Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 05:44
Behavioral task
behavioral1
Sample
5821620d473c6981d5984664aa2bfc3e.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5821620d473c6981d5984664aa2bfc3e.pdf
Resource
win10v2004-20231215-en
General
-
Target
5821620d473c6981d5984664aa2bfc3e.pdf
-
Size
63KB
-
MD5
5821620d473c6981d5984664aa2bfc3e
-
SHA1
25fc81b50f1aee1abcbcf5d5dc86521d35dd28e3
-
SHA256
27b32b02a1b448f5d7628a49bf1bbd716421bd9ab3191fc91d856d54b84f500e
-
SHA512
7cbd07deb290360d454c13bef24df0fc084a641b241e1923bc0d62aa85ace51162394b6f88d9edfa2e4b3a67395dcb967a402b2d4fd25f6b5e29c860846a427a
-
SSDEEP
1536:ZxJUnekB3jAv3r35K7bf6c3Kqv0F33kYqKTrPb7hDI:FUekJjAv7OfP3KqwnktKvD7e
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3028 AcroRd32.exe 3028 AcroRd32.exe 3028 AcroRd32.exe 3028 AcroRd32.exe 3028 AcroRd32.exe 3028 AcroRd32.exe 3028 AcroRd32.exe 3028 AcroRd32.exe 3028 AcroRd32.exe 3028 AcroRd32.exe 3028 AcroRd32.exe 3028 AcroRd32.exe 3028 AcroRd32.exe 3028 AcroRd32.exe 3028 AcroRd32.exe 3028 AcroRd32.exe 3028 AcroRd32.exe 3028 AcroRd32.exe 3028 AcroRd32.exe 3028 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3028 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3028 AcroRd32.exe 3028 AcroRd32.exe 3028 AcroRd32.exe 3028 AcroRd32.exe 3028 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3028 wrote to memory of 1924 3028 AcroRd32.exe 90 PID 3028 wrote to memory of 1924 3028 AcroRd32.exe 90 PID 3028 wrote to memory of 1924 3028 AcroRd32.exe 90 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 1820 1924 RdrCEF.exe 91 PID 1924 wrote to memory of 4236 1924 RdrCEF.exe 92 PID 1924 wrote to memory of 4236 1924 RdrCEF.exe 92 PID 1924 wrote to memory of 4236 1924 RdrCEF.exe 92 PID 1924 wrote to memory of 4236 1924 RdrCEF.exe 92 PID 1924 wrote to memory of 4236 1924 RdrCEF.exe 92 PID 1924 wrote to memory of 4236 1924 RdrCEF.exe 92 PID 1924 wrote to memory of 4236 1924 RdrCEF.exe 92 PID 1924 wrote to memory of 4236 1924 RdrCEF.exe 92 PID 1924 wrote to memory of 4236 1924 RdrCEF.exe 92 PID 1924 wrote to memory of 4236 1924 RdrCEF.exe 92 PID 1924 wrote to memory of 4236 1924 RdrCEF.exe 92 PID 1924 wrote to memory of 4236 1924 RdrCEF.exe 92 PID 1924 wrote to memory of 4236 1924 RdrCEF.exe 92 PID 1924 wrote to memory of 4236 1924 RdrCEF.exe 92 PID 1924 wrote to memory of 4236 1924 RdrCEF.exe 92 PID 1924 wrote to memory of 4236 1924 RdrCEF.exe 92 PID 1924 wrote to memory of 4236 1924 RdrCEF.exe 92 PID 1924 wrote to memory of 4236 1924 RdrCEF.exe 92 PID 1924 wrote to memory of 4236 1924 RdrCEF.exe 92 PID 1924 wrote to memory of 4236 1924 RdrCEF.exe 92
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\5821620d473c6981d5984664aa2bfc3e.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=60D3583D5056A3AAB0C9DEF83437179D --mojo-platform-channel-handle=1752 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1820
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=DE2789CD4020D04CCECE7D83FE4AF158 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=DE2789CD4020D04CCECE7D83FE4AF158 --renderer-client-id=2 --mojo-platform-channel-handle=1720 --allow-no-sandbox-job /prefetch:13⤵PID:4236
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=CEED7011F6B5B4DAF89791E3C0B4C07E --mojo-platform-channel-handle=2296 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1800
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=8AA51A97988692C76021EA225782AA51 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=8AA51A97988692C76021EA225782AA51 --renderer-client-id=5 --mojo-platform-channel-handle=2404 --allow-no-sandbox-job /prefetch:13⤵PID:4228
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=FEFC77E0F590C985D1079B519B62092C --mojo-platform-channel-handle=2692 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1036
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=EB02878A958EC6382B1D5F2F075FDEF7 --mojo-platform-channel-handle=2912 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:5072
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵PID:1036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD512730643efaf0f8527613a09cec037d5
SHA10cb01afc46a4576d212c349e93b4949bf463e2c7
SHA2566c1e6a5c73cd5eb8c9b606625e7c0423cce97bdf05048c3ba8a610142f6d63c4
SHA5123e889df3d107c50d05d2c2c89ba9b1524da59eb2804a0a353a8250aa7e9690e381cda8d9588b98e11ba9f859702204a8065b81471561e847f2a7cf8c6e51554f
-
Filesize
56KB
MD5c26ed30e7d5ab440480838636efc41db
SHA1c66e0d00b56abebfb60d2fcc5cf85ad31a0d6591
SHA2566a3c5c4a8e57f77ecc22078fbf603ecc31fb82d429bd87b7b4b9261447092aef
SHA51296cdb78bca3e01d4513c31661987e5646e6a8ff24708918aa0d66dfa3ca5d98af4862c9f38c4f41f933c345d2d3adfb1d34d1430b33f45f916f41a9872a030df
-
Filesize
1KB
MD5d0df5f9974138501424cb06472477adf
SHA19d143e2c9c48327c6fa0b4f2fb65be982037db51
SHA2566c3615c908cb98afc062e70b7f985bf7b667fd8540a25824aa07a14b6b6a05d6
SHA5129a7d8b47a8311e00ba206fee9bf0d42991a0caaf43492ea067bb6c9eb333a3231a35bae1efcd95add82d6dbfcfef5e10d42c084b9e73c5fdd7eadf8131324617