Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 15:42
Behavioral task
behavioral1
Sample
de23314e7a5230716253aea5e2b67d03.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
de23314e7a5230716253aea5e2b67d03.pdf
Resource
win10v2004-20231215-en
General
-
Target
de23314e7a5230716253aea5e2b67d03.pdf
-
Size
45KB
-
MD5
de23314e7a5230716253aea5e2b67d03
-
SHA1
55113c32ba84fb46c79f566ac3c8f519ee94b027
-
SHA256
5793311d5fe09628e001c7e9294c6e133bab20152c3d807b8c3c24332ae33aaa
-
SHA512
1c93e47199a338eade6acdb5e8751a56e9980e1051dfb9463e0be4cc235f00b772b10bc533c78c1f333852301fcff7d800d9f1c22a5e75d5c1be2f1fad9f5707
-
SSDEEP
768:Tc8aRMKEkeMCCLzayXqlKLhw5vdicGcvEzF/bQRM12gEGmeXEI/yz:TGPeMNLzxqlKLhwVd+tIM12gHme3yz
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 5000 AcroRd32.exe 5000 AcroRd32.exe 5000 AcroRd32.exe 5000 AcroRd32.exe 5000 AcroRd32.exe 5000 AcroRd32.exe 5000 AcroRd32.exe 5000 AcroRd32.exe 5000 AcroRd32.exe 5000 AcroRd32.exe 5000 AcroRd32.exe 5000 AcroRd32.exe 5000 AcroRd32.exe 5000 AcroRd32.exe 5000 AcroRd32.exe 5000 AcroRd32.exe 5000 AcroRd32.exe 5000 AcroRd32.exe 5000 AcroRd32.exe 5000 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5000 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 5000 AcroRd32.exe 5000 AcroRd32.exe 5000 AcroRd32.exe 5000 AcroRd32.exe 5000 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5000 wrote to memory of 4972 5000 AcroRd32.exe 91 PID 5000 wrote to memory of 4972 5000 AcroRd32.exe 91 PID 5000 wrote to memory of 4972 5000 AcroRd32.exe 91 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2824 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 3208 4972 RdrCEF.exe 92 PID 4972 wrote to memory of 3208 4972 RdrCEF.exe 92 PID 4972 wrote to memory of 3208 4972 RdrCEF.exe 92 PID 4972 wrote to memory of 3208 4972 RdrCEF.exe 92 PID 4972 wrote to memory of 3208 4972 RdrCEF.exe 92 PID 4972 wrote to memory of 3208 4972 RdrCEF.exe 92 PID 4972 wrote to memory of 3208 4972 RdrCEF.exe 92 PID 4972 wrote to memory of 3208 4972 RdrCEF.exe 92 PID 4972 wrote to memory of 3208 4972 RdrCEF.exe 92 PID 4972 wrote to memory of 3208 4972 RdrCEF.exe 92 PID 4972 wrote to memory of 3208 4972 RdrCEF.exe 92 PID 4972 wrote to memory of 3208 4972 RdrCEF.exe 92 PID 4972 wrote to memory of 3208 4972 RdrCEF.exe 92 PID 4972 wrote to memory of 3208 4972 RdrCEF.exe 92 PID 4972 wrote to memory of 3208 4972 RdrCEF.exe 92 PID 4972 wrote to memory of 3208 4972 RdrCEF.exe 92 PID 4972 wrote to memory of 3208 4972 RdrCEF.exe 92 PID 4972 wrote to memory of 3208 4972 RdrCEF.exe 92 PID 4972 wrote to memory of 3208 4972 RdrCEF.exe 92 PID 4972 wrote to memory of 3208 4972 RdrCEF.exe 92
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\de23314e7a5230716253aea5e2b67d03.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=47800C9C3547EAF6377AC93916AE7157 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=47800C9C3547EAF6377AC93916AE7157 --renderer-client-id=2 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job /prefetch:13⤵PID:3208
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=FE8C99B261202087DA15AFEC08880A61 --mojo-platform-channel-handle=1732 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2824
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=482D2E61E1034650C3C39FA2D41460BB --mojo-platform-channel-handle=2300 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4584
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=25CB2BD0D0695F69104AEB7CE0D323E6 --mojo-platform-channel-handle=2416 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2100
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=C7B9433D61D62DF6947A06D12A71329F --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=C7B9433D61D62DF6947A06D12A71329F --renderer-client-id=7 --mojo-platform-channel-handle=2388 --allow-no-sandbox-job /prefetch:13⤵PID:5052
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=204E6DF7F45734EAD8146D7F51116D8F --mojo-platform-channel-handle=2364 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:5072
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD58943d8c5e467c9f100bfd0cbff382065
SHA1adaf4f46be8c098b96326e3221168bcbe54cf906
SHA2567ede57950978be7f7db21dc91ebcad19122985c2d44ebe547a6064a73405d419
SHA5123b6fbc95b4d5e8895b92357398a1f86a9ea62929485e3602a170b935e1efd2ef8aed9f5accbf8c67b490733f1dcccba17e428e5cc13217558a74819ccd09a25f
-
Filesize
56KB
MD5c26ed30e7d5ab440480838636efc41db
SHA1c66e0d00b56abebfb60d2fcc5cf85ad31a0d6591
SHA2566a3c5c4a8e57f77ecc22078fbf603ecc31fb82d429bd87b7b4b9261447092aef
SHA51296cdb78bca3e01d4513c31661987e5646e6a8ff24708918aa0d66dfa3ca5d98af4862c9f38c4f41f933c345d2d3adfb1d34d1430b33f45f916f41a9872a030df