Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 12:51
Behavioral task
behavioral1
Sample
8f8a3a105ff95158348db9e80974cfa8.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8f8a3a105ff95158348db9e80974cfa8.pdf
Resource
win10v2004-20231215-en
General
-
Target
8f8a3a105ff95158348db9e80974cfa8.pdf
-
Size
71KB
-
MD5
8f8a3a105ff95158348db9e80974cfa8
-
SHA1
46bd1591fea2e45a81f109ecc3215b8ec0fac279
-
SHA256
34ed94e5b3733899e8c2c59ce3ff9c5b7e1ab6005d54e39a83de57f92c049fbc
-
SHA512
58afc49e0cc090fda2d2950785d2e44e43158dc92d278d47de1ab8eae6d1f77dce0aae89925c48445f720056ed9c55a2dc6a775d95c8e20980ae6696fb2e80fd
-
SSDEEP
1536:Qhgl40IF4iEC8qVE67C+mUiAagdEZ7WTKkb+mbyAWLdVYypO/mH:H40IaCVp7CRIagCZ7GlcdVYIOO
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4856 AcroRd32.exe 4856 AcroRd32.exe 4856 AcroRd32.exe 4856 AcroRd32.exe 4856 AcroRd32.exe 4856 AcroRd32.exe 4856 AcroRd32.exe 4856 AcroRd32.exe 4856 AcroRd32.exe 4856 AcroRd32.exe 4856 AcroRd32.exe 4856 AcroRd32.exe 4856 AcroRd32.exe 4856 AcroRd32.exe 4856 AcroRd32.exe 4856 AcroRd32.exe 4856 AcroRd32.exe 4856 AcroRd32.exe 4856 AcroRd32.exe 4856 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4856 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4856 AcroRd32.exe 4856 AcroRd32.exe 4856 AcroRd32.exe 4856 AcroRd32.exe 4856 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4856 wrote to memory of 4688 4856 AcroRd32.exe 95 PID 4856 wrote to memory of 4688 4856 AcroRd32.exe 95 PID 4856 wrote to memory of 4688 4856 AcroRd32.exe 95 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4008 4688 RdrCEF.exe 97 PID 4688 wrote to memory of 4536 4688 RdrCEF.exe 96 PID 4688 wrote to memory of 4536 4688 RdrCEF.exe 96 PID 4688 wrote to memory of 4536 4688 RdrCEF.exe 96 PID 4688 wrote to memory of 4536 4688 RdrCEF.exe 96 PID 4688 wrote to memory of 4536 4688 RdrCEF.exe 96 PID 4688 wrote to memory of 4536 4688 RdrCEF.exe 96 PID 4688 wrote to memory of 4536 4688 RdrCEF.exe 96 PID 4688 wrote to memory of 4536 4688 RdrCEF.exe 96 PID 4688 wrote to memory of 4536 4688 RdrCEF.exe 96 PID 4688 wrote to memory of 4536 4688 RdrCEF.exe 96 PID 4688 wrote to memory of 4536 4688 RdrCEF.exe 96 PID 4688 wrote to memory of 4536 4688 RdrCEF.exe 96 PID 4688 wrote to memory of 4536 4688 RdrCEF.exe 96 PID 4688 wrote to memory of 4536 4688 RdrCEF.exe 96 PID 4688 wrote to memory of 4536 4688 RdrCEF.exe 96 PID 4688 wrote to memory of 4536 4688 RdrCEF.exe 96 PID 4688 wrote to memory of 4536 4688 RdrCEF.exe 96 PID 4688 wrote to memory of 4536 4688 RdrCEF.exe 96 PID 4688 wrote to memory of 4536 4688 RdrCEF.exe 96 PID 4688 wrote to memory of 4536 4688 RdrCEF.exe 96
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\8f8a3a105ff95158348db9e80974cfa8.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=39335BED13109F1122A546A8E07D5DF8 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=39335BED13109F1122A546A8E07D5DF8 --renderer-client-id=2 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job /prefetch:13⤵PID:4536
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D7AEAE36182EFFB9F55242B715B56E1C --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4008
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=9D5E3839AEBD188CD4C75655E833121A --mojo-platform-channel-handle=2296 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1608
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F8E281680EBBCE704614A30A3AB491B1 --mojo-platform-channel-handle=1856 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2980
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=724EBC2959075B9CD483C1C9FC3ED3E4 --mojo-platform-channel-handle=2308 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1100
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=12B71A0C9618AADD24A37598FDC73EF5 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=12B71A0C9618AADD24A37598FDC73EF5 --renderer-client-id=8 --mojo-platform-channel-handle=1924 --allow-no-sandbox-job /prefetch:13⤵PID:2420
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD529a0bef5e0a8157f57df57570f3ccab4
SHA1a707d702a9f15c56db78c3fbe390857c3fb86135
SHA256128bcc72361c457a2c429e96873141c8a1a9d35b2ef46fd308a1bf23dcc3e575
SHA5122f5a4b3b2b0800fa0c328021b9f4b053a8acc0c868bc33e56dd4c3416eae56c5eb3ab486ebd923c6f7a2fa5627707aef84316f80f87c8e181c7ff0576b2a0281
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5