Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 21:36
Behavioral task
behavioral1
Sample
1d3857b4cb8100b824177833ac31602c.pdf
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
1d3857b4cb8100b824177833ac31602c.pdf
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
1d3857b4cb8100b824177833ac31602c.pdf
-
Size
34KB
-
MD5
1d3857b4cb8100b824177833ac31602c
-
SHA1
192bb1d0cb7bc153b1a9b89f93da01a899ee3099
-
SHA256
530aca1a6a55e59943b38b5c5a19d06afe2a02bc4f3bfe85494f9e392dbd295e
-
SHA512
e280706a07946feead12d5b28f8f6507f7303220972d6762088713a7cb78a40d9bbd07dfcb2f12c255c97ef493ea0ba6984f151c3df151a9832b041e1ec76036
-
SSDEEP
768:7/isaysZF0jyhR5irXsXgqDZFwh0Waxc/bj:7uIj+irwHwh1/bj
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2884 AcroRd32.exe 2884 AcroRd32.exe 2884 AcroRd32.exe 2884 AcroRd32.exe 2884 AcroRd32.exe 2884 AcroRd32.exe 2884 AcroRd32.exe 2884 AcroRd32.exe 2884 AcroRd32.exe 2884 AcroRd32.exe 2884 AcroRd32.exe 2884 AcroRd32.exe 2884 AcroRd32.exe 2884 AcroRd32.exe 2884 AcroRd32.exe 2884 AcroRd32.exe 2884 AcroRd32.exe 2884 AcroRd32.exe 2884 AcroRd32.exe 2884 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2884 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2884 AcroRd32.exe 2884 AcroRd32.exe 2884 AcroRd32.exe 2884 AcroRd32.exe 2884 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2748 2884 AcroRd32.exe 94 PID 2884 wrote to memory of 2748 2884 AcroRd32.exe 94 PID 2884 wrote to memory of 2748 2884 AcroRd32.exe 94 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 4340 2748 RdrCEF.exe 96 PID 2748 wrote to memory of 1148 2748 RdrCEF.exe 95 PID 2748 wrote to memory of 1148 2748 RdrCEF.exe 95 PID 2748 wrote to memory of 1148 2748 RdrCEF.exe 95 PID 2748 wrote to memory of 1148 2748 RdrCEF.exe 95 PID 2748 wrote to memory of 1148 2748 RdrCEF.exe 95 PID 2748 wrote to memory of 1148 2748 RdrCEF.exe 95 PID 2748 wrote to memory of 1148 2748 RdrCEF.exe 95 PID 2748 wrote to memory of 1148 2748 RdrCEF.exe 95 PID 2748 wrote to memory of 1148 2748 RdrCEF.exe 95 PID 2748 wrote to memory of 1148 2748 RdrCEF.exe 95 PID 2748 wrote to memory of 1148 2748 RdrCEF.exe 95 PID 2748 wrote to memory of 1148 2748 RdrCEF.exe 95 PID 2748 wrote to memory of 1148 2748 RdrCEF.exe 95 PID 2748 wrote to memory of 1148 2748 RdrCEF.exe 95 PID 2748 wrote to memory of 1148 2748 RdrCEF.exe 95 PID 2748 wrote to memory of 1148 2748 RdrCEF.exe 95 PID 2748 wrote to memory of 1148 2748 RdrCEF.exe 95 PID 2748 wrote to memory of 1148 2748 RdrCEF.exe 95 PID 2748 wrote to memory of 1148 2748 RdrCEF.exe 95 PID 2748 wrote to memory of 1148 2748 RdrCEF.exe 95
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\1d3857b4cb8100b824177833ac31602c.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=EBF6F23A442E3E7E4E15A86FBC1D9826 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=EBF6F23A442E3E7E4E15A86FBC1D9826 --renderer-client-id=2 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job /prefetch:13⤵PID:1148
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=FA3A65A78E33D50E123CE4921795A749 --mojo-platform-channel-handle=1728 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4340
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3D158D3465F59F198EF4C955C796AA3F --mojo-platform-channel-handle=2276 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3064
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=5FFCE2006657B3BBF94E21FD09F20F0F --mojo-platform-channel-handle=1920 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4280
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=19D6D2137E79DC617C0B50F5BA555A9A --mojo-platform-channel-handle=2404 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4972
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=1EB691198A040F163D2707FDA5ABA227 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=1EB691198A040F163D2707FDA5ABA227 --renderer-client-id=8 --mojo-platform-channel-handle=1940 --allow-no-sandbox-job /prefetch:13⤵PID:1528
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2736