Analysis
-
max time kernel
94s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 21:12
Behavioral task
behavioral1
Sample
03e9b421959296101f5bb6f024d31680N.pdf
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
03e9b421959296101f5bb6f024d31680N.pdf
Resource
win10v2004-20240730-en
General
-
Target
03e9b421959296101f5bb6f024d31680N.pdf
-
Size
4.1MB
-
MD5
03e9b421959296101f5bb6f024d31680
-
SHA1
75ee67bddb1ea1f7c1cb4d2e8232e5e95d5f61b6
-
SHA256
527b73919245aa65f61e4f682487be3cb4203e511729a8755a20daf8bc49fb31
-
SHA512
e7a01d6ae1d62009635bc5238ede0e7336d91f3e681451c85f6dbb3fdf1ba0fb46c52b55156de43d9984b63309b1819c747b5e53af0f55eaea789de13abbdc4a
-
SSDEEP
98304:iItD4wFmXMzMF7CiROV/PlsDmPPJ1AjiKvPJeovk:iykwFmXMzMB7RunKKPR1sisUovk
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2128 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2128 AcroRd32.exe 2128 AcroRd32.exe 2128 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\03e9b421959296101f5bb6f024d31680N.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD57f02c92bb9122898740fbe7319a712d1
SHA1cc9b07da097735696fada9152fa727bc6c63abc3
SHA256ba62e39a8cf03d9d76b526a55f02e001853e6a2399511eaedb165858e21c505c
SHA5120b2e2f53ca45b89e676530cfda4405922d46ea8f8e72adebe2052000451979fbc5e28d62f8d1f87efaa6d77acc9d85644b4d6fda426d756b439023d2cfacb478