Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 17:10
Behavioral task
behavioral1
Sample
c66e3a20dc1ffd59e043da0a1d435a55.pdf
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c66e3a20dc1ffd59e043da0a1d435a55.pdf
Resource
win10v2004-20240226-en
General
-
Target
c66e3a20dc1ffd59e043da0a1d435a55.pdf
-
Size
50KB
-
MD5
c66e3a20dc1ffd59e043da0a1d435a55
-
SHA1
b469cc309163d6ca034b4587064461e1345d0a2b
-
SHA256
67f5d668966ff5b42da723b1af9a751457da2310ae8d7dc9986447f56df196e4
-
SHA512
87a0c7515708053ff07d1527682590c0e4e3bfb25d0ef3f60fa519c4af93f47f27d5d2487c2f1a29b3494c1061d29af85733f115ae33a3193b7e9c34116b42a7
-
SSDEEP
1536:G9FWcY5EVb7vYh3ifxa8nsFTd37tUAVPiQ:yFWAl7vs3kneKAF7
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3624 AcroRd32.exe 3624 AcroRd32.exe 3624 AcroRd32.exe 3624 AcroRd32.exe 3624 AcroRd32.exe 3624 AcroRd32.exe 3624 AcroRd32.exe 3624 AcroRd32.exe 3624 AcroRd32.exe 3624 AcroRd32.exe 3624 AcroRd32.exe 3624 AcroRd32.exe 3624 AcroRd32.exe 3624 AcroRd32.exe 3624 AcroRd32.exe 3624 AcroRd32.exe 3624 AcroRd32.exe 3624 AcroRd32.exe 3624 AcroRd32.exe 3624 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3624 AcroRd32.exe 3624 AcroRd32.exe 3624 AcroRd32.exe 3624 AcroRd32.exe 3624 AcroRd32.exe 3624 AcroRd32.exe 3624 AcroRd32.exe 3624 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3624 wrote to memory of 5092 3624 AcroRd32.exe 94 PID 3624 wrote to memory of 5092 3624 AcroRd32.exe 94 PID 3624 wrote to memory of 5092 3624 AcroRd32.exe 94 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 2704 5092 RdrCEF.exe 95 PID 5092 wrote to memory of 4792 5092 RdrCEF.exe 96 PID 5092 wrote to memory of 4792 5092 RdrCEF.exe 96 PID 5092 wrote to memory of 4792 5092 RdrCEF.exe 96 PID 5092 wrote to memory of 4792 5092 RdrCEF.exe 96 PID 5092 wrote to memory of 4792 5092 RdrCEF.exe 96 PID 5092 wrote to memory of 4792 5092 RdrCEF.exe 96 PID 5092 wrote to memory of 4792 5092 RdrCEF.exe 96 PID 5092 wrote to memory of 4792 5092 RdrCEF.exe 96 PID 5092 wrote to memory of 4792 5092 RdrCEF.exe 96 PID 5092 wrote to memory of 4792 5092 RdrCEF.exe 96 PID 5092 wrote to memory of 4792 5092 RdrCEF.exe 96 PID 5092 wrote to memory of 4792 5092 RdrCEF.exe 96 PID 5092 wrote to memory of 4792 5092 RdrCEF.exe 96 PID 5092 wrote to memory of 4792 5092 RdrCEF.exe 96 PID 5092 wrote to memory of 4792 5092 RdrCEF.exe 96 PID 5092 wrote to memory of 4792 5092 RdrCEF.exe 96 PID 5092 wrote to memory of 4792 5092 RdrCEF.exe 96 PID 5092 wrote to memory of 4792 5092 RdrCEF.exe 96 PID 5092 wrote to memory of 4792 5092 RdrCEF.exe 96 PID 5092 wrote to memory of 4792 5092 RdrCEF.exe 96
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\c66e3a20dc1ffd59e043da0a1d435a55.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=7177181EF40BACDF188671B934B854C7 --mojo-platform-channel-handle=1728 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2704
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=6A1D632E4FDD218FBD842D1BB967D2B4 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=6A1D632E4FDD218FBD842D1BB967D2B4 --renderer-client-id=2 --mojo-platform-channel-handle=1736 --allow-no-sandbox-job /prefetch:13⤵PID:4792
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=01D185D7FC6DC651DE9B5B1E34252132 --mojo-platform-channel-handle=2148 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2236
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B1AC927B5CB04E488FB4B0BEAF4CAA7D --mojo-platform-channel-handle=1988 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4768
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2A339B30E3437408C6BFF15533C92683 --mojo-platform-channel-handle=2412 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:436
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=7AFC25DF1A3A004640814EAA5C8B4EB9 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=7AFC25DF1A3A004640814EAA5C8B4EB9 --renderer-client-id=8 --mojo-platform-channel-handle=2480 --allow-no-sandbox-job /prefetch:13⤵PID:4724
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD588f9e36a88f215ae633d1502081f6a2d
SHA112c7b9d96e3ec515aeaca0cc42fa5797a7a33219
SHA256cc4f6844eeab1730b508289f50d4faf4cc07003b9f3baa54c56925c539df3cde
SHA5129634e0d28caac657c957e536addba1ae9cbfb3ddaaf560a5c580346dba03f99db0eec8e2fd8426ff0b49a5e340dad36cdd6e033a9c9e89a7f5697d2dc7853a67
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5