Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
Advance ve...ce.exe
windows7_x64
3Advance ve...ce.exe
windows10-2004_x64
7AvastProxy.exe
windows7_x64
10AvastProxy.exe
windows10-2004_x64
10Report of ...n).pdf
windows7_x64
1Report of ...n).pdf
windows10-2004_x64
1acrord32.dll
windows7_x64
8acrord32.dll
windows10-2004_x64
8wsc.dll
windows7_x64
1wsc.dll
windows10-2004_x64
1Analysis
-
max time kernel
180s -
max time network
222s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
04/06/2022, 19:33
Static task
static1
Behavioral task
behavioral1
Sample
Advance version of the 2020 Report of the Secretary-General on Peacebuilding and Sustaining Peace.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Advance version of the 2020 Report of the Secretary-General on Peacebuilding and Sustaining Peace.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
AvastProxy.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
AvastProxy.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
Report of the Secretary-General on Peacebuilding and Sustaining Peace (advance version).pdf
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
Report of the Secretary-General on Peacebuilding and Sustaining Peace (advance version).pdf
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
acrord32.dll
Resource
win7-20220414-en
Behavioral task
behavioral8
Sample
acrord32.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral9
Sample
wsc.dll
Resource
win7-20220414-en
Behavioral task
behavioral10
Sample
wsc.dll
Resource
win10v2004-20220414-en
General
-
Target
acrord32.dll
-
Size
972KB
-
MD5
e0977e26e7b850e20fd94fefc79af65f
-
SHA1
4a3749c33d235715a84ec4964e1d69d758645a82
-
SHA256
eef56bfc68959c6eaa66ab6abcaaf8fb54aa5b5a7da0866d97a1effeae0952b8
-
SHA512
5cc59cf2fe32f325861bdc593ceb71fe7bf348c3a4726418cda1b6a61b2c2da8cf734525f67df7d497592810f38184d8040c3bd62605885f3c140fce254e27ec
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 18 3576 rundll32.exe 29 3576 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3632 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3632 AcroRd32.exe 3632 AcroRd32.exe 3632 AcroRd32.exe 3632 AcroRd32.exe 4860 AdobeARM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3792 wrote to memory of 3576 3792 rundll32.exe 79 PID 3792 wrote to memory of 3576 3792 rundll32.exe 79 PID 3792 wrote to memory of 3576 3792 rundll32.exe 79 PID 3576 wrote to memory of 3632 3576 rundll32.exe 81 PID 3576 wrote to memory of 3632 3576 rundll32.exe 81 PID 3576 wrote to memory of 3632 3576 rundll32.exe 81 PID 3632 wrote to memory of 868 3632 AcroRd32.exe 83 PID 3632 wrote to memory of 868 3632 AcroRd32.exe 83 PID 3632 wrote to memory of 868 3632 AcroRd32.exe 83 PID 3632 wrote to memory of 4980 3632 AcroRd32.exe 89 PID 3632 wrote to memory of 4980 3632 AcroRd32.exe 89 PID 3632 wrote to memory of 4980 3632 AcroRd32.exe 89 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 3632 wrote to memory of 4860 3632 AcroRd32.exe 91 PID 3632 wrote to memory of 4860 3632 AcroRd32.exe 91 PID 3632 wrote to memory of 4860 3632 AcroRd32.exe 91 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 640 868 RdrCEF.exe 90 PID 868 wrote to memory of 32 868 RdrCEF.exe 93 PID 868 wrote to memory of 32 868 RdrCEF.exe 93 PID 868 wrote to memory of 32 868 RdrCEF.exe 93 PID 868 wrote to memory of 32 868 RdrCEF.exe 93 PID 868 wrote to memory of 32 868 RdrCEF.exe 93 PID 868 wrote to memory of 32 868 RdrCEF.exe 93 PID 868 wrote to memory of 32 868 RdrCEF.exe 93 PID 868 wrote to memory of 32 868 RdrCEF.exe 93
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\acrord32.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\acrord32.dll,#12⤵
- Blocklisted process makes network request
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Report of the Secretary-General on Peacebuilding and Sustaining Peace (advance version).pdf"3⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140434⤵
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=5EF24BBD45C9BC781208E7AEE42316AE --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:640
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=C12BEAA34D823FBCD0DEA8B014E44DC1 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=C12BEAA34D823FBCD0DEA8B014E44DC1 --renderer-client-id=2 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job /prefetch:15⤵PID:32
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=45A28C9D451D728B7DC56F14FAAB0009 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=45A28C9D451D728B7DC56F14FAAB0009 --renderer-client-id=4 --mojo-platform-channel-handle=2168 --allow-no-sandbox-job /prefetch:15⤵PID:4552
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E0D4721ED6E81D2B5AB337F9CDEDE24F --mojo-platform-channel-handle=2568 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:1076
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=C3C771763109EDDA53A48B29F4F072F7 --mojo-platform-channel-handle=1940 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:1656
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=71E895D0B9510709A6B98C6E5AAD15FB --mojo-platform-channel-handle=2000 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:2024
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140434⤵PID:4980
-
-
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" /PRODUCT:Reader /VERSION:19.0 /MODE:34⤵
- Suspicious use of SetWindowsHookEx
PID:4860 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"5⤵PID:4712
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Report of the Secretary-General on Peacebuilding and Sustaining Peace (advance version).pdf
Filesize936KB
MD5bc5f2edf0f23957e0fbbcd845c744eb2
SHA1b0c167333780626ca8bd6b3b2a9fc54f20a59f34
SHA25654b491541376bda85ffb02b9bb40b9b5adba644f08b630fc1b47392625e1e60a
SHA51284f8c65a02dfd9db2286df405d711595e62ba114c8f911b30561b90818d579879542c4af09950ca8b8c2a9f82186e1cecc25933c17fef7c41e0fbf158d5ee102