Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
158s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 11:09
Static task
static1
Behavioral task
behavioral1
Sample
PDFCreator-1_7_1_setup [1].exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
PDFCreator-1_7_1_setup [1].exe
Resource
win10v2004-20240226-en
General
-
Target
PDFCreator-1_7_1_setup [1].exe
-
Size
17.0MB
-
MD5
2b0cbab7d9dbb405421f2397967d021c
-
SHA1
9434866971dd357600c9f2b1e31b7893c3a070f0
-
SHA256
1024b5fa915768f1b8d83eea9be01dcd664401b8c4732223733f2bc2689c78d5
-
SHA512
423d7656799a96033f336cadcbb70ca52dacd22fe23fb41197105011809e89aaaec9a9f38fa007cf4091debc3c83e54347bd02f8d3ca4d18df39ee48a7823e88
-
SSDEEP
393216:6D7co9AY9qIV0vZas83lfwu9GI7tmbL7aGe1Vsn:6D7coWIPs83lfDGXraG2Vsn
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation PDFCreator-1_7_1_setup [1].tmp -
Executes dropped EXE 3 IoCs
pid Process 3124 PDFCreator-1_7_1_setup [1].tmp 3652 DownloadUpdateInfo.exe 4452 DownloadUpdateInfo.tmp -
Loads dropped DLL 7 IoCs
pid Process 3124 PDFCreator-1_7_1_setup [1].tmp 3124 PDFCreator-1_7_1_setup [1].tmp 4452 DownloadUpdateInfo.tmp 4452 DownloadUpdateInfo.tmp 3124 PDFCreator-1_7_1_setup [1].tmp 4060 RunDll32.exe 2060 RunDll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4060 RunDll32.exe 4060 RunDll32.exe 2060 RunDll32.exe 2060 RunDll32.exe 4060 RunDll32.exe 4060 RunDll32.exe 2060 RunDll32.exe 2060 RunDll32.exe 4060 RunDll32.exe 4060 RunDll32.exe 2060 RunDll32.exe 2060 RunDll32.exe 4060 RunDll32.exe 4060 RunDll32.exe 2060 RunDll32.exe 2060 RunDll32.exe 4060 RunDll32.exe 4060 RunDll32.exe 2060 RunDll32.exe 2060 RunDll32.exe 4060 RunDll32.exe 4060 RunDll32.exe 2060 RunDll32.exe 2060 RunDll32.exe 4060 RunDll32.exe 4060 RunDll32.exe 2060 RunDll32.exe 2060 RunDll32.exe 4060 RunDll32.exe 4060 RunDll32.exe 2060 RunDll32.exe 2060 RunDll32.exe 4060 RunDll32.exe 4060 RunDll32.exe 2060 RunDll32.exe 2060 RunDll32.exe 4060 RunDll32.exe 4060 RunDll32.exe 2060 RunDll32.exe 2060 RunDll32.exe 4060 RunDll32.exe 4060 RunDll32.exe 2060 RunDll32.exe 2060 RunDll32.exe 4060 RunDll32.exe 4060 RunDll32.exe 2060 RunDll32.exe 2060 RunDll32.exe 4060 RunDll32.exe 4060 RunDll32.exe 2060 RunDll32.exe 2060 RunDll32.exe 4060 RunDll32.exe 4060 RunDll32.exe 2060 RunDll32.exe 2060 RunDll32.exe 4060 RunDll32.exe 4060 RunDll32.exe 2060 RunDll32.exe 2060 RunDll32.exe 4060 RunDll32.exe 4060 RunDll32.exe 2060 RunDll32.exe 2060 RunDll32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 648 wrote to memory of 3124 648 PDFCreator-1_7_1_setup [1].exe 91 PID 648 wrote to memory of 3124 648 PDFCreator-1_7_1_setup [1].exe 91 PID 648 wrote to memory of 3124 648 PDFCreator-1_7_1_setup [1].exe 91 PID 3124 wrote to memory of 3652 3124 PDFCreator-1_7_1_setup [1].tmp 92 PID 3124 wrote to memory of 3652 3124 PDFCreator-1_7_1_setup [1].tmp 92 PID 3124 wrote to memory of 3652 3124 PDFCreator-1_7_1_setup [1].tmp 92 PID 3652 wrote to memory of 4452 3652 DownloadUpdateInfo.exe 93 PID 3652 wrote to memory of 4452 3652 DownloadUpdateInfo.exe 93 PID 3652 wrote to memory of 4452 3652 DownloadUpdateInfo.exe 93 PID 3124 wrote to memory of 4060 3124 PDFCreator-1_7_1_setup [1].tmp 103 PID 3124 wrote to memory of 4060 3124 PDFCreator-1_7_1_setup [1].tmp 103 PID 3124 wrote to memory of 4060 3124 PDFCreator-1_7_1_setup [1].tmp 103 PID 3124 wrote to memory of 2060 3124 PDFCreator-1_7_1_setup [1].tmp 104 PID 3124 wrote to memory of 2060 3124 PDFCreator-1_7_1_setup [1].tmp 104 PID 3124 wrote to memory of 2060 3124 PDFCreator-1_7_1_setup [1].tmp 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\PDFCreator-1_7_1_setup [1].exe"C:\Users\Admin\AppData\Local\Temp\PDFCreator-1_7_1_setup [1].exe"1⤵
