Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 10:47
Behavioral task
behavioral1
Sample
505a33db5dc0959fcf7ef16b3c3e3c47.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
505a33db5dc0959fcf7ef16b3c3e3c47.pdf
Resource
win10v2004-20231222-en
General
-
Target
505a33db5dc0959fcf7ef16b3c3e3c47.pdf
-
Size
43KB
-
MD5
505a33db5dc0959fcf7ef16b3c3e3c47
-
SHA1
69eed1cd977b592f6b6bad190de056a42bfcf708
-
SHA256
3a28b76847ec2e754e7531529c33c6687f96ce052a94b23e5d0d3ac9cb5ade44
-
SHA512
dbea680e84f0c490fb19a4d3b7d546a568769fac727cac3526bd720c311dc4475a8ac299335de70016dbbc6c2af7d217193dc6db5822604bfcbb1056379d461e
-
SSDEEP
768:GqsP/Ma7ix77LI2mb87xmYQQEEl6wA4PTAhFUVFo2GiOPRaDI5hiC:GnP0aGO5fJNTi0h8oRaDI5hiC
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2676 AcroRd32.exe 2676 AcroRd32.exe 2676 AcroRd32.exe 2676 AcroRd32.exe 2676 AcroRd32.exe 2676 AcroRd32.exe 2676 AcroRd32.exe 2676 AcroRd32.exe 2676 AcroRd32.exe 2676 AcroRd32.exe 2676 AcroRd32.exe 2676 AcroRd32.exe 2676 AcroRd32.exe 2676 AcroRd32.exe 2676 AcroRd32.exe 2676 AcroRd32.exe 2676 AcroRd32.exe 2676 AcroRd32.exe 2676 AcroRd32.exe 2676 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2676 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2676 AcroRd32.exe 2676 AcroRd32.exe 2676 AcroRd32.exe 2676 AcroRd32.exe 2676 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2912 2676 AcroRd32.exe 95 PID 2676 wrote to memory of 2912 2676 AcroRd32.exe 95 PID 2676 wrote to memory of 2912 2676 AcroRd32.exe 95 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3372 2912 RdrCEF.exe 97 PID 2912 wrote to memory of 3284 2912 RdrCEF.exe 96 PID 2912 wrote to memory of 3284 2912 RdrCEF.exe 96 PID 2912 wrote to memory of 3284 2912 RdrCEF.exe 96 PID 2912 wrote to memory of 3284 2912 RdrCEF.exe 96 PID 2912 wrote to memory of 3284 2912 RdrCEF.exe 96 PID 2912 wrote to memory of 3284 2912 RdrCEF.exe 96 PID 2912 wrote to memory of 3284 2912 RdrCEF.exe 96 PID 2912 wrote to memory of 3284 2912 RdrCEF.exe 96 PID 2912 wrote to memory of 3284 2912 RdrCEF.exe 96 PID 2912 wrote to memory of 3284 2912 RdrCEF.exe 96 PID 2912 wrote to memory of 3284 2912 RdrCEF.exe 96 PID 2912 wrote to memory of 3284 2912 RdrCEF.exe 96 PID 2912 wrote to memory of 3284 2912 RdrCEF.exe 96 PID 2912 wrote to memory of 3284 2912 RdrCEF.exe 96 PID 2912 wrote to memory of 3284 2912 RdrCEF.exe 96 PID 2912 wrote to memory of 3284 2912 RdrCEF.exe 96 PID 2912 wrote to memory of 3284 2912 RdrCEF.exe 96 PID 2912 wrote to memory of 3284 2912 RdrCEF.exe 96 PID 2912 wrote to memory of 3284 2912 RdrCEF.exe 96 PID 2912 wrote to memory of 3284 2912 RdrCEF.exe 96
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\505a33db5dc0959fcf7ef16b3c3e3c47.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=465D69311B9E1BF3F314457366029D36 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=465D69311B9E1BF3F314457366029D36 --renderer-client-id=2 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job /prefetch:13⤵PID:3284
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=0CC4498D6CFE84D11BD3AC56E6468AC6 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3372
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=84BDEA826B5A295915D18D1A95895BC0 --mojo-platform-channel-handle=2284 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4204
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B4BF0C943FDFCB91D713B2663630F0C9 --mojo-platform-channel-handle=1952 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4308
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B8DE214777EDD18D168F8A7B19CAAC99 --mojo-platform-channel-handle=2360 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4452
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=E14B84ED52DEBF5B839703B19ABF6EB6 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=E14B84ED52DEBF5B839703B19ABF6EB6 --renderer-client-id=7 --mojo-platform-channel-handle=1940 --allow-no-sandbox-job /prefetch:13⤵PID:1952
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3168