Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24/07/2024, 08:09

General

  • Target

    SCPDF3/SolidConverterPDF.exe

  • Size

    137KB

  • MD5

    c5196c370e0b958da813da05fb648d3a

  • SHA1

    a46bda006c01578ee66394401e04ee392081e52a

  • SHA256

    45955f890d6bece9ee665f8b8c00040f3f77f3b02fa97fdac1994b74f22fbd3a

  • SHA512

    7360cb378f3d16465b24bea3f72ffda8d301ff6ae11c4a8fba4947f5bb47206d0a0c670144cb4eb04cc703811a8b550fab87d92569ed4e9f0b29cd90fe3899c8

  • SSDEEP

    3072:FGb6Ec1+HekoGdzRmVmnS6k7RoW35Z0ggB:iT5HekL8us5Z0gW

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SCPDF3\SolidConverterPDF.exe
    "C:\Users\Admin\AppData\Local\Temp\SCPDF3\SolidConverterPDF.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2928
  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\SolidDocuments\SolidConverterPDF\TMP7ACC.tmp

    Filesize

    20KB

    MD5

    517d504097864acea5f313dbe75cf45c

    SHA1

    5b20980640c5b392fbb8eacc400f1c62b97944a1

    SHA256

    4f8e3198e929282a00856b93db66f461e5c4aa08048b339abad11683963a9053

    SHA512

    ef53a814180a79c3559a1a3e3043a0d510c099d32b3caea2f082be8e36460ca5a9a1aad6ffa63d8a796cc03c62d032da90214ef06a8f88f99117fa07ad492f33

  • C:\Users\Admin\AppData\Roaming\SolidDocuments\SolidConverterPDF\splash.png

    Filesize

    20KB

    MD5

    488530816134bbbc487118fd1ce47e27

    SHA1

    8d3f43f59ba417f0035047400b2cee8fb0bfe0ba

    SHA256

    528963f3adf79334b2f97d1df4d990e658af46a395eff36c1ed014742807b1ba

    SHA512

    da6a0af43c9a482ad8878463445e66525ab1313c5b302de13fd3d0426be905b862125e2aba39d7c9849f7ed9c761c63f8cae0a61962fa35a61c5a4439d2dfb7d

  • memory/2684-21-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2684-20-0x000000002F681000-0x000000002F682000-memory.dmp

    Filesize

    4KB

  • memory/2684-22-0x000000007143D000-0x0000000071448000-memory.dmp

    Filesize

    44KB

  • memory/2684-26-0x0000000003FC0000-0x0000000003FC2000-memory.dmp

    Filesize

    8KB

  • memory/2684-36-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2684-37-0x000000007143D000-0x0000000071448000-memory.dmp

    Filesize

    44KB

  • memory/2928-3-0x0000000000430000-0x0000000000537000-memory.dmp

    Filesize

    1.0MB

  • memory/2928-0-0x0000000000230000-0x0000000000300000-memory.dmp

    Filesize

    832KB

  • memory/2928-24-0x0000000002E60000-0x0000000002E62000-memory.dmp

    Filesize

    8KB

  • memory/2928-38-0x0000000010000000-0x0000000010191000-memory.dmp

    Filesize

    1.6MB

  • memory/2928-2-0x0000000000020000-0x000000000002C000-memory.dmp

    Filesize

    48KB