Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
164s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23/01/2024, 22:06
Behavioral task
behavioral1
Sample
70ae1843c9c9d1e47f2ac124f507e3be.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
70ae1843c9c9d1e47f2ac124f507e3be.pdf
Resource
win10v2004-20231215-en
General
-
Target
70ae1843c9c9d1e47f2ac124f507e3be.pdf
-
Size
94KB
-
MD5
70ae1843c9c9d1e47f2ac124f507e3be
-
SHA1
0acdf6fac5afdafdb3944ad0e952b648702c9031
-
SHA256
ee59324206bbcc397ba525586fec6784800cca8dc7dc20def5515b4f86344c0b
-
SHA512
930e1246ad91c93b2805d0ef3f35992550d0871bfe9ad9e278b2b25ee08e3ba92d2d8a8ff12e4ee39d662b2ebf0db1449959834d14785323cff28daad5eda219
-
SSDEEP
1536:L5Cq7tD82a7lNCSCkiiXvGOUM64ZTOvj0V4r0AkQF1wy3TdEYWaPehe7O8WQpOC2:1zpD8eSnnhUM64Vy64rmymaPY4O7C2
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5060 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 5060 AcroRd32.exe 5060 AcroRd32.exe 5060 AcroRd32.exe 5060 AcroRd32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5060 wrote to memory of 4848 5060 AcroRd32.exe 98 PID 5060 wrote to memory of 4848 5060 AcroRd32.exe 98 PID 5060 wrote to memory of 4848 5060 AcroRd32.exe 98
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\70ae1843c9c9d1e47f2ac124f507e3be.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:4848
-