Resubmissions

03/05/2024, 18:40

240503-xa7xwagb26 10

03/05/2024, 18:19

240503-wynngach5t 10

03/05/2024, 15:38

240503-s26fxaad2t 10

Analysis

  • max time kernel
    0s
  • max time network
    10s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/05/2024, 18:19

General

  • Target

    OSbot judicable/_internal/matplotlib/mpl-data/images/help.pdf

  • Size

    1KB

  • MD5

    a0c9d1a063e353351fa07e26f0189ccf

  • SHA1

    e738f15e582f387119767435e5b4a57ba779129b

  • SHA256

    09e13defc20c8b4616ce758a8c84f547c22b3f82a16744bbbac3d4beb79281c0

  • SHA512

    7c4f5967c85d0c075916c20e74baf0e1d3e5583be143b146aaff56c505cf028e160c7e20e2ff9a6ecd095a450ce3de821461207db7221445f9f0d570326b0639

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\OSbot judicable\_internal\matplotlib\mpl-data\images\help.pdf"
    1⤵
    • Checks processor information in registry
    • Suspicious use of SetWindowsHookEx
    PID:1924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads