Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
176s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 10:24
Behavioral task
behavioral1
Sample
15d5c7651010ff18b65733701ad81a34.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
15d5c7651010ff18b65733701ad81a34.pdf
Resource
win10v2004-20231215-en
General
-
Target
15d5c7651010ff18b65733701ad81a34.pdf
-
Size
33KB
-
MD5
15d5c7651010ff18b65733701ad81a34
-
SHA1
6c9ae33cf5a89ea81bec1fa7f1baed9eded09b8c
-
SHA256
f7c57b5f82c2bb530fc8ba8702b4e45503c944667a3ecc085a5b22ea4290ea35
-
SHA512
ad976ab51029d57bf5bd7839cd023b73f937a507668b805dbaba262665a94a9f360b9ffbae726d68b96fa145ac0db1f5f10cddc4ae16d6b2e1174035ae912410
-
SSDEEP
768:R6ChUpXx4Ws6jLIjj92kcQAmQ2+ojz7FxccKEiI:7hk3LI12jQLx+o/TyEiI
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1436 AcroRd32.exe 1436 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1436 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1436 AcroRd32.exe 1436 AcroRd32.exe 1436 AcroRd32.exe 1436 AcroRd32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1436 wrote to memory of 552 1436 AcroRd32.exe 105 PID 1436 wrote to memory of 552 1436 AcroRd32.exe 105 PID 1436 wrote to memory of 552 1436 AcroRd32.exe 105 PID 1436 wrote to memory of 4428 1436 AcroRd32.exe 109 PID 1436 wrote to memory of 4428 1436 AcroRd32.exe 109 PID 1436 wrote to memory of 4428 1436 AcroRd32.exe 109 PID 1436 wrote to memory of 1504 1436 AcroRd32.exe 110 PID 1436 wrote to memory of 1504 1436 AcroRd32.exe 110 PID 1436 wrote to memory of 1504 1436 AcroRd32.exe 110 PID 1436 wrote to memory of 5016 1436 AcroRd32.exe 111 PID 1436 wrote to memory of 5016 1436 AcroRd32.exe 111 PID 1436 wrote to memory of 5016 1436 AcroRd32.exe 111
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\15d5c7651010ff18b65733701ad81a34.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:552
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:4428
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:1504
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:5016
-