Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 01:35
Behavioral task
behavioral1
Sample
49c7e36e344cf8b4eab55bda4d83e1ec.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
49c7e36e344cf8b4eab55bda4d83e1ec.pdf
Resource
win10v2004-20231215-en
General
-
Target
49c7e36e344cf8b4eab55bda4d83e1ec.pdf
-
Size
85KB
-
MD5
49c7e36e344cf8b4eab55bda4d83e1ec
-
SHA1
febbc04b9fadd28bd72cf3cbc0550f27b73e6d6c
-
SHA256
628df4118ee3036c27395d04a7270c741a23c8ae13ab3f84bb565825eafb7007
-
SHA512
3baf07a83a1d14252d3faed37fe2fad6d41d15714a0cff6c593998fe817d082e542921f8f8ddddbef934bb9bcdef02dc5da99e3033fc1a05b19c994db12026ec
-
SSDEEP
1536:sHNLRir2PAXGCIJphcEU+RrMhlGSLJXaV4CLjv8F+Yky1NchkWZNwT0zW3E7TSiT:qpRiKAiUcohlGSZaV4CcFJknq0WU7GiT
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 224 AcroRd32.exe 224 AcroRd32.exe 224 AcroRd32.exe 224 AcroRd32.exe 224 AcroRd32.exe 224 AcroRd32.exe 224 AcroRd32.exe 224 AcroRd32.exe 224 AcroRd32.exe 224 AcroRd32.exe 224 AcroRd32.exe 224 AcroRd32.exe 224 AcroRd32.exe 224 AcroRd32.exe 224 AcroRd32.exe 224 AcroRd32.exe 224 AcroRd32.exe 224 AcroRd32.exe 224 AcroRd32.exe 224 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 224 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 224 AcroRd32.exe 224 AcroRd32.exe 224 AcroRd32.exe 224 AcroRd32.exe 224 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 224 wrote to memory of 4296 224 AcroRd32.exe 92 PID 224 wrote to memory of 4296 224 AcroRd32.exe 92 PID 224 wrote to memory of 4296 224 AcroRd32.exe 92 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 3424 4296 RdrCEF.exe 93 PID 4296 wrote to memory of 1280 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1280 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1280 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1280 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1280 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1280 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1280 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1280 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1280 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1280 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1280 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1280 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1280 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1280 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1280 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1280 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1280 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1280 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1280 4296 RdrCEF.exe 94 PID 4296 wrote to memory of 1280 4296 RdrCEF.exe 94
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\49c7e36e344cf8b4eab55bda4d83e1ec.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=EE25D334095E9D8EFB04C8CDD7AE27D3 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3424
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=BC44AA0DDBF78B5E5DF5EEDC0EBC63E9 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=BC44AA0DDBF78B5E5DF5EEDC0EBC63E9 --renderer-client-id=2 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job /prefetch:13⤵PID:1280
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=FB3A4B1C8C55856D295AECF9A507CF39 --mojo-platform-channel-handle=2308 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3624
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=6324434C87614BD46B80B869E4F5DF93 --mojo-platform-channel-handle=1724 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1064
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3FC21D7FE44F94C127B5078640E4595A --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4660
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=4240207909D90F2A88B584EB9CD4F093 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=4240207909D90F2A88B584EB9CD4F093 --renderer-client-id=6 --mojo-platform-channel-handle=2312 --allow-no-sandbox-job /prefetch:13⤵PID:4220
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD50672eb82719829d55d97731598258885
SHA13dc126da1e17aa7d43f35d8999e567e1afb7664c
SHA2566f7f136f788ca0188e22506b122554f965e80e7e9311dc56992963fab55a5b7b
SHA512d5880a1184b0ccdcf461f2deabc0314338f10651704d9d5cbed4b5ccf5c869d927cec111f03c9e78345e215106325c181bc0a09fe4568d452f4287c2cb1e20e4
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5