Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
195s -
max time network
215s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 17:11
Static task
static1
Behavioral task
behavioral1
Sample
SOA pdf.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
SOA pdf.exe
Resource
win10v2004-20230915-en
General
-
Target
SOA pdf.exe
-
Size
730KB
-
MD5
5b111640fcb0a5d04cb799078fe90bad
-
SHA1
80870524c77d40a9711a8c120bac5f27957617ec
-
SHA256
a0a83c6bc77fa73e06bc77a6bdd2e7d3b84319cff7f009d7f6ccc7fca5c48820
-
SHA512
c21cd618ab2050a65425e9c7f50bf3c449f63f37a8ba804f934188cad2f7afb99a0e89fbbd75013f19e59852b91051b34a08e35b6b3be69263c0a56e8d76bb32
-
SSDEEP
12288:o4X9K94CKeimRxlZSbr2Y7BSP93oxIUhB4+XWKXWBhO:o4tMHKiRxHSv97O3RaG+XFGD
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation SOA pdf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5108 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 4812 SOA pdf.exe 4812 SOA pdf.exe 4812 SOA pdf.exe 4812 SOA pdf.exe 4812 SOA pdf.exe 4812 SOA pdf.exe 4812 SOA pdf.exe 4812 SOA pdf.exe 4812 SOA pdf.exe 4812 SOA pdf.exe 4812 SOA pdf.exe 4812 SOA pdf.exe 4812 SOA pdf.exe 4812 SOA pdf.exe 4812 SOA pdf.exe 4812 SOA pdf.exe 4812 SOA pdf.exe 4812 SOA pdf.exe 4812 SOA pdf.exe 4812 SOA pdf.exe 4812 SOA pdf.exe 4812 SOA pdf.exe 4812 SOA pdf.exe 4812 SOA pdf.exe 4812 SOA pdf.exe 4812 SOA pdf.exe 4812 SOA pdf.exe 4812 SOA pdf.exe 4812 SOA pdf.exe 4812 SOA pdf.exe 4812 SOA pdf.exe 4812 SOA pdf.exe 4812 SOA pdf.exe 4812 SOA pdf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4812 SOA pdf.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4812 wrote to memory of 3304 4812 SOA pdf.exe 99 PID 4812 wrote to memory of 3304 4812 SOA pdf.exe 99 PID 4812 wrote to memory of 3304 4812 SOA pdf.exe 99 PID 4812 wrote to memory of 512 4812 SOA pdf.exe 101 PID 4812 wrote to memory of 512 4812 SOA pdf.exe 101 PID 4812 wrote to memory of 512 4812 SOA pdf.exe 101 PID 4812 wrote to memory of 5108 4812 SOA pdf.exe 103 PID 4812 wrote to memory of 5108 4812 SOA pdf.exe 103 PID 4812 wrote to memory of 5108 4812 SOA pdf.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\SOA pdf.exe"C:\Users\Admin\AppData\Local\Temp\SOA pdf.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\SOA pdf.exe"2⤵PID:3304
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\BckFJZpCIyCP.exe"2⤵PID:512
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BckFJZpCIyCP" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC787.tmp"2⤵
- Creates scheduled task(s)
PID:5108
-