Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
165s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 12:47
Behavioral task
behavioral1
Sample
36a840f681b2a1dc2a32f2b38640ffdc.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
36a840f681b2a1dc2a32f2b38640ffdc.pdf
Resource
win10v2004-20231215-en
General
-
Target
36a840f681b2a1dc2a32f2b38640ffdc.pdf
-
Size
86KB
-
MD5
36a840f681b2a1dc2a32f2b38640ffdc
-
SHA1
e9aea32f68776aaba21628f9a76aff94d2d339a2
-
SHA256
0825e44e4f08206a258952f6a95c847a8ea5d45cc3103b2af4ec71ecd3a90e34
-
SHA512
2247ee2059073bb6b1e120977c1b2217e921ebff13c26789aa776f14ed09a80544401f78477ee34a77fdffd00feb572053ac331b7bcfecfd2f40874396deb41d
-
SSDEEP
1536:dZyHRY7LnDnwXsXsMPzB+68ULPNmSi/VzTFUMwtPRW8pOGUYnhZJIWATuy+J:CHRY7LDnwXso68ULPNvUVtUMJGDvJQSP
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4956 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4956 AcroRd32.exe 4956 AcroRd32.exe 4956 AcroRd32.exe 4956 AcroRd32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4956 wrote to memory of 4040 4956 AcroRd32.exe 108 PID 4956 wrote to memory of 4040 4956 AcroRd32.exe 108 PID 4956 wrote to memory of 4040 4956 AcroRd32.exe 108
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\36a840f681b2a1dc2a32f2b38640ffdc.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:4040
-