Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
13s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 04:34
Static task
static1
Behavioral task
behavioral1
Sample
PdfFactory.Pro.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
PdfFactory.Pro.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
新云软件.url
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
新云软件.url
Resource
win10v2004-20231222-en
General
-
Target
PdfFactory.Pro.exe
-
Size
1.7MB
-
MD5
d4a23c2e0aa8aa0bfae582a5c4d498d4
-
SHA1
9e3fe73900dae0292fd45f179f1c3555bab36667
-
SHA256
5e186433f8dca1e68a791d9bfdb039711fb6df7af51e6405ecc64b00d1ed4591
-
SHA512
5fb0c52656f8f6c516d170eb2395531960f57a5f1882f6e2337f61bde21c0d34b6e99f218f70f957bae27497d71f521b6cc0102d16ce4ca72a2e4aae1c79480e
-
SSDEEP
49152:mklHgDdD+IEVFA5KhmmSxDqg2ZHpttf27Drvu:xHgMVS5KMmSMttgrvu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2716 setup.exe -
Loads dropped DLL 2 IoCs
pid Process 1040 PdfFactory.Pro.exe 2716 setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2716 setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1040 wrote to memory of 2716 1040 PdfFactory.Pro.exe 24 PID 1040 wrote to memory of 2716 1040 PdfFactory.Pro.exe 24 PID 1040 wrote to memory of 2716 1040 PdfFactory.Pro.exe 24 PID 1040 wrote to memory of 2716 1040 PdfFactory.Pro.exe 24 PID 1040 wrote to memory of 2716 1040 PdfFactory.Pro.exe 24 PID 1040 wrote to memory of 2716 1040 PdfFactory.Pro.exe 24 PID 1040 wrote to memory of 2716 1040 PdfFactory.Pro.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\PdfFactory.Pro.exe"C:\Users\Admin\AppData\Local\Temp\PdfFactory.Pro.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2716
-