50efaa12d28ed9bc4e9b6346da810620dd1b477f4663
SHA51229c6aabdef44571b03fc9bd2a46acbbb02e11ea9287d22dbc7d02c0676ae7a7eeaef9514ff3bfd1e17a672e75c19b5ecf3161f5841a1d30bf2ca14327ac5199e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f78463c3e1a5092a7b00f515b3ef7565
SHA1d76fafe228f9a964b259f3a8a770dd67a1b94866
SHA25632fafa6bddada385d524561edf14a95081479833a23eb1bd779e44c7de7acab4
SHA512b70cd47c669d31f5eef9e7f27a94126873f105f19c65b2df16d64994034064a4d3a6c29cccffbc295d96382b8275dc50f895408a0095269c810c1093b1388b55