Analysis
-
max time kernel
26s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 14:28
Behavioral task
behavioral1
Sample
WIL_1619_SEP_2024_Dubai.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
WIL_1619_SEP_2024_Dubai.pdf
Resource
win10v2004-20240709-en
General
-
Target
WIL_1619_SEP_2024_Dubai.pdf
-
Size
341KB
-
MD5
89082c2c83e094523330541b858970f1
-
SHA1
b53a78079a6104e3706a650aecd4cf422c1c9f22
-
SHA256
c50c01610b3854e4d080bca6ad47aaea048edeb0907170717d2551d6b657e92b
-
SHA512
36698be997184fbf6d54d8d0a8ca5d091cd017155a4ac7e4c27ec6875b3741f0f256e9d0dc42fbf4a084b55bf5bd8f59daada5f6a089da09c1bbb2c901389231
-
SSDEEP
6144:j1i6NihYNcX3ElJFPiYEpINtvWUz3lfm0e8ooYYxvFj1qfso:5/BckfBFEpID1lfhH1xvrqX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2564 AcroRd32.exe 2564 AcroRd32.exe 2564 AcroRd32.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b078734cc76a6142b43311919f166e10
SHA104702aca7dc4bcfd53c333e211b49fc2e09afdf4
SHA256a0eb56922cbccf21200d0aa8b9f7c8ff5fb26725b5c33aa5568bfa44a6582300
SHA51283aa4dbaffdf241c8b1e7b9a2eaa196740f60367ea6ac9d150d4b16d87bac400681e37b7d5476b47e23764665c7e3f167fa3a501522383e0c86a88c1dcde7f32