Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1797s -
max time network
1176s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 20:33
Static task
static1
Behavioral task
behavioral1
Sample
WindowsFormsApp4.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
WindowsFormsApp4.exe
Resource
win10v2004-20240412-en
General
-
Target
WindowsFormsApp4.exe
-
Size
13KB
-
MD5
b91f900258fa7c606d0f8ebebf576690
-
SHA1
c9a141b4c3bccfd4248e9071963e726a35c817e6
-
SHA256
a6f2b8885c4afacbbbf2e26fa24642a53e9e53ea96a134abae1581df0473ef0d
-
SHA512
82a667fff3a8b79daf4084aadd9ce28c711e1896a39f9d3b6543246ad79f1c34092b2d378d9f2945f0605588fe7451491b1f54094ad0c65a47bff1b0274cd304
-
SSDEEP
384:gEQd5Ek/gLt/DLjLR9zEs1LULxLPnkOhYVMfrnuHNptYcFwVc03K:Qd+LdXhJYlPkaYQnuH/tYcFwVc6K
Malware Config
Signatures
-
Drops file in System32 directory 11 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00001.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00002.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jcp svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.log svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jtx svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSStmp.log svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.jfm svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings mspaint.exe Key created \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings mspaint.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 5032 notepad.exe -
Suspicious behavior: AddClipboardFormatListener 3 IoCs
pid Process 448 EXCEL.EXE 4336 WINWORD.EXE 4336 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4012 mspaint.exe 4012 mspaint.exe 1672 mspaint.exe 1672 mspaint.exe 1820 AcroRd32.exe 1820 AcroRd32.exe 1820 AcroRd32.exe 1820 AcroRd32.exe 1820 AcroRd32.exe 1820 AcroRd32.exe 1820 AcroRd32.exe 1820 AcroRd32.exe 1820 AcroRd32.exe 1820 AcroRd32.exe 1820 AcroRd32.exe 1820 AcroRd32.exe 1820 AcroRd32.exe 1820 AcroRd32.exe 1820 AcroRd32.exe 1820 AcroRd32.exe 1820 AcroRd32.exe 1820 AcroRd32.exe 1820 AcroRd32.exe 1820 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4912 taskmgr.exe Token: SeSystemProfilePrivilege 4912 taskmgr.exe Token: SeCreateGlobalPrivilege 4912 taskmgr.exe Token: 33 4912 taskmgr.exe Token: SeIncBasePriorityPrivilege 4912 taskmgr.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 1820 AcroRd32.exe -
Suspicious use of SendNotifyMessage 35 IoCs
pid Process 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe 4912 taskmgr.exe -
Suspicious use of SetWindowsHookEx 35 IoCs
pid Process 4012 mspaint.exe 4080 OpenWith.exe 1672 mspaint.exe 2316 OpenWith.exe 448 EXCEL.EXE 448 EXCEL.EXE 448 EXCEL.EXE 448 EXCEL.EXE 448 EXCEL.EXE 448 EXCEL.EXE 448 EXCEL.EXE 448 EXCEL.EXE 448 EXCEL.EXE 1820 AcroRd32.exe 1820 AcroRd32.exe 1820 AcroRd32.exe 1820 AcroRd32.exe 4336 WINWORD.EXE 4336 WINWORD.EXE 4336 WINWORD.EXE 4336 WINWORD.EXE 4336 WINWORD.EXE 4336 WINWORD.EXE 4336 WINWORD.EXE 4336 WINWORD.EXE 4336 WINWORD.EXE 4336 WINWORD.EXE 4336 WINWORD.EXE 4336 WINWORD.EXE 4336 WINWORD.EXE 4336 WINWORD.EXE 4336 WINWORD.EXE 4336 WINWORD.EXE 1820 AcroRd32.exe 1820 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1820 wrote to memory of 3904 1820 AcroRd32.exe 107 PID 1820 wrote to memory of 3904 1820 AcroRd32.exe 107 PID 1820 wrote to memory of 3904 1820 AcroRd32.exe 107 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 4872 3904 RdrCEF.exe 108 PID 3904 wrote to memory of 3564 3904 RdrCEF.exe 109 PID 3904 wrote to memory of 3564 3904 RdrCEF.exe 109 PID 3904 wrote to memory of 3564 3904 RdrCEF.exe 109 PID 3904 wrote to memory of 3564 3904 RdrCEF.exe 109 PID 3904 wrote to memory of 3564 3904 RdrCEF.exe 109 PID 3904 wrote to memory of 3564 3904 RdrCEF.exe 109 PID 3904 wrote to memory of 3564 3904 RdrCEF.exe 109 PID 3904 wrote to memory of 3564 3904 RdrCEF.exe 109 PID 3904 wrote to memory of 3564 3904 RdrCEF.exe 109 PID 3904 wrote to memory of 3564 3904 RdrCEF.exe 109 PID 3904 wrote to memory of 3564 3904 RdrCEF.exe 109 PID 3904 wrote to memory of 3564 3904 RdrCEF.exe 109 PID 3904 wrote to memory of 3564 3904 RdrCEF.exe 109 PID 3904 wrote to memory of 3564 3904 RdrCEF.exe 109 PID 3904 wrote to memory of 3564 3904 RdrCEF.exe 109 PID 3904 wrote to memory of 3564 3904 RdrCEF.exe 109 PID 3904 wrote to memory of 3564 3904 RdrCEF.exe 109 PID 3904 wrote to memory of 3564 3904 RdrCEF.exe 109 PID 3904 wrote to memory of 3564 3904 RdrCEF.exe 109 PID 3904 wrote to memory of 3564 3904 RdrCEF.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\WindowsFormsApp4.exe"C:\Users\Admin\AppData\Local\Temp\WindowsFormsApp4.exe"1⤵PID:4260
