Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
165s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 06:48
Behavioral task
behavioral1
Sample
2c328646a984f0d5dead6fccc700776f.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2c328646a984f0d5dead6fccc700776f.pdf
Resource
win10v2004-20231215-en
General
-
Target
2c328646a984f0d5dead6fccc700776f.pdf
-
Size
81KB
-
MD5
2c328646a984f0d5dead6fccc700776f
-
SHA1
1ee5fe6a4ae0c0809daaba0bf6e3bb242e26861f
-
SHA256
7839286818f6a5033619f1724542d0c1c56390c7b2ddb973f2e8a8ecfdadb596
-
SHA512
e13180be6d1fabea9d51f7d7f15f0e1b1b153e3b56b1d1948b900cfcf62f39fb83992b694964b282e77bc5136dfd8d40dd52457140aa22690c0e7bec8eaccdb6
-
SSDEEP
1536:b75FxhDbMiM9AJrobCNNaYyooWpYu4WQpOCHRD:7zDbbnpobQNaYyoOunCt
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1648 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1648 AcroRd32.exe 1648 AcroRd32.exe 1648 AcroRd32.exe 1648 AcroRd32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1648 wrote to memory of 4996 1648 AcroRd32.exe 107 PID 1648 wrote to memory of 4996 1648 AcroRd32.exe 107 PID 1648 wrote to memory of 4996 1648 AcroRd32.exe 107 PID 1648 wrote to memory of 440 1648 AcroRd32.exe 108 PID 1648 wrote to memory of 440 1648 AcroRd32.exe 108 PID 1648 wrote to memory of 440 1648 AcroRd32.exe 108
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\2c328646a984f0d5dead6fccc700776f.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:4996
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:440
-