Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 03:29
Behavioral task
behavioral1
Sample
266880039ce52047ba134875570e3b0b.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
266880039ce52047ba134875570e3b0b.pdf
Resource
win10v2004-20231215-en
General
-
Target
266880039ce52047ba134875570e3b0b.pdf
-
Size
42KB
-
MD5
266880039ce52047ba134875570e3b0b
-
SHA1
75e703dee2bd0ca77dc053abd2ec59478ec8c12e
-
SHA256
fd3ae768884e5567c325cfd3c6e0d065baa340be07d5d3ed100d9e9a7f16ddbd
-
SHA512
0c8a1b43af098d7734184564a4cdb3a102de10d657efeb77f6ded1b7fcc92fe6859c51774c196a13945b133e38f6844df6a269955eb633e370a6cb1a3cf6bd3e
-
SSDEEP
768:1QqgvyQQa71vWrxAGNibK7EAPU6QeCLId1cBzng1Jong:rg1Qa7sJiu7EAzQeCLIc1ng1Wg
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3976 AcroRd32.exe 3976 AcroRd32.exe 3976 AcroRd32.exe 3976 AcroRd32.exe 3976 AcroRd32.exe 3976 AcroRd32.exe 3976 AcroRd32.exe 3976 AcroRd32.exe 3976 AcroRd32.exe 3976 AcroRd32.exe 3976 AcroRd32.exe 3976 AcroRd32.exe 3976 AcroRd32.exe 3976 AcroRd32.exe 3976 AcroRd32.exe 3976 AcroRd32.exe 3976 AcroRd32.exe 3976 AcroRd32.exe 3976 AcroRd32.exe 3976 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3976 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3976 AcroRd32.exe 3976 AcroRd32.exe 3976 AcroRd32.exe 3976 AcroRd32.exe 3976 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3976 wrote to memory of 1244 3976 AcroRd32.exe 92 PID 3976 wrote to memory of 1244 3976 AcroRd32.exe 92 PID 3976 wrote to memory of 1244 3976 AcroRd32.exe 92 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4908 1244 RdrCEF.exe 94 PID 1244 wrote to memory of 4432 1244 RdrCEF.exe 93 PID 1244 wrote to memory of 4432 1244 RdrCEF.exe 93 PID 1244 wrote to memory of 4432 1244 RdrCEF.exe 93 PID 1244 wrote to memory of 4432 1244 RdrCEF.exe 93 PID 1244 wrote to memory of 4432 1244 RdrCEF.exe 93 PID 1244 wrote to memory of 4432 1244 RdrCEF.exe 93 PID 1244 wrote to memory of 4432 1244 RdrCEF.exe 93 PID 1244 wrote to memory of 4432 1244 RdrCEF.exe 93 PID 1244 wrote to memory of 4432 1244 RdrCEF.exe 93 PID 1244 wrote to memory of 4432 1244 RdrCEF.exe 93 PID 1244 wrote to memory of 4432 1244 RdrCEF.exe 93 PID 1244 wrote to memory of 4432 1244 RdrCEF.exe 93 PID 1244 wrote to memory of 4432 1244 RdrCEF.exe 93 PID 1244 wrote to memory of 4432 1244 RdrCEF.exe 93 PID 1244 wrote to memory of 4432 1244 RdrCEF.exe 93 PID 1244 wrote to memory of 4432 1244 RdrCEF.exe 93 PID 1244 wrote to memory of 4432 1244 RdrCEF.exe 93 PID 1244 wrote to memory of 4432 1244 RdrCEF.exe 93 PID 1244 wrote to memory of 4432 1244 RdrCEF.exe 93 PID 1244 wrote to memory of 4432 1244 RdrCEF.exe 93
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\266880039ce52047ba134875570e3b0b.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=73CD20BFC7F6341A898F1C622CC51701 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=73CD20BFC7F6341A898F1C622CC51701 --renderer-client-id=2 --mojo-platform-channel-handle=1764 --allow-no-sandbox-job /prefetch:13⤵PID:4432
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=93AA1E71D6F3FF47BC4103D820A27C2E --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4908
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=CE228A31D6F4B2865C5847A92CF070C8 --mojo-platform-channel-handle=2284 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1500
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=ABFA312D08005B761E960C0F440A334C --mojo-platform-channel-handle=2296 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4684
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=718F48A2C38517EB6E9661164C34F31A --mojo-platform-channel-handle=2420 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2700
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=1816E02917C7AC1571A551383BBDA30E --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=1816E02917C7AC1571A551383BBDA30E --renderer-client-id=7 --mojo-platform-channel-handle=2284 --allow-no-sandbox-job /prefetch:13⤵PID:3656
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1496