Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
162s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 21:46
Behavioral task
behavioral1
Sample
1d7e363a74a0c4704d0f60aeb42e535e.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1d7e363a74a0c4704d0f60aeb42e535e.pdf
Resource
win10v2004-20231215-en
General
-
Target
1d7e363a74a0c4704d0f60aeb42e535e.pdf
-
Size
87KB
-
MD5
1d7e363a74a0c4704d0f60aeb42e535e
-
SHA1
c158e463f4aff1edeab1d4f30be8acbc497d3a8d
-
SHA256
596c8926033b311dba78f87d5c1693e80e7b7b3f593bef0b1b051ce7e971fc19
-
SHA512
0fc4e2cbf4a6f1f8f8fd7d306bc66e953333d259cdefcfcaa47208aa8d6623f6cf115dcfda5bf97e7bf9b968c6903081bb002fa759b704da9aea57acbc6daa7b
-
SSDEEP
1536:r364Eeg+E9oJqx11Ade/uSFD1Ldu0FaD8L8sHcwZVWypOlWWx/PZkTGOCnJ9f25F:m4EegjUS116e/uSF1LMjaatlD/P4Gnn2
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1768 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1768 AcroRd32.exe 1768 AcroRd32.exe 1768 AcroRd32.exe 1768 AcroRd32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1768 wrote to memory of 1544 1768 AcroRd32.exe 107 PID 1768 wrote to memory of 1544 1768 AcroRd32.exe 107 PID 1768 wrote to memory of 1544 1768 AcroRd32.exe 107
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\1d7e363a74a0c4704d0f60aeb42e535e.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:1544
-