Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2024, 14:33
Behavioral task
behavioral1
Sample
43ed7a786dbe5960858798db8cac2670.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
43ed7a786dbe5960858798db8cac2670.pdf
Resource
win10v2004-20231215-en
General
-
Target
43ed7a786dbe5960858798db8cac2670.pdf
-
Size
84KB
-
MD5
43ed7a786dbe5960858798db8cac2670
-
SHA1
27305575c1f4dfb2bf4187bc7226152519fb33c3
-
SHA256
804e44dd43eeb3003ecd8c25f96aeaf90566522ddb5a850c934d4a4c555cd7d4
-
SHA512
6d52ee9653dddbcff7be405beb57eaa90b92d67dd0e00e5c94db26af26311ca5e15cdb95206736eee7464eb2e08987ac8e449dd39f1ac89ba110e9e060023c12
-
SSDEEP
1536:en6MQyGZO+uGIs4eVpEMjGXRnN1djdy0Tr7JOW+pH+0WCpOViEoxA:m61Xss4xDntjdy0/7JE+9ViET
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4264 AcroRd32.exe 4264 AcroRd32.exe 4264 AcroRd32.exe 4264 AcroRd32.exe 4264 AcroRd32.exe 4264 AcroRd32.exe 4264 AcroRd32.exe 4264 AcroRd32.exe 4264 AcroRd32.exe 4264 AcroRd32.exe 4264 AcroRd32.exe 4264 AcroRd32.exe 4264 AcroRd32.exe 4264 AcroRd32.exe 4264 AcroRd32.exe 4264 AcroRd32.exe 4264 AcroRd32.exe 4264 AcroRd32.exe 4264 AcroRd32.exe 4264 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4264 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4264 AcroRd32.exe 4264 AcroRd32.exe 4264 AcroRd32.exe 4264 AcroRd32.exe 4264 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4264 wrote to memory of 2164 4264 AcroRd32.exe 92 PID 4264 wrote to memory of 2164 4264 AcroRd32.exe 92 PID 4264 wrote to memory of 2164 4264 AcroRd32.exe 92 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 2184 2164 RdrCEF.exe 94 PID 2164 wrote to memory of 5052 2164 RdrCEF.exe 93 PID 2164 wrote to memory of 5052 2164 RdrCEF.exe 93 PID 2164 wrote to memory of 5052 2164 RdrCEF.exe 93 PID 2164 wrote to memory of 5052 2164 RdrCEF.exe 93 PID 2164 wrote to memory of 5052 2164 RdrCEF.exe 93 PID 2164 wrote to memory of 5052 2164 RdrCEF.exe 93 PID 2164 wrote to memory of 5052 2164 RdrCEF.exe 93 PID 2164 wrote to memory of 5052 2164 RdrCEF.exe 93 PID 2164 wrote to memory of 5052 2164 RdrCEF.exe 93 PID 2164 wrote to memory of 5052 2164 RdrCEF.exe 93 PID 2164 wrote to memory of 5052 2164 RdrCEF.exe 93 PID 2164 wrote to memory of 5052 2164 RdrCEF.exe 93 PID 2164 wrote to memory of 5052 2164 RdrCEF.exe 93 PID 2164 wrote to memory of 5052 2164 RdrCEF.exe 93 PID 2164 wrote to memory of 5052 2164 RdrCEF.exe 93 PID 2164 wrote to memory of 5052 2164 RdrCEF.exe 93 PID 2164 wrote to memory of 5052 2164 RdrCEF.exe 93 PID 2164 wrote to memory of 5052 2164 RdrCEF.exe 93 PID 2164 wrote to memory of 5052 2164 RdrCEF.exe 93 PID 2164 wrote to memory of 5052 2164 RdrCEF.exe 93
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\43ed7a786dbe5960858798db8cac2670.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=FAF7308DDA77A8B8E7A26A2C2A14474E --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=FAF7308DDA77A8B8E7A26A2C2A14474E --renderer-client-id=2 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job /prefetch:13⤵PID:5052
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=FE2243D6F5AFA2FD610030F28D1F03A4 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2184
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=666F7738EA2B5E2B008DB04AD36430AE --mojo-platform-channel-handle=2296 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2876
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=DB6D57AAE3379EEE8725C7C0DC3BA758 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=DB6D57AAE3379EEE8725C7C0DC3BA758 --renderer-client-id=6 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job /prefetch:13⤵PID:4536
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=CEA172B5E93F5B5EAEE157C8453315FB --mojo-platform-channel-handle=1940 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2360
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=1D89EFBA41B25328239D3D74681ED252 --mojo-platform-channel-handle=2672 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4144
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:960
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵PID:4144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d0df5f9974138501424cb06472477adf
SHA19d143e2c9c48327c6fa0b4f2fb65be982037db51
SHA2566c3615c908cb98afc062e70b7f985bf7b667fd8540a25824aa07a14b6b6a05d6
SHA5129a7d8b47a8311e00ba206fee9bf0d42991a0caaf43492ea067bb6c9eb333a3231a35bae1efcd95add82d6dbfcfef5e10d42c084b9e73c5fdd7eadf8131324617