Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
46s -
max time network
73s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
28/05/2024, 09:05
Static task
static1
Behavioral task
behavioral1
Sample
WS.PDFelement.Pro.8.3.8.1253/Host block.bat
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
WS.PDFelement.Pro.8.3.8.1253/WS.PDFelement.OCR.Plugin/OCR Plugin.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
WS.PDFelement.Pro.8.3.8.1253/pdfelement-pro_full5239.exe
Resource
win10-20240404-en
General
-
Target
WS.PDFelement.Pro.8.3.8.1253/Host block.bat
-
Size
806B
-
MD5
d801e5069a659e36988d8f588881dcb2
-
SHA1
779a60b23b61e38254f5dd327c083fe496af584b
-
SHA256
0daf0b725157e48e6ee9e284c9c3572c9e5b65542676c03fc6d46a665346c474
-
SHA512
215d85ff66921b46bf2394e45937de69f71b23c187eb69ff02b2617bef119fc7848b6c3790e13d88a8c4a66e82271754541670cb291876ca00473fca4b510df9
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts attrib.exe File opened for modification C:\Windows\system32\drivers\etc\hosts cmd.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2820 netsh.exe 3824 netsh.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 2672 takeown.exe 216 icacls.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 2672 takeown.exe 216 icacls.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3604 timeout.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4640 wrote to memory of 1632 4640 cmd.exe 75 PID 4640 wrote to memory of 1632 4640 cmd.exe 75 PID 4640 wrote to memory of 2820 4640 cmd.exe 76 PID 4640 wrote to memory of 2820 4640 cmd.exe 76 PID 4640 wrote to memory of 3824 4640 cmd.exe 77 PID 4640 wrote to memory of 3824 4640 cmd.exe 77 PID 4640 wrote to memory of 2672 4640 cmd.exe 78 PID 4640 wrote to memory of 2672 4640 cmd.exe 78 PID 4640 wrote to memory of 204 4640 cmd.exe 79 PID 4640 wrote to memory of 204 4640 cmd.exe 79 PID 4640 wrote to memory of 216 4640 cmd.exe 80 PID 4640 wrote to memory of 216 4640 cmd.exe 80 PID 4640 wrote to memory of 3716 4640 cmd.exe 81 PID 4640 wrote to memory of 3716 4640 cmd.exe 81 PID 4640 wrote to memory of 520 4640 cmd.exe 82 PID 4640 wrote to memory of 520 4640 cmd.exe 82 PID 4640 wrote to memory of 3604 4640 cmd.exe 83 PID 4640 wrote to memory of 3604 4640 cmd.exe 83 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3716 attrib.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\WS.PDFelement.Pro.8.3.8.1253\Host block.bat"1⤵
- Drops file in Drivers directory
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\system32\reg.exeREG QUERY "HKU\S-1-5-19"2⤵PID:1632
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="PDFelement" dir=in action=block program="C:\Users\Admin\AppData\Local\Temp\WS.PDFelement.Pro.8.3.8.1253\PDFelement.exe"2⤵
- Modifies Windows Firewall
PID:2820
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall set rule name="PDFelement" new enable=yes2⤵
- Modifies Windows Firewall
PID:3824
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\Windows\System32\drivers\etc\hosts" /a2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2672
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"2⤵PID:204
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\system32\drivers\etc\hosts /c /grant "administrators:F"2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:216
-
-
C:\Windows\system32\attrib.exeattrib -h -r -s C:\Windows\system32\drivers\etc\hosts2⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:3716
-
-
C:\Windows\system32\find.exeFIND /C /I "127.0.0.1 account.wondershare.com" C:\Windows\system32\drivers\etc\hosts2⤵PID:520
-
-
C:\Windows\system32\timeout.exeTIMEOUT /t 22⤵
- Delays execution with timeout.exe
PID:3604
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s fdPHost1⤵PID:504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
980B
MD5676acd944d70c6fa179d7d62939fee11
SHA16e657ac2df70a9c3c59ba68920f973f999af8af2
SHA2564014edc60be6c2f6aa3bfb22450634e67feb7975c74358de6511e719380e2a2b
SHA512031d0830f0c9597e36135f13ba66628e8299874fd21c56193db5a4e63256b9d5e2d073048fc8ff8559f1b40909b99315bc3307a3acf09283f9239111af586112