Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
161s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 05:07
Behavioral task
behavioral1
Sample
295d4805632737cd637668d84e4afaac.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
295d4805632737cd637668d84e4afaac.pdf
Resource
win10v2004-20231215-en
General
-
Target
295d4805632737cd637668d84e4afaac.pdf
-
Size
46KB
-
MD5
295d4805632737cd637668d84e4afaac
-
SHA1
178bffa8d01b0b0cc3745dbce23270f571dfe4b2
-
SHA256
5f2e7bdfc38d47412d6e0b453d938902c56a5ce091f43882ff556a318f44025f
-
SHA512
5340e473b6f9be0b2808f30e61f2b2cfb24478f872125a76ba459edfd91da4a18427d9a18d28b87bdc6742bef1a0b4e55cf33220dd2f6f157d93b4044f2be776
-
SSDEEP
768:szhp5+jJfG+P7U4hJ+2guy33Nys5r5ZNSIO+ukv/Z/T8aHTC4RgWU6nhb4:szmtG+PI4D+ruyHNzzHFjukXZrdHMshE
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1280 AcroRd32.exe 1280 AcroRd32.exe 1280 AcroRd32.exe 1280 AcroRd32.exe 1280 AcroRd32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1280 wrote to memory of 5008 1280 AcroRd32.exe 103 PID 1280 wrote to memory of 5008 1280 AcroRd32.exe 103 PID 1280 wrote to memory of 5008 1280 AcroRd32.exe 103
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\295d4805632737cd637668d84e4afaac.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:5008
-