Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2022, 19:00
Static task
static1
Behavioral task
behavioral1
Sample
attachment20220906-21597-6gb1up.pdf
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
attachment20220906-21597-6gb1up.pdf
Resource
win10v2004-20220901-en
General
-
Target
attachment20220906-21597-6gb1up.pdf
-
Size
155KB
-
MD5
e4f7a4881be76fe1719d6f25caa15dc9
-
SHA1
76eefb0551db23bfcf2e4cfc63b379ebc7166de0
-
SHA256
59e72551a4b46cc31a5b5ae55ca37d2a3a9393c787775c435b0c3e3dc4ba9081
-
SHA512
adde627ab01007f97d98e5eea4e7b31b770b713d3e5a92d5b6bebc678e2968614db8cab3e7b6d51b9f79aac129cbdaa51f040854159fe54959ecf7d60a5b3abd
-
SSDEEP
3072:E6xF7mCaq08GQYSEvaKS/Ij6a6ttAutfpy2361mM:5XaCjYHvm/Ijl6vAuthhDM
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1312 AcroRd32.exe 1312 AcroRd32.exe 1312 AcroRd32.exe 1312 AcroRd32.exe 1312 AcroRd32.exe 1312 AcroRd32.exe 1312 AcroRd32.exe 1312 AcroRd32.exe 1312 AcroRd32.exe 1312 AcroRd32.exe 1312 AcroRd32.exe 1312 AcroRd32.exe 1312 AcroRd32.exe 1312 AcroRd32.exe 1312 AcroRd32.exe 1312 AcroRd32.exe 1312 AcroRd32.exe 1312 AcroRd32.exe 1312 AcroRd32.exe 1312 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1312 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1312 AcroRd32.exe 1312 AcroRd32.exe 1312 AcroRd32.exe 1312 AcroRd32.exe 1312 AcroRd32.exe 1312 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1312 wrote to memory of 3740 1312 AcroRd32.exe 83 PID 1312 wrote to memory of 3740 1312 AcroRd32.exe 83 PID 1312 wrote to memory of 3740 1312 AcroRd32.exe 83 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 4812 3740 RdrCEF.exe 84 PID 3740 wrote to memory of 936 3740 RdrCEF.exe 85 PID 3740 wrote to memory of 936 3740 RdrCEF.exe 85 PID 3740 wrote to memory of 936 3740 RdrCEF.exe 85 PID 3740 wrote to memory of 936 3740 RdrCEF.exe 85 PID 3740 wrote to memory of 936 3740 RdrCEF.exe 85 PID 3740 wrote to memory of 936 3740 RdrCEF.exe 85 PID 3740 wrote to memory of 936 3740 RdrCEF.exe 85 PID 3740 wrote to memory of 936 3740 RdrCEF.exe 85 PID 3740 wrote to memory of 936 3740 RdrCEF.exe 85 PID 3740 wrote to memory of 936 3740 RdrCEF.exe 85 PID 3740 wrote to memory of 936 3740 RdrCEF.exe 85 PID 3740 wrote to memory of 936 3740 RdrCEF.exe 85 PID 3740 wrote to memory of 936 3740 RdrCEF.exe 85 PID 3740 wrote to memory of 936 3740 RdrCEF.exe 85 PID 3740 wrote to memory of 936 3740 RdrCEF.exe 85 PID 3740 wrote to memory of 936 3740 RdrCEF.exe 85 PID 3740 wrote to memory of 936 3740 RdrCEF.exe 85 PID 3740 wrote to memory of 936 3740 RdrCEF.exe 85
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\attachment20220906-21597-6gb1up.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=009C6F1A809A3C26C0AB53C29D4D2A42 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=009C6F1A809A3C26C0AB53C29D4D2A42 --renderer-client-id=2 --mojo-platform-channel-handle=1736 --allow-no-sandbox-job /prefetch:13⤵PID:4812
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=4FA474338666502C7CBC3B1AB1373234 --mojo-platform-channel-handle=1744 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:936
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=39F51F5B4AD228775FB996A2A1DB38E5 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=39F51F5B4AD228775FB996A2A1DB38E5 --renderer-client-id=4 --mojo-platform-channel-handle=2312 --allow-no-sandbox-job /prefetch:13⤵PID:4288
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=78A23164EAF2BC5BF2FF3B398EEE0227 --mojo-platform-channel-handle=2452 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2036
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=11F48AD1E2986E421842C9BD98E44948 --mojo-platform-channel-handle=2576 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1728
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=EC3E496E4AC7B319D4FF5CE6259A6532 --mojo-platform-channel-handle=2680 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4856
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2808