Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
13s -
max time network
18s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2023, 00:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.pdflabs.com/tools/pdftk-the-pdf-toolkit/pdftk_free-2.02-win-setup.exe
Resource
win10v2004-20230703-en
General
-
Target
https://www.pdflabs.com/tools/pdftk-the-pdf-toolkit/pdftk_free-2.02-win-setup.exe
Malware Config
Signatures
-
Downloads MZ/PE file
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133332489929609377" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3384 chrome.exe 3384 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3384 chrome.exe 3384 chrome.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe -
Suspicious use of FindShellTrayWindow 39 IoCs
pid Process 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3384 wrote to memory of 4656 3384 chrome.exe 46 PID 3384 wrote to memory of 4656 3384 chrome.exe 46 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3352 3384 chrome.exe 87 PID 3384 wrote to memory of 3568 3384 chrome.exe 88 PID 3384 wrote to memory of 3568 3384 chrome.exe 88 PID 3384 wrote to memory of 4952 3384 chrome.exe 89 PID 3384 wrote to memory of 4952 3384 chrome.exe 89 PID 3384 wrote to memory of 4952 3384 chrome.exe 89 PID 3384 wrote to memory of 4952 3384 chrome.exe 89 PID 3384 wrote to memory of 4952 3384 chrome.exe 89 PID 3384 wrote to memory of 4952 3384 chrome.exe 89 PID 3384 wrote to memory of 4952 3384 chrome.exe 89 PID 3384 wrote to memory of 4952 3384 chrome.exe 89 PID 3384 wrote to memory of 4952 3384 chrome.exe 89 PID 3384 wrote to memory of 4952 3384 chrome.exe 89 PID 3384 wrote to memory of 4952 3384 chrome.exe 89 PID 3384 wrote to memory of 4952 3384 chrome.exe 89 PID 3384 wrote to memory of 4952 3384 chrome.exe 89 PID 3384 wrote to memory of 4952 3384 chrome.exe 89 PID 3384 wrote to memory of 4952 3384 chrome.exe 89 PID 3384 wrote to memory of 4952 3384 chrome.exe 89 PID 3384 wrote to memory of 4952 3384 chrome.exe 89 PID 3384 wrote to memory of 4952 3384 chrome.exe 89 PID 3384 wrote to memory of 4952 3384 chrome.exe 89 PID 3384 wrote to memory of 4952 3384 chrome.exe 89 PID 3384 wrote to memory of 4952 3384 chrome.exe 89 PID 3384 wrote to memory of 4952 3384 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://www.pdflabs.com/tools/pdftk-the-pdf-toolkit/pdftk_free-2.02-win-setup.exe1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd32bd9758,0x7ffd32bd9768,0x7ffd32bd97782⤵PID:4656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1756 --field-trial-handle=1900,i,11763001157557188379,9704845081159284425,131072 /prefetch:22⤵PID:3352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2032 --field-trial-handle=1900,i,11763001157557188379,9704845081159284425,131072 /prefetch:82⤵PID:3568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1900,i,11763001157557188379,9704845081159284425,131072 /prefetch:82⤵PID:4952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2984 --field-trial-handle=1900,i,11763001157557188379,9704845081159284425,131072 /prefetch:12⤵PID:4416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3016 --field-trial-handle=1900,i,11763001157557188379,9704845081159284425,131072 /prefetch:12⤵PID:4264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4852 --field-trial-handle=1900,i,11763001157557188379,9704845081159284425,131072 /prefetch:82⤵PID:4976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4884 --field-trial-handle=1900,i,11763001157557188379,9704845081159284425,131072 /prefetch:82⤵PID:932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5172 --field-trial-handle=1900,i,11763001157557188379,9704845081159284425,131072 /prefetch:82⤵PID:396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 --field-trial-handle=1900,i,11763001157557188379,9704845081159284425,131072 /prefetch:82⤵PID:4464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 --field-trial-handle=1900,i,11763001157557188379,9704845081159284425,131072 /prefetch:82⤵PID:4660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4744 --field-trial-handle=1900,i,11763001157557188379,9704845081159284425,131072 /prefetch:82⤵PID:4680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5384 --field-trial-handle=1900,i,11763001157557188379,9704845081159284425,131072 /prefetch:82⤵PID:1540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5140 --field-trial-handle=1900,i,11763001157557188379,9704845081159284425,131072 /prefetch:82⤵PID:3776
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2668
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5526253f612546599e8fb8cd7ff766f49
SHA1b87ec257cd7d5ed8acb2c23fef0bb4850814b4bb
SHA256f2d591d452b923639e4b670f4e46b8c65905d4e3197f9cece67a2d3cd1965bc2
SHA512c60c2ce8397cd8b5abef7832a4282f3549ee0f110a25506e78d4408897186b22f1b44e17afa11289c44dd3550fb769aa7476f5ca01cbdcccd828956def6ad071
-
Filesize
15KB
MD565189a673dc8987a95dfd12867cdb4c8
SHA12ba9ff0180c595104a8c30fb00928e23c025ccb0
SHA25657fd777217b4f78aeca7a954a9ab67a7521e213a6983a546a52b359c77410d64
SHA512a48f318b5c3ba14bece554eac500ea8f8978ee86a52e84924e1dc6f5c498ac587c329bc4e3fba5832c3a786726c6929b1483da7689f30ff8b986988e71245f1f
-
Filesize
172KB
MD5c3f6f9589998ded22717bd381ac31ebc
SHA1aab7ac962f73fb75b730b8b2ea387ffd1cd3dc77
SHA256b7684e40869147e796187176f7281c0237879dc06659eee554ca7f7e2598dd9e
SHA512ce1adb12210e88cb29f7ad41265389e6a5c29556d344d7a9a52bf34c6b2e31603a59710c9d5b23a4f757362e67ddcc5d2c7d75e38e53f75b1695cdfb0d3156dd
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
3.5MB
MD5a989bc6260363205a7d13a5dedd8594c
SHA1b96937b422970f1f8c3c8413929ebad3e6e747fd
SHA2566d9cd2cbdff1b00a1c6c84335dcf1199ad65519cfa782c3a631c32b1144eb4c9
SHA5124704de01781abce4421f86f68ce7c825c5acb96b69a2520caaa8cc5b12f7fcadc85917d81b22a301aff54eed5acf114dd9818c5f91c5e4e859824c874d2c560d