Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2024, 04:34
Static task
static1
Behavioral task
behavioral1
Sample
PdfFactory.Pro.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
PdfFactory.Pro.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
新云软件.url
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
新云软件.url
Resource
win10v2004-20231222-en
General
-
Target
PdfFactory.Pro.exe
-
Size
1.7MB
-
MD5
d4a23c2e0aa8aa0bfae582a5c4d498d4
-
SHA1
9e3fe73900dae0292fd45f179f1c3555bab36667
-
SHA256
5e186433f8dca1e68a791d9bfdb039711fb6df7af51e6405ecc64b00d1ed4591
-
SHA512
5fb0c52656f8f6c516d170eb2395531960f57a5f1882f6e2337f61bde21c0d34b6e99f218f70f957bae27497d71f521b6cc0102d16ce4ca72a2e4aae1c79480e
-
SSDEEP
49152:mklHgDdD+IEVFA5KhmmSxDqg2ZHpttf27Drvu:xHgMVS5KMmSMttgrvu
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation PdfFactory.Pro.exe -
Executes dropped EXE 1 IoCs
pid Process 3584 setup.exe -
Loads dropped DLL 1 IoCs
pid Process 3584 setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3584 setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3372 wrote to memory of 3584 3372 PdfFactory.Pro.exe 92 PID 3372 wrote to memory of 3584 3372 PdfFactory.Pro.exe 92 PID 3372 wrote to memory of 3584 3372 PdfFactory.Pro.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\PdfFactory.Pro.exe"C:\Users\Admin\AppData\Local\Temp\PdfFactory.Pro.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD510a2de27bbc82fa52323f2bce90742e5
SHA13bc6676df16a5483dcee235a83821a4898f33194
SHA2565264fa82ca8ecc28cecde41b8d9074723ae07927d59b5ec2ed982dab3d24628a
SHA512ad659154bcf4848ea5a7100fae483475fec2b6f92e904b8bda1d89bb6c9870a628889518bbe57bf766f3a01219321764b3bd34d22639c7827e9dc1b222d34052
-
Filesize
107KB
MD56fbadeb0181ec78859cddd8f1027dc64
SHA13455f5027300678ba75332477c228f6c75bbcdf8
SHA256ad634f91174f70f250391a7d275b963f35aec81927cfd5540e2ff88b4ecbb505
SHA512b99c92d176db97466314503f48092e7ddbddf926a3bf5a6ca682c546a7f935f8ae9b2099467d5e83a01600492fb271dd7352adea901771e03a42fc3bfaf05dae
-
Filesize
18KB
MD57f5fcf83e30ee10c208c953d08c51746
SHA1c1b42e719e61d75cbb94d5923703b847468504ef
SHA256968f94bb3baed8e96c51210553f1162c94b002c195345f4842d0916163f82c58
SHA5121c0daa3730cb1a964cd459c5be24382d17847dca5ceea2af1ea4fbbb8aa86b99d45ed99eb2f8ed854ce51d4b91cfbe5571c6a492f444f0d3d739227ccc1e83db
-
Filesize
51KB
MD55f67ecfafdffe6ba710165d3d6a6937a
SHA1e2bfbdbe22116908e0d65e801f3a0dd089d294bf
SHA25619dd93e02c89e2e459011175f47b0f213bdbb6864299c26512542af12999f9e4
SHA51254b8b53cd8fc3b5981ab74709f5482ed164687c42604edec2123279d9052523b1c4757b9383b31d46ae20a39ea4ee6e5d8cc57c42ad7130012ec8fe5c67c591f
-
Filesize
186KB
MD59bf77bf3ae0d60146ebe83f0732a8bb5
SHA137df238293ff742bdf160fc7bb02304c19e980aa
SHA256bfad157a48ccf692dc93d45e860fb89af82fb8eaf23d40eb4a5bc0a63869c989
SHA5125b98d4cf33e040dd2365eefa0ebbc49cf60c3917c53e24f40c44c6d43a962a7d4bb20ec06902b12c97b45f2bc32317b52d9454e0825697501e2cbdec8e2e687c