Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2024, 03:22 UTC
Behavioral task
behavioral1
Sample
Jokers_Cleaner_V2.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Jokers_Cleaner_V2.rar
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Jokers_Cleaner_V2.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Jokers_Cleaner_V2.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
creal.pyc
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
creal.pyc
Resource
win10v2004-20240226-en
General
-
Target
creal.pyc
-
Size
32KB
-
MD5
2ffd8e4ea301496367a7251927e17347
-
SHA1
5ae74e8d31f1bad407c510a950ecee712c46fbef
-
SHA256
9a34df241a4cad17587489c4cbfc8dfb69b21f830600f6e4b9ca0dd8c8ac54d4
-
SHA512
14794d74d1fbdeca3f32d30bd0622f1592cc697202f8d3463752d7eee0c37024ab88a344a682a17cf877cc2803c654142958bb2a771005a6e96972f895124def
-
SSDEEP
768:L8Dnroh2VsfNEiyAuAfKFMrRtfqtvEwS7bnjerAroaHDsIAvN8YC06X:Ijrae3aKFcfDwS7fOPviYD6X
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1760 OpenWith.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 1760 OpenWith.exe 1760 OpenWith.exe 1760 OpenWith.exe 1760 OpenWith.exe 1760 OpenWith.exe 1760 OpenWith.exe 1760 OpenWith.exe 1760 OpenWith.exe 1760 OpenWith.exe 1760 OpenWith.exe 1760 OpenWith.exe 1760 OpenWith.exe 1760 OpenWith.exe 1760 OpenWith.exe 1760 OpenWith.exe 4688 AcroRd32.exe 4688 AcroRd32.exe 4688 AcroRd32.exe 4688 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1760 wrote to memory of 4688 1760 OpenWith.exe 99 PID 1760 wrote to memory of 4688 1760 OpenWith.exe 99 PID 1760 wrote to memory of 4688 1760 OpenWith.exe 99 PID 4688 wrote to memory of 2512 4688 AcroRd32.exe 101 PID 4688 wrote to memory of 2512 4688 AcroRd32.exe 101 PID 4688 wrote to memory of 2512 4688 AcroRd32.exe 101 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 1544 2512 RdrCEF.exe 102 PID 2512 wrote to memory of 5088 2512 RdrCEF.exe 103 PID 2512 wrote to memory of 5088 2512 RdrCEF.exe 103 PID 2512 wrote to memory of 5088 2512 RdrCEF.exe 103 PID 2512 wrote to memory of 5088 2512 RdrCEF.exe 103 PID 2512 wrote to memory of 5088 2512 RdrCEF.exe 103 PID 2512 wrote to memory of 5088 2512 RdrCEF.exe 103 PID 2512 wrote to memory of 5088 2512 RdrCEF.exe 103 PID 2512 wrote to memory of 5088 2512 RdrCEF.exe 103 PID 2512 wrote to memory of 5088 2512 RdrCEF.exe 103 PID 2512 wrote to memory of 5088 2512 RdrCEF.exe 103 PID 2512 wrote to memory of 5088 2512 RdrCEF.exe 103 PID 2512 wrote to memory of 5088 2512 RdrCEF.exe 103 PID 2512 wrote to memory of 5088 2512 RdrCEF.exe 103 PID 2512 wrote to memory of 5088 2512 RdrCEF.exe 103 PID 2512 wrote to memory of 5088 2512 RdrCEF.exe 103 PID 2512 wrote to memory of 5088 2512 RdrCEF.exe 103 PID 2512 wrote to memory of 5088 2512 RdrCEF.exe 103
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\creal.pyc1⤵
- Modifies registry class
PID:2208
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\creal.pyc"2⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2122B817BE3FD6BD93ED300968068158 --mojo-platform-channel-handle=1772 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:1544
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=EFF5882785849CD9E52250CAB28CD060 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=EFF5882785849CD9E52250CAB28CD060 --renderer-client-id=2 --mojo-platform-channel-handle=1764 --allow-no-sandbox-job /prefetch:14⤵PID:5088
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=0001D3B77C7F411C82A6F73E9179431E --mojo-platform-channel-handle=2320 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:3820
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D733F113097F4A15E6C9FCABBC2888E1 --mojo-platform-channel-handle=2348 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:1084
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=28D52C672663371F0A8ADE979AE26E95 --mojo-platform-channel-handle=1900 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:3300
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1844
Network
-
Remote address:8.8.8.8:53Request76.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request241.154.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request180.178.17.96.in-addr.arpaIN PTRResponse180.178.17.96.in-addr.arpaIN PTRa96-17-178-180deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request41.110.16.96.in-addr.arpaIN PTRResponse41.110.16.96.in-addr.arpaIN PTRa96-16-110-41deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request81.171.91.138.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request26.165.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request206.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.134.221.88.in-addr.arpaIN PTRResponse18.134.221.88.in-addr.arpaIN PTRa88-221-134-18deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request203.197.79.204.in-addr.arpaIN PTRResponse203.197.79.204.in-addr.arpaIN PTRa-0003a-msedgenet
-
Remote address:8.8.8.8:53Request194.178.17.96.in-addr.arpaIN PTRResponse194.178.17.96.in-addr.arpaIN PTRa96-17-178-194deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request173.178.17.96.in-addr.arpaIN PTRResponse173.178.17.96.in-addr.arpaIN PTRa96-17-178-173deploystaticakamaitechnologiescom
-
71 B 157 B 1 1
DNS Request
76.32.126.40.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
241.154.82.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
180.178.17.96.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
41.110.16.96.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
81.171.91.138.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
26.165.165.52.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
206.23.85.13.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
18.134.221.88.in-addr.arpa
-
73 B 106 B 1 1
DNS Request
203.197.79.204.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
194.178.17.96.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
173.178.17.96.in-addr.arpa
-