Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
12/03/2024, 11:00
240312-m4d7jshb86 712/03/2024, 10:59
240312-m3g7tahb69 412/03/2024, 10:53
240312-my2ewsfb61 112/03/2024, 10:46
240312-mt968sha44 712/03/2024, 10:45
240312-mth3raha27 112/03/2024, 10:42
240312-mrtrgagh67 712/03/2024, 10:40
240312-mqwvfagh48 712/03/2024, 10:38
240312-mpq8kagg96 712/03/2024, 10:34
240312-mmbp4aeg7z 1Analysis
-
max time kernel
64s -
max time network
65s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 10:40
Static task
static1
Behavioral task
behavioral1
Sample
w3.org dummy.pdf
Resource
win10v2004-20231215-en
General
-
Target
w3.org dummy.pdf
-
Size
12KB
-
MD5
2942bfabb3d05332b66eb128e0842cff
-
SHA1
90ffd2359008d82298821d16b21778c5c39aec36
-
SHA256
3df79d34abbca99308e79cb94461c1893582604d68329a41fd4bec1885e6adb4
-
SHA512
f3b3ab3e6351e25b5c1882bea8d37efaddc0ea72bf153bb067688f775a26810d32b54f014bf1cebc7fe93042d85b18b5b453e322d154bc55d5cc2754b0dfb4b2
-
SSDEEP
384:8Xdp2nmyTBbQDcv6ZxmiiYcIWyGqBRnfU/LaLvWB27:G8mibQDcvSxm14Wy95fU/2TWk
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings cmd.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3044 AcroRd32.exe 756 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3044 AcroRd32.exe 3044 AcroRd32.exe 3044 AcroRd32.exe 3044 AcroRd32.exe 756 AcroRd32.exe 756 AcroRd32.exe 756 AcroRd32.exe 756 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1168 wrote to memory of 3008 1168 cmd.exe 99 PID 1168 wrote to memory of 3008 1168 cmd.exe 99 PID 3008 wrote to memory of 3484 3008 cmd.exe 100 PID 3008 wrote to memory of 3484 3008 cmd.exe 100 PID 3484 wrote to memory of 756 3484 cmd.exe 101 PID 3484 wrote to memory of 756 3484 cmd.exe 101 PID 3484 wrote to memory of 756 3484 cmd.exe 101 PID 756 wrote to memory of 4124 756 AcroRd32.exe 103 PID 756 wrote to memory of 4124 756 AcroRd32.exe 103 PID 756 wrote to memory of 4124 756 AcroRd32.exe 103 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3928 4124 RdrCEF.exe 104 PID 4124 wrote to memory of 3548 4124 RdrCEF.exe 105 PID 4124 wrote to memory of 3548 4124 RdrCEF.exe 105 PID 4124 wrote to memory of 3548 4124 RdrCEF.exe 105 PID 4124 wrote to memory of 3548 4124 RdrCEF.exe 105 PID 4124 wrote to memory of 3548 4124 RdrCEF.exe 105 PID 4124 wrote to memory of 3548 4124 RdrCEF.exe 105 PID 4124 wrote to memory of 3548 4124 RdrCEF.exe 105 PID 4124 wrote to memory of 3548 4124 RdrCEF.exe 105 PID 4124 wrote to memory of 3548 4124 RdrCEF.exe 105 PID 4124 wrote to memory of 3548 4124 RdrCEF.exe 105 PID 4124 wrote to memory of 3548 4124 RdrCEF.exe 105 PID 4124 wrote to memory of 3548 4124 RdrCEF.exe 105 PID 4124 wrote to memory of 3548 4124 RdrCEF.exe 105
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\w3.org dummy.pdf"1⤵
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3044
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵PID:1524
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3040
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\system32\cmd.execmd c/ "C:\Users\Admin\AppData\Local\Temp\w3.org dummy.pdf"2⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\w3.org dummy.pdf"3⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\w3.org dummy.pdf"4⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140435⤵
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=9BA4CA627330639AE741BE7F7A6F4AAD --mojo-platform-channel-handle=1768 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:26⤵PID:3928
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=6F3AFEA7F4B326D32B8A918573F17C1C --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=6F3AFEA7F4B326D32B8A918573F17C1C --renderer-client-id=2 --mojo-platform-channel-handle=1780 --allow-no-sandbox-job /prefetch:16⤵PID:3548
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8470BFB4C89B75D9E8693C9BB5781A11 --mojo-platform-channel-handle=2188 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:26⤵PID:4512
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A592B26D2226C011AEB9BCCC49472552 --mojo-platform-channel-handle=2368 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:26⤵PID:2468
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=D2EC228E30447C6E739A636C4D3D49C9 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=D2EC228E30447C6E739A636C4D3D49C9 --renderer-client-id=6 --mojo-platform-channel-handle=2204 --allow-no-sandbox-job /prefetch:16⤵PID:4464
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=603108C70A8DCD49850920062AF89D84 --mojo-platform-channel-handle=2760 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:26⤵PID:2588
-
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
220KB
MD571b25364220ad5611bc66ef9b3b49f25
SHA1322f05d385230887c5309a80ebf7dd84dc82a9b7
SHA256fd89842c29ea1bfa9da5a5a438a1fff13351154f60a41b85a0e0717aff51c6f9
SHA51221a4e804fe82414f2cbbab30f55d039d2ea253a54a1ccae4ae26d181456a1b2aaa79ab6c080ef8dad9eb6780e5faa12ce8c258da5268cc7272c2407545f164b9
-
Filesize
10KB
MD5a9e67c466130aff30c2369c7dd09fae5
SHA18728f54d89048e1395b029b2f9157d7a1d06a490
SHA25632d21076aba8af0d065ab1ffb1a6d017fbd1b010af29f9997e6db065a6c6185e
SHA51250fa6ec1cde0f10fd054c5e7bbe73c31188be50b9997864641843426874868fdd865ab2659f91b206a9712e91a60a07ba8ca2bbfdba4d0fc0b340328f85b56f8
-
Filesize
23KB
MD5d969baf169522d47303e8dc00f0005e9
SHA10ae0bc613ade2c231c88ff50e425f2e573ae3e6f
SHA2564625243f72dd41c60f6e044a3e084d8b38ddc2ded0cd870c17d857278e6ace2e
SHA512c74a5abbf7a21285192ac22c59fd22350bf85fcf737d612a39ec1c587a7ecda526f5f406c3c7a8306dc9d89fd45661c2ffdb903666ecf5f388a00614cc68f903