Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
163s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2023, 11:14
Behavioral task
behavioral1
Sample
11aed99f99e2e18f6eeab111073c77d1.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
11aed99f99e2e18f6eeab111073c77d1.pdf
Resource
win10v2004-20231215-en
General
-
Target
11aed99f99e2e18f6eeab111073c77d1.pdf
-
Size
91KB
-
MD5
11aed99f99e2e18f6eeab111073c77d1
-
SHA1
8bc118836a1bca6d31be7278261ebebfba964fbc
-
SHA256
eec4363a9d04d10c10a90c92952712ae9232354b601451ee77211cd26aade445
-
SHA512
a72b65cc9d3718d3a8651b80342dc7bc4106f57311c46b94c7cf9562290ead1f9ef2f05b8f6077a41521fa88446dad6a1a8bd380880be768cab248243cab7f46
-
SSDEEP
1536:k3d03ARAJ4KYrnsbOYiv4t7dSASb11j6bF7PLHKvSjCBWOpOwrKWlWsLl/PxPzH:B3ARAO9rsbO9v434P6b9HKvx+wrPLdJz
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4672 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4672 AcroRd32.exe 4672 AcroRd32.exe 4672 AcroRd32.exe 4672 AcroRd32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4672 wrote to memory of 1012 4672 AcroRd32.exe 95 PID 4672 wrote to memory of 1012 4672 AcroRd32.exe 95 PID 4672 wrote to memory of 1012 4672 AcroRd32.exe 95
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\11aed99f99e2e18f6eeab111073c77d1.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:1012
-