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Users\Admin\AppData\Local\Temp\is-HHN2K.tmp\PDFCreator-1_7_1_setup [1].tmp"C:\Users\Admin\AppData\Local\Temp\is-HHN2K.tmp\PDFCreator-1_7_1_setup [1].tmp" /SL5="$5017E,17272099,56832,C:\Users\Admin\AppData\Local\Temp\PDFCreator-1_7_1_setup [1].exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\is-VUBML.tmp\DownloadUpdateInfo.exe"C:\Users\Admin\AppData\Local\Temp\is-VUBML.tmp\DownloadUpdateInfo.exe" /verysilent /URL=http://update.pdfforge.org/pdfcreator/update-info.txt /Filename="C:\Users\Admin\AppData\Local\Temp\is-VUBML.tmp\update-info.txt" /TimeOut=70003⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\is-RC6V1.tmp\DownloadUpdateInfo.tmp"C:\Users\Admin\AppData\Local\Temp\is-RC6V1.tmp\DownloadUpdateInfo.tmp" /SL5="$7017C,262148,56832,C:\Users\Admin\AppData\Local\Temp\is-VUBML.tmp\DownloadUpdateInfo.exe" /verysilent /URL=http://update.pdfforge.org/pdfcreator/update-info.txt /Filename="C:\Users\Admin\AppData\Local\Temp\is-VUBML.tmp\update-info.txt" /TimeOut=70004⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4452
-
-
-
C:\Windows\SysWOW64\RunDll32.exeRunDll32.exe "C:\Users\Admin\AppData\Local\Temp\is-VUBML.tmp\OCSetupHlp.dll",_OCPRD68OpenCandy2@16 3124,13A173C1033D459ABA86BA9F618F5104,64BF9390D5F949BFA24106A53A90D7F93⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4060
-
-
C:\Windows\SysWOW64\RunDll32.exeRunDll32.exe "C:\Users\Admin\AppData\Local\Temp\is-VUBML.tmp\OCSetupHlp.dll",_OCPRD68OpenCandy2@16 3124,23D423C0C3404210AA239BFA891EFD82,485DF1FC6B004FBFA954BD9BB9C7B3AF3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2060
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4068 --field-trial-handle=2256,i,6670388345726423024,18382795228658886258,262144 --variations-seed-version /prefetch:81⤵PID:3740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
690KB
MD5a2c4d52c66b4b399facadb8cc8386745
SHA1c326304c56a52a3e5bfbdce2fef54604a0c653e0
SHA2566c0465ce64c07e729c399a338705941d77727c7d089430957df3e91a416e9d2a
SHA5122a66256ff8535e2b300aa0ca27b76e85d42422b0aaf5e7e6d055f7abb9e338929c979e185c6be8918d920fb134b7f28a76b714579cacb8ace09000c046dd34d6
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
501KB
MD5b63e279da8d345f8d4cfd6ec83cacc90
SHA1342527cdef8bb1ba44baa3c26ae10d5cb573b3fb
SHA25600afc88cf2db1260aed13fa928630bea4ac82788e1ae6abd26168349940b77ed
SHA512320819aedd2b71b4bfb40b9d3d49381de2a99413b89db0ee6429f2c31dd1d7fa0d2a639380bd4faa20556b9818299933429ccd7d2d118ea7f8c2658bd4072115
-
Filesize
788KB
MD5ba9e5cf333329a7384ab31452c8f0b2a
SHA16dc0348d61f92f224e23f31dcbc4d78003e6f205
SHA256549ede6c031a255d595b66b5b784a6fccfbe128933a165a2e9a292f5f4fd7068
SHA512dd2a02b397c0ac92f09f83771ed6b9db482bbcc197e17f5c9c6e6b621364a5032643cbeb53fe7541b38dbfb492407375c94001dff28423272a9e32c2016ae306
-
Filesize
123KB
MD5ebd5aedf84bada7df017f3d112d16aec
SHA1f42f705ae59d1d6eeecc0ce7875151c410746e5c
SHA256bd1c1e0f09961b063143cc13c1e1fda72b9474d2bf9e5b1e94ea09d6a228b118
SHA512d53f068db77eabda54dc0034e52aef727ccfad2ecd5e6f56725bb31a3bce0d9627150eff4798d6f7f3c82f5213a8be9550b988e95a36f684522ff89d8521a08f
-
Filesize
200KB
MD5d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df