Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/07/2024, 08:09

General

  • Target

    SCPDF3/SolidConverterPDF.exe

  • Size

    137KB

  • MD5

    c5196c370e0b958da813da05fb648d3a

  • SHA1

    a46bda006c01578ee66394401e04ee392081e52a

  • SHA256

    45955f890d6bece9ee665f8b8c00040f3f77f3b02fa97fdac1994b74f22fbd3a

  • SHA512

    7360cb378f3d16465b24bea3f72ffda8d301ff6ae11c4a8fba4947f5bb47206d0a0c670144cb4eb04cc703811a8b550fab87d92569ed4e9f0b29cd90fe3899c8

  • SSDEEP

    3072:FGb6Ec1+HekoGdzRmVmnS6k7RoW35Z0ggB:iT5HekL8us5Z0gW

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 18 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SCPDF3\SolidConverterPDF.exe
    "C:\Users\Admin\AppData\Local\Temp\SCPDF3\SolidConverterPDF.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1248
  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\SolidDocuments\SolidConverterPDF\TMP7C16.tmp

    Filesize

    20KB

    MD5

    517d504097864acea5f313dbe75cf45c

    SHA1

    5b20980640c5b392fbb8eacc400f1c62b97944a1

    SHA256

    4f8e3198e929282a00856b93db66f461e5c4aa08048b339abad11683963a9053

    SHA512

    ef53a814180a79c3559a1a3e3043a0d510c099d32b3caea2f082be8e36460ca5a9a1aad6ffa63d8a796cc03c62d032da90214ef06a8f88f99117fa07ad492f33

  • C:\Users\Admin\AppData\Roaming\SolidDocuments\SolidConverterPDF\splash.png

    Filesize

    20KB

    MD5

    488530816134bbbc487118fd1ce47e27

    SHA1

    8d3f43f59ba417f0035047400b2cee8fb0bfe0ba

    SHA256

    528963f3adf79334b2f97d1df4d990e658af46a395eff36c1ed014742807b1ba

    SHA512

    da6a0af43c9a482ad8878463445e66525ab1313c5b302de13fd3d0426be905b862125e2aba39d7c9849f7ed9c761c63f8cae0a61962fa35a61c5a4439d2dfb7d

  • memory/368-35-0x00007FFA3F5B0000-0x00007FFA3F7A5000-memory.dmp

    Filesize

    2.0MB

  • memory/368-50-0x00007FFA3F5B0000-0x00007FFA3F7A5000-memory.dmp

    Filesize

    2.0MB

  • memory/368-21-0x00007FF9FF630000-0x00007FF9FF640000-memory.dmp

    Filesize

    64KB

  • memory/368-23-0x00007FF9FF630000-0x00007FF9FF640000-memory.dmp

    Filesize

    64KB

  • memory/368-22-0x00007FF9FF630000-0x00007FF9FF640000-memory.dmp

    Filesize

    64KB

  • memory/368-24-0x00007FFA3F64D000-0x00007FFA3F64E000-memory.dmp

    Filesize

    4KB

  • memory/368-25-0x00007FF9FF630000-0x00007FF9FF640000-memory.dmp

    Filesize

    64KB

  • memory/368-26-0x00007FF9FF630000-0x00007FF9FF640000-memory.dmp

    Filesize

    64KB

  • memory/368-51-0x00007FFA3F5B0000-0x00007FFA3F7A5000-memory.dmp

    Filesize

    2.0MB

  • memory/368-29-0x00007FFA3F5B0000-0x00007FFA3F7A5000-memory.dmp

    Filesize

    2.0MB

  • memory/368-28-0x00007FFA3F5B0000-0x00007FFA3F7A5000-memory.dmp

    Filesize

    2.0MB

  • memory/368-27-0x00007FFA3F5B0000-0x00007FFA3F7A5000-memory.dmp

    Filesize

    2.0MB

  • memory/368-34-0x00007FFA3F5B0000-0x00007FFA3F7A5000-memory.dmp

    Filesize

    2.0MB

  • memory/368-33-0x00007FFA3F5B0000-0x00007FFA3F7A5000-memory.dmp

    Filesize

    2.0MB

  • memory/368-81-0x00007FFA3F5B0000-0x00007FFA3F7A5000-memory.dmp

    Filesize

    2.0MB

  • memory/368-79-0x00007FF9FF630000-0x00007FF9FF640000-memory.dmp

    Filesize

    64KB

  • memory/368-30-0x00007FFA3F5B0000-0x00007FFA3F7A5000-memory.dmp

    Filesize

    2.0MB

  • memory/368-38-0x00007FF9FD040000-0x00007FF9FD050000-memory.dmp

    Filesize

    64KB

  • memory/368-80-0x00007FF9FF630000-0x00007FF9FF640000-memory.dmp

    Filesize

    64KB

  • memory/368-53-0x00007FFA3F5B0000-0x00007FFA3F7A5000-memory.dmp

    Filesize

    2.0MB

  • memory/368-54-0x00007FF9FD040000-0x00007FF9FD050000-memory.dmp

    Filesize

    64KB

  • memory/368-39-0x00007FFA3F5B0000-0x00007FFA3F7A5000-memory.dmp

    Filesize

    2.0MB

  • memory/368-37-0x00007FFA3F5B0000-0x00007FFA3F7A5000-memory.dmp

    Filesize

    2.0MB

  • memory/368-36-0x00007FFA3F5B0000-0x00007FFA3F7A5000-memory.dmp

    Filesize

    2.0MB

  • memory/368-32-0x00007FFA3F5B0000-0x00007FFA3F7A5000-memory.dmp

    Filesize

    2.0MB

  • memory/368-31-0x00007FFA3F5B0000-0x00007FFA3F7A5000-memory.dmp

    Filesize

    2.0MB

  • memory/368-77-0x00007FF9FF630000-0x00007FF9FF640000-memory.dmp

    Filesize

    64KB

  • memory/368-78-0x00007FF9FF630000-0x00007FF9FF640000-memory.dmp

    Filesize

    64KB

  • memory/1248-2-0x0000000000A70000-0x0000000000B40000-memory.dmp

    Filesize

    832KB

  • memory/1248-0-0x0000000000A10000-0x0000000000A68000-memory.dmp

    Filesize

    352KB

  • memory/1248-4-0x00000000006A0000-0x00000000006AC000-memory.dmp

    Filesize

    48KB

  • memory/1248-82-0x0000000010000000-0x0000000010191000-memory.dmp

    Filesize

    1.6MB