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4912
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\SyncAdd.png" /ForceBootstrapPaint3D1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4012
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc1⤵
- Drops file in System32 directory
PID:1300
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4080
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\SyncAdd.png" /ForceBootstrapPaint3D1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1672
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:2316
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /n "C:\Users\Admin\Desktop\DismountSkip.xltx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:448
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe" "C:\Users\Admin\Desktop\DisconnectWatch.ps1"1⤵
- Opens file in notepad (likely ransom note)
PID:5032
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Desktop\ConvertToSuspend.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A069F6FB2F2F847AFF08502813EDF938 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4872
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=3EB6DA4FDE0CFC1734282F89C9CC3337 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=3EB6DA4FDE0CFC1734282F89C9CC3337 --renderer-client-id=2 --mojo-platform-channel-handle=1764 --allow-no-sandbox-job /prefetch:13⤵PID:3564
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D1B68DC6B00A5F2EDEEE5DBA914E9AD3 --mojo-platform-channel-handle=2196 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4136
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D6AB1B8DB651B184B7AA12E69F2DF97A --mojo-platform-channel-handle=2332 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4968
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=9E854C95D8AB4E1E2F1FE071E1F352E9 --mojo-platform-channel-handle=2504 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2884
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=D82F5C284ACA657A90238F32F15409A0 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=D82F5C284ACA657A90238F32F15409A0 --renderer-client-id=8 --mojo-platform-channel-handle=2336 --allow-no-sandbox-job /prefetch:13⤵PID:3976
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1636
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Downloads\CopyUse.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4336
-
C:\Windows\System32\CScript.exe"C:\Windows\System32\CScript.exe" "C:\Users\Admin\Downloads\ConfirmPop.vbs"1⤵PID:2672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
Filesize
64KB
MD57fdb4c7c398cfc992d47d5fe9b740a49
SHA16827145877f21372cf44353fc018c018a6a5cc8c
SHA2566ca3dd00e4062dff60628d38578086fbc03e2b848ab13b845e7044387a825e99
SHA5121280c5d7f99bf1fdf4f06d13ec1fe262e413279ca6250b7286be22eaa117257065c2d9caa5a5152bed6560416cf50d8ebadecffe0728adf635ffd6f076e53704
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\802B6BE7-2C7F-4DFF-860D-334F2F2BCC8E
Filesize160KB
MD577893d5aa65e1769f06164f636d6d0da
SHA1936a44e6e8f8ef870bc5a89dd77d0d805041bf31
SHA25613ab7a61b9aa4f57a549dfe23f1c772a84a0f3e075d5a98f279591b658b4965b
SHA512307f23c6b51ffd055fa8c3eee6e9716bbc03eb3f8b1d7ace3d4298541b4a43ddf82eb2f885def289a22f6b72497087d545ed9b3124e7ab2c603c11223e0c40c6
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres
Filesize2KB
MD53c5a8f37d40794e67c6aa9c0c9297496
SHA1a1c1597c659c27f2c7623e9d89fcda7cc1888eb2
SHA2564f3fe5d53096f2023da21d8ebddd9ab8986cc03351fcf9c803ec5da21fb012a7
SHA5126d73b7f85d01995f8c10e247bc2a785c9fa6edc67d836d69fad54efa5ccbe5d4d64a73d927d2de4a69c65f40c4b6b4cfc82664bfbd304de046ab20b9718345d5
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres
Filesize2KB
MD59b7303b932eafb0fb195f9e3407981e0
SHA1c6eb0f4178d15c0250eca349edd9dc11ce643f70
SHA25683978951efc67e0acd78c374e626087b30ac8cdc302a6b44441f05aaade498e8
SHA512edf478006d08ff20daff59f66f6ed543d9cbf44ca8f7ab627a70329c63efbde4f778298985be05501e3bdd20d8b14709d01694c46cbf63172fc9bed41486842f
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810
-
Filesize
8KB
MD50b89b0a9cfa71caa1d77eb929466ab62
SHA12efd6739b25c4a8ec580f621ca1f32b2db8b59f1
SHA2569cd1aa985f780bf2c65b7a1f61555e2f630f67be413426ac06bcda3f2699cc9e
SHA51297dced3e6a0da2d14d772176cce1c61a7dd692e452638885197fe102342f48d15ad7b7daa7104338a48dcd17b97afe5e34eb11505404e0af19c3cbf96db0cdc3