Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
76s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2023, 09:03
Behavioral task
behavioral1
Sample
MHIESP - MUSNIC_COLASI ROMMELMR - JAN 11.pdf
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
MHIESP - MUSNIC_COLASI ROMMELMR - JAN 11.pdf
Resource
win10v2004-20220901-en
General
-
Target
MHIESP - MUSNIC_COLASI ROMMELMR - JAN 11.pdf
-
Size
64KB
-
MD5
83ca1ff284ba82f236e59bd37659fae2
-
SHA1
67204ec719528afd7a7b08a30c2ed4fa275ed394
-
SHA256
66f75661046882263532238c12aeffd119b0770eb02c8be970fda8c2702c70bd
-
SHA512
858754175dd9b99d4984da83dab36b6181a8b6c33cf20e4251c382c45281ed4fdeb70c4f2c26e0c3655f1da406595e5ce9b88a5c93214684c2bcc95be306be41
-
SSDEEP
768:fpLQ4iXADs5r8j/hQnct9qPG1uo7jHSbexvW9Xwhcwemwr1+RLyKhSOILHI1gQfg:BKXA4N8j3tUPGF7jnNm+5xhS1Agz
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4812 AcroRd32.exe 4812 AcroRd32.exe 4812 AcroRd32.exe 4812 AcroRd32.exe 4812 AcroRd32.exe 4812 AcroRd32.exe 4812 AcroRd32.exe 4812 AcroRd32.exe 4812 AcroRd32.exe 4812 AcroRd32.exe 4812 AcroRd32.exe 4812 AcroRd32.exe 4812 AcroRd32.exe 4812 AcroRd32.exe 4812 AcroRd32.exe 4812 AcroRd32.exe 4812 AcroRd32.exe 4812 AcroRd32.exe 4812 AcroRd32.exe 4812 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4812 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4812 AcroRd32.exe 4812 AcroRd32.exe 4812 AcroRd32.exe 4812 AcroRd32.exe 4812 AcroRd32.exe 4812 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4812 wrote to memory of 4712 4812 AcroRd32.exe 83 PID 4812 wrote to memory of 4712 4812 AcroRd32.exe 83 PID 4812 wrote to memory of 4712 4812 AcroRd32.exe 83 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 3292 4712 RdrCEF.exe 85 PID 4712 wrote to memory of 2944 4712 RdrCEF.exe 86 PID 4712 wrote to memory of 2944 4712 RdrCEF.exe 86 PID 4712 wrote to memory of 2944 4712 RdrCEF.exe 86 PID 4712 wrote to memory of 2944 4712 RdrCEF.exe 86 PID 4712 wrote to memory of 2944 4712 RdrCEF.exe 86 PID 4712 wrote to memory of 2944 4712 RdrCEF.exe 86 PID 4712 wrote to memory of 2944 4712 RdrCEF.exe 86 PID 4712 wrote to memory of 2944 4712 RdrCEF.exe 86 PID 4712 wrote to memory of 2944 4712 RdrCEF.exe 86 PID 4712 wrote to memory of 2944 4712 RdrCEF.exe 86 PID 4712 wrote to memory of 2944 4712 RdrCEF.exe 86 PID 4712 wrote to memory of 2944 4712 RdrCEF.exe 86 PID 4712 wrote to memory of 2944 4712 RdrCEF.exe 86 PID 4712 wrote to memory of 2944 4712 RdrCEF.exe 86 PID 4712 wrote to memory of 2944 4712 RdrCEF.exe 86 PID 4712 wrote to memory of 2944 4712 RdrCEF.exe 86 PID 4712 wrote to memory of 2944 4712 RdrCEF.exe 86 PID 4712 wrote to memory of 2944 4712 RdrCEF.exe 86 PID 4712 wrote to memory of 2944 4712 RdrCEF.exe 86 PID 4712 wrote to memory of 2944 4712 RdrCEF.exe 86
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\MHIESP - MUSNIC_COLASI ROMMELMR - JAN 11.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=43EB985B81149B1E0BF9E272DA269652 --mojo-platform-channel-handle=1744 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3292
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=1EDC80021EA005390BAA2C3815FB5307 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=1EDC80021EA005390BAA2C3815FB5307 --renderer-client-id=2 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job /prefetch:13⤵PID:2944
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=68944AB497D0AB50DCE6943F27A532DB --mojo-platform-channel-handle=2188 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4800
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=3ECCC7C388ADA7608CEF01EC2D6AA940 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=3ECCC7C388ADA7608CEF01EC2D6AA940 --renderer-client-id=5 --mojo-platform-channel-handle=1976 --allow-no-sandbox-job /prefetch:13⤵PID:4288
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=BA949767186969CB397EDC43E01C8310 --mojo-platform-channel-handle=2612 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1316
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E404F8CEEF43B9FC42791F6A2271740F --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1384
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1472