Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
165s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 03:40
Behavioral task
behavioral1
Sample
0d3e62efe07ddf8faa362d95b7aa7b16.pdf
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0d3e62efe07ddf8faa362d95b7aa7b16.pdf
Resource
win10v2004-20231215-en
General
-
Target
0d3e62efe07ddf8faa362d95b7aa7b16.pdf
-
Size
84KB
-
MD5
0d3e62efe07ddf8faa362d95b7aa7b16
-
SHA1
9feb19b1003a11f4961184eed297d0fecf9db57f
-
SHA256
1dfc1d4d32a892dc761a993ebdd5616a8251d8fe5005c20735783569e2e7618b
-
SHA512
ce55346d3d5f790b5d6a624984e97dd33f4af0fa2ba7a7046e80d3f9053c56ea7bb8bd74bb4c66a01994043b8b78120fc652873313bc34b2c238b3b665f525a1
-
SSDEEP
1536:O2mmNsTOiBdvmw0pMHqqxE5GIUn5Tk8/2jkqN1abt7NJnO11WapOtQHWFYEd0gDG:crTOudvmwaMHqtGIUnlkQ2pNCt/O1qtU
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4588 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4588 AcroRd32.exe 4588 AcroRd32.exe 4588 AcroRd32.exe 4588 AcroRd32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4588 wrote to memory of 2984 4588 AcroRd32.exe 103 PID 4588 wrote to memory of 2984 4588 AcroRd32.exe 103 PID 4588 wrote to memory of 2984 4588 AcroRd32.exe 103 PID 4588 wrote to memory of 4288 4588 AcroRd32.exe 108 PID 4588 wrote to memory of 4288 4588 AcroRd32.exe 108 PID 4588 wrote to memory of 4288 4588 AcroRd32.exe 108
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\0d3e62efe07ddf8faa362d95b7aa7b16.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:2984
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:4288
-