Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    112s
  • max time network
    63s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/06/2024, 14:43

General

  • Target

    PDFTool-v3.2.1233.0_49726896.msi

  • Size

    5.0MB

  • MD5

    615be873a5ff5041d9d376f1b28b0695

  • SHA1

    1cb3dfca3a92af9e6beab6c38ee47dc32203f5c2

  • SHA256

    0dbc1c15cefbcd850388cc9a31b690cc1254b9e724f9cd8cd9165e775df48307

  • SHA512

    8917d6787772c751b4aa876dfdc66975fcd8b10705fca38f5f266c06b5000ae2f5050fb2a0dbc0942cb4d3153f616a3f7ddee8ad48a05065d61a3770f6b94842

  • SSDEEP

    98304:AVHYDgFZyclJ6PcGJfEa24Njxk6HgDxR0GStY:UNZyIc39NxbQUY

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 17 IoCs
  • Loads dropped DLL 18 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\PDFTool-v3.2.1233.0_49726896.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4876
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:216
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding DF528DB1821459AFDE7B3CD59CC1C701 C
      2⤵
      • Loads dropped DLL
      PID:4352
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:4592
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 23A0C99676B03214A49CBA48EB31FA3A
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:404
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss45B2.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi459F.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr45A0.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr45A1.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          PID:2760
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:4644

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\PDFTool\PDFTool.exe

      Filesize

      277KB

      MD5

      31a3144c2154a5137422f9f018e2de06

      SHA1

      4c6af7b92e4062974af4db8eac7dbd812f72c983

      SHA256

      3d07d9f947a4d07352103fffbf6c6ed66f8d41de6b2ece1b4a2a113e87fcc8ab

      SHA512

      1f0b63e77678b9753d54ef43cb2d40ca04a840eed408958ed18fb66c803bea75443c223695377c11c88075b841128d7737536a446cff811ab767efb1a8c2d7b7

    • C:\Users\Admin\AppData\Local\Temp\MSID179.tmp

      Filesize

      738KB

      MD5

      d0c9613582605f3793fdad7279de428b

      SHA1

      8b3e9fb67c7beb20706544d360ee13c3aad9c1d1

      SHA256

      8bd84f1156ebdfa44afaac8a4579ba56a8c7513e3d51e00822167ea144923726

      SHA512

      3640a0f53730cad7323473f99a2049833db58eaed00f94b75b4a03b07cc8af99c104a40b2e888307055a5c9740b5fea4b394aa15bc78a3102088cc0770713eac

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vrads1l0.3bm.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\pss45B2.ps1

      Filesize

      36KB

      MD5

      bfac0695520c0824840502a88a20de0c

      SHA1

      843b21eae00277c64103596b9f2595a3bb8762a2

      SHA256

      bc4844032415d82e85b7318f8187f263e4fed9c01c68e57dc3e811513673735f

      SHA512

      c16b08f965547c30c4a11cc69671a179cb7830d44a983b235d07b45a6ddf7d505c9a1fda5e1fdfaed612b111626aa1b0c1c929e571c61467b183bce3e39fdbf3

    • C:\Users\Admin\AppData\Local\Temp\scr45A0.ps1

      Filesize

      31KB

      MD5

      8511c8ce7b9bad3982403ec94b976f63

      SHA1

      ce68fbe8d0a1566d3a892a6b644c0993e9018341

      SHA256

      094589f1fdfefaf3dd902a9e2d58043c53390cac7a39b2ed89232d6149d31168

      SHA512

      3f57f8386ede57791070977cde06bbad9da69ac60672447f475f0ccffa2dbb0c95402c00c2857419cd0cfb0550cdfe1f54c1b559e98236cf3a0156b418584fb8

    • C:\Users\Admin\AppData\Local\Temp\scr45A1.txt

      Filesize

      242B

      MD5

      1ebd3184768ce3b6d6cbbcd95ccebc95

      SHA1

      d648223a2014847bec7155e7921a04bed9c882bf

      SHA256

      94283c1913c912ca0af921dd19a3dd8d3ae1e9fbf63ee367bd96f329cb91f962

      SHA512

      1dbed74eb53f229d5dc19727241170e5decc60215880e8802f60bcdb11c1842951ead5414f5f82612ec54f222773fb3c2eeb1fae4fe0077f133cf22ed09af538

