Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 04:36
Behavioral task
behavioral1
Sample
987ea44d079d6540a45ddb1cfaa4f860.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
987ea44d079d6540a45ddb1cfaa4f860.pdf
Resource
win10v2004-20231215-en
General
-
Target
987ea44d079d6540a45ddb1cfaa4f860.pdf
-
Size
107KB
-
MD5
987ea44d079d6540a45ddb1cfaa4f860
-
SHA1
fa4e0117693b1ee80307a223754ae0ead6bfa16e
-
SHA256
a08e0d07fc4c85bb00eeea2a4e4cf64cad603745483188c31655e7578fcb39c5
-
SHA512
689ef4a3f83d3394214cdb67f8a899903e45f80bc66226a89f2ca24bd9615c5aa41f9d9976f3a14378dd3a40f0cfd3fd6d70f6b087ca52219e9aa2fd018eb749
-
SSDEEP
3072:v/BjZgxhIuSWov5oLTn+VOj1ZF2zgEGLfC5jO+JZ:nXgDrSdx8T8Wgg3fC53
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1704 AcroRd32.exe 1704 AcroRd32.exe 1704 AcroRd32.exe 1704 AcroRd32.exe 1704 AcroRd32.exe 1704 AcroRd32.exe 1704 AcroRd32.exe 1704 AcroRd32.exe 1704 AcroRd32.exe 1704 AcroRd32.exe 1704 AcroRd32.exe 1704 AcroRd32.exe 1704 AcroRd32.exe 1704 AcroRd32.exe 1704 AcroRd32.exe 1704 AcroRd32.exe 1704 AcroRd32.exe 1704 AcroRd32.exe 1704 AcroRd32.exe 1704 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1704 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1704 AcroRd32.exe 1704 AcroRd32.exe 1704 AcroRd32.exe 1704 AcroRd32.exe 1704 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1704 wrote to memory of 4212 1704 AcroRd32.exe 85 PID 1704 wrote to memory of 4212 1704 AcroRd32.exe 85 PID 1704 wrote to memory of 4212 1704 AcroRd32.exe 85 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 1908 4212 RdrCEF.exe 86 PID 4212 wrote to memory of 440 4212 RdrCEF.exe 87 PID 4212 wrote to memory of 440 4212 RdrCEF.exe 87 PID 4212 wrote to memory of 440 4212 RdrCEF.exe 87 PID 4212 wrote to memory of 440 4212 RdrCEF.exe 87 PID 4212 wrote to memory of 440 4212 RdrCEF.exe 87 PID 4212 wrote to memory of 440 4212 RdrCEF.exe 87 PID 4212 wrote to memory of 440 4212 RdrCEF.exe 87 PID 4212 wrote to memory of 440 4212 RdrCEF.exe 87 PID 4212 wrote to memory of 440 4212 RdrCEF.exe 87 PID 4212 wrote to memory of 440 4212 RdrCEF.exe 87 PID 4212 wrote to memory of 440 4212 RdrCEF.exe 87 PID 4212 wrote to memory of 440 4212 RdrCEF.exe 87 PID 4212 wrote to memory of 440 4212 RdrCEF.exe 87 PID 4212 wrote to memory of 440 4212 RdrCEF.exe 87 PID 4212 wrote to memory of 440 4212 RdrCEF.exe 87 PID 4212 wrote to memory of 440 4212 RdrCEF.exe 87 PID 4212 wrote to memory of 440 4212 RdrCEF.exe 87 PID 4212 wrote to memory of 440 4212 RdrCEF.exe 87 PID 4212 wrote to memory of 440 4212 RdrCEF.exe 87 PID 4212 wrote to memory of 440 4212 RdrCEF.exe 87
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\987ea44d079d6540a45ddb1cfaa4f860.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F559B8D0AA346079166AE34834685D07 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1908
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=F1D4220C725B3D4699B70787E4A4154C --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=F1D4220C725B3D4699B70787E4A4154C --renderer-client-id=2 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job /prefetch:13⤵PID:440
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=88CFCFC613D4E3EA8416F18302E80CA1 --mojo-platform-channel-handle=2312 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2976
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=1C70BF3D2FD9BDABC0F6E9D6F117DEFE --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=1C70BF3D2FD9BDABC0F6E9D6F117DEFE --renderer-client-id=5 --mojo-platform-channel-handle=1956 --allow-no-sandbox-job /prefetch:13⤵PID:4080
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=08E12F6A24F5BB6740BA3CED9A1AAA0A --mojo-platform-channel-handle=1832 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4756
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=BD0AB7726D80087184207377BC7CC3CD --mojo-platform-channel-handle=2804 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4184
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5bcc7258e1501a0123d32e055f9f598b7
SHA158c9abf9863160d6fc62ea3510f9303c7270f674
SHA25665b30c327d97da0f1252923d89a5d1b049a1f97d6b05b8c0c2d3d37c004d3b5d
SHA512cf5e0c5d348a68b10b233a7bf7f3c9ce565c22b6c20616d998c4f456afe81643e9cbddb600fa0adf05520d998425982b389e0cb36f7365a4fdf170a8b376ec2d
-
Filesize
33KB
MD5d8e2be618a8215cf3aa03e3a0fecba89
SHA1301f1c1ec03d3986284e04a292780b8ebe136284
SHA256cfc1487b244db1ff71f902ee0cd006c776af859c09f2bdbbf6662c914804e5bf
SHA5129644427a1da5c6265a960cdc4e2a1d19b3dcfefdb14f048bb4d28f774079d6331b9b7e75aeb9b36ef99307c80eb8652766ab6b84a4a00f4d70b33bfa67a0bb47
-
Filesize
5KB
MD5637d7eae31632e2c686e653b98a09f23
SHA1712b65d81056bab2842ae4987ffe2802a0686fee
SHA2567770464b051b56fed89f2478b4a150b68dcfa6e60992b5ce02e7a93fecbfab9d
SHA512ef8036f06e66b876e629b8b9a535db297066a4bb947b6e6f79589f5fb91ddb9acf62dc3bbd954253518b4261fe5f08aa5f436ca0de7987403c77f6cc81352ae4