Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
159s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 00:56
Behavioral task
behavioral1
Sample
225c3da0c80fed3b3c623c99f021f4be.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
225c3da0c80fed3b3c623c99f021f4be.pdf
Resource
win10v2004-20231215-en
General
-
Target
225c3da0c80fed3b3c623c99f021f4be.pdf
-
Size
89KB
-
MD5
225c3da0c80fed3b3c623c99f021f4be
-
SHA1
735780c79397578265ee16b7ada7c4354ad6c91a
-
SHA256
21ec986c0ee755a897e79f409ef818c3c4e39e928eeee9e020a4858cb5bce583
-
SHA512
e2d6e5649656847b84df04def1695c269baa6d2b1d184321c62a3122cb3c4ce97899b15dda0dc6985a710c394949fa1783d98ceac91513e2915935ab5cb5bd4b
-
SSDEEP
1536:IrDUS3DMnfrf0CtVcSwpd265kDV1fP5ZWxApOG3kWG/grjYQq5:8US3Kfrf0cVc5w654bX5+3G3Pr0V
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3752 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3752 AcroRd32.exe 3752 AcroRd32.exe 3752 AcroRd32.exe 3752 AcroRd32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3752 wrote to memory of 3536 3752 AcroRd32.exe 110 PID 3752 wrote to memory of 3536 3752 AcroRd32.exe 110 PID 3752 wrote to memory of 3536 3752 AcroRd32.exe 110 PID 3752 wrote to memory of 4348 3752 AcroRd32.exe 111 PID 3752 wrote to memory of 4348 3752 AcroRd32.exe 111 PID 3752 wrote to memory of 4348 3752 AcroRd32.exe 111
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\225c3da0c80fed3b3c623c99f021f4be.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:3536
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:4348
-