    • C:\Windows\Installer\MSI4419.tmp

      Filesize

      759KB

      MD5

      a2317ebf66616e3b13218b2b9739cf74

      SHA1

      9fbdf90fb9d2bc93f025c16c94347eb817908d9d

      SHA256

      d6a3c9c614fa4491a1bd988d86687515e15edf7e0cfde2159d0850bf2c5c7c89

      SHA512

      8d11a2174e3ac7eefc776ff3d95ac65517c4af78f2880b84c6ce1ed65990e769cdbd5cc3d5755cc0dd9fc69a7c2408b32dde6205503f9a67ec96008c87b1f2e3

    • C:\Windows\Installer\MSI5266.tmp

      Filesize

      512KB

      MD5

      d1395cc27fabb23ff098c0954b7725a7

      SHA1

      b782d01c84471849d92e130e5af448de8040bd58

      SHA256

      a2f7155c0ce5e3c69fdcff6d89df011a6d4715eae2853104f2480800d63eb69e

      SHA512

      a5c531d4cb099e91a498dd738804eaf8f47573bb802d15bc550c438ca117ea61258cc886ede7b91f83b9570f73f3bd3c08718819868a1e92249fcb3d5bcdb914

    • C:\Windows\Installer\MSI52B5.tmp

      Filesize

      757KB

      MD5

      5a72f5f620d7363c21dac3c062225203

      SHA1

      e083f31c15020d54e42103099dc240be4cbb7430

      SHA256

      b312faf20d72a4e44be87530beb446298c85fef73c79130c6d13aae6720f585c

      SHA512

      c742314859a75672f8e049ef52db54e48d34b48b9ee6c6e8677ae376d6f0aef6589ffdce90b37c9f8b987ea35d2ec42a07937ce0ba05f3158bf0c79a4f0db987

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      23.7MB

      MD5

      c317f018a1105dd1faa42256d1b84e51

      SHA1

      7b8c3ae126414979f84543da7da19c04841258fe

      SHA256

      e809ebd81ec281d598f0433a62f87ef11473bd5102dd935df28deb39ae0ad106

      SHA512

      b6b54c37c4237fa4921d5f6af3d95f35507479fddda6f61ee9b4454bc478954c3a38b4b9966f399eee2852ee0e3071a928a831bb44fab738afe23641217f1499

    • \??\Volume{a968b372-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{dba5b919-59b1-4485-88df-9512a52644ce}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      94dad547a4978cbbba36328236eb9e1d

      SHA1

      da73e6b16789d8f7e1ddce57e8929fc41645eb2e

      SHA256

      a4521f7f655370df2aa9ccec37239dbd53070a31bb0ad6c24bdaa47cc94759e0

      SHA512

      3267f9de03bf0a2ce5e380a19a5c774e7f3bc771675442778d38a5e3bd6e3dc5322ec1707980adf7aa71f69d084281ee8e75cbcbf07b0dcd43d86b70095277e9

    • memory/2760-64-0x0000000005B00000-0x0000000005B4C000-memory.dmp

      Filesize

      304KB

    • memory/2760-70-0x0000000007AC0000-0x0000000008064000-memory.dmp

      Filesize

      5.6MB

    • memory/2760-62-0x00000000054F0000-0x0000000005844000-memory.dmp

      Filesize

      3.3MB

    • memory/2760-66-0x0000000007440000-0x0000000007ABA000-memory.dmp

      Filesize

      6.5MB

    • memory/2760-67-0x0000000006030000-0x000000000604A000-memory.dmp

      Filesize

      104KB

    • memory/2760-69-0x00000000060C0000-0x00000000060E2000-memory.dmp

      Filesize

      136KB

    • memory/2760-68-0x0000000006DC0000-0x0000000006E56000-memory.dmp

      Filesize

      600KB

    • memory/2760-63-0x0000000005AC0000-0x0000000005ADE000-memory.dmp

      Filesize

      120KB

    • memory/2760-52-0x0000000005480000-0x00000000054E6000-memory.dmp

      Filesize

      408KB

    • memory/2760-51-0x0000000005410000-0x0000000005476000-memory.dmp

      Filesize

      408KB

    • memory/2760-73-0x0000000007170000-0x0000000007332000-memory.dmp

      Filesize

      1.8MB

    • memory/2760-74-0x00000000085A0000-0x0000000008ACC000-memory.dmp

      Filesize

      5.2MB

    • memory/2760-75-0x0000000007080000-0x0000000007112000-memory.dmp

      Filesize

      584KB

    • memory/2760-50-0x0000000004B10000-0x0000000004B32000-memory.dmp

      Filesize

      136KB

    • memory/2760-49-0x0000000004D30000-0x0000000005358000-memory.dmp

      Filesize

      6.2MB

    • memory/2760-48-0x0000000002540000-0x0000000002576000-memory.dmp

      Filesize

      216KB