Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 14:14
Behavioral task
behavioral1
Sample
1b202b883ce51f1f5e44cade2b11468a.pdf
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1b202b883ce51f1f5e44cade2b11468a.pdf
Resource
win10v2004-20231215-en
General
-
Target
1b202b883ce51f1f5e44cade2b11468a.pdf
-
Size
84KB
-
MD5
1b202b883ce51f1f5e44cade2b11468a
-
SHA1
d07e3bd1d2626b8e3d2b4dde6baef6ada3e7e38e
-
SHA256
1087b5d0a263984d0c775670b20e89e1b4e0b0c0cb020eb67ed6625165746185
-
SHA512
7924319ec9cc29b2a04ad4cbbd867f140b0ff43db592b5087dee42b51181b195b765c204f541032ad1686e5026f8312e99fe66a726594150df5402f218b1f827
-
SSDEEP
1536:DEbGkWv1wYYV6iOWt/pEGtxZhTOIgE44W8E3kWkNpOPh0ofKWG7ArFG+7m:vwTMiOE/pEmZhTOHE44MZPhhfoEFG3
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2780 AcroRd32.exe 2780 AcroRd32.exe 2780 AcroRd32.exe 2780 AcroRd32.exe 2780 AcroRd32.exe 2780 AcroRd32.exe 2780 AcroRd32.exe 2780 AcroRd32.exe 2780 AcroRd32.exe 2780 AcroRd32.exe 2780 AcroRd32.exe 2780 AcroRd32.exe 2780 AcroRd32.exe 2780 AcroRd32.exe 2780 AcroRd32.exe 2780 AcroRd32.exe 2780 AcroRd32.exe 2780 AcroRd32.exe 2780 AcroRd32.exe 2780 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2780 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2780 AcroRd32.exe 2780 AcroRd32.exe 2780 AcroRd32.exe 2780 AcroRd32.exe 2780 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2780 wrote to memory of 4200 2780 AcroRd32.exe 91 PID 2780 wrote to memory of 4200 2780 AcroRd32.exe 91 PID 2780 wrote to memory of 4200 2780 AcroRd32.exe 91 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 4532 4200 RdrCEF.exe 93 PID 4200 wrote to memory of 5080 4200 RdrCEF.exe 92 PID 4200 wrote to memory of 5080 4200 RdrCEF.exe 92 PID 4200 wrote to memory of 5080 4200 RdrCEF.exe 92 PID 4200 wrote to memory of 5080 4200 RdrCEF.exe 92 PID 4200 wrote to memory of 5080 4200 RdrCEF.exe 92 PID 4200 wrote to memory of 5080 4200 RdrCEF.exe 92 PID 4200 wrote to memory of 5080 4200 RdrCEF.exe 92 PID 4200 wrote to memory of 5080 4200 RdrCEF.exe 92 PID 4200 wrote to memory of 5080 4200 RdrCEF.exe 92 PID 4200 wrote to memory of 5080 4200 RdrCEF.exe 92 PID 4200 wrote to memory of 5080 4200 RdrCEF.exe 92 PID 4200 wrote to memory of 5080 4200 RdrCEF.exe 92 PID 4200 wrote to memory of 5080 4200 RdrCEF.exe 92 PID 4200 wrote to memory of 5080 4200 RdrCEF.exe 92 PID 4200 wrote to memory of 5080 4200 RdrCEF.exe 92 PID 4200 wrote to memory of 5080 4200 RdrCEF.exe 92 PID 4200 wrote to memory of 5080 4200 RdrCEF.exe 92 PID 4200 wrote to memory of 5080 4200 RdrCEF.exe 92 PID 4200 wrote to memory of 5080 4200 RdrCEF.exe 92 PID 4200 wrote to memory of 5080 4200 RdrCEF.exe 92
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\1b202b883ce51f1f5e44cade2b11468a.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=A7A7AE6C8E0885CF5E3D74B4E3781805 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=A7A7AE6C8E0885CF5E3D74B4E3781805 --renderer-client-id=2 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job /prefetch:13⤵PID:5080
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E835BCEA78C0F54963C408F84D0E8EAA --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4532
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=5B5C96EB2FB1CBF211B3DFEE73AF52F5 --mojo-platform-channel-handle=2296 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2396
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=635C0BE6821171E5A79DF7062ACEFA8A --mojo-platform-channel-handle=2428 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1932
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F13D68C52246516BB1A6D392FB040F40 --mojo-platform-channel-handle=2344 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2892
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=4B8FCAC1CB5038C63331644E4CFD52D6 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=4B8FCAC1CB5038C63331644E4CFD52D6 --renderer-client-id=6 --mojo-platform-channel-handle=1932 --allow-no-sandbox-job /prefetch:13⤵PID:2416
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5c80d072fcad71228b23d0e56b19c8595
SHA1bdd0331adba8159e1de8cf5d610fe255fd9fe0e6
SHA2567518467821d6e2eb1924a8631be19dbc7114322199deba5eb19b8f57ae2d344c
SHA51243e63bbc4256aa77219c5ee15282793b5118dab7a0f200a673b38d19b4e582f7b8de2f3eafd6780f0bb1670910aef07c3da8109a3c1014bb585b9c4c574be144