Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 22:59
Static task
static1
Behavioral task
behavioral1
Sample
150299f710b000d8f96d602cb095bab0N.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
150299f710b000d8f96d602cb095bab0N.pdf
Resource
win10v2004-20240802-en
General
-
Target
150299f710b000d8f96d602cb095bab0N.pdf
-
Size
1.1MB
-
MD5
150299f710b000d8f96d602cb095bab0
-
SHA1
57c13ddb4aa7761038a1cbdc83332ed89aa7f5fe
-
SHA256
174f0528e79deefd7081b35113f85fe9a73352857295169f80cb4a2ab41e0f42
-
SHA512
e94fbd7ddc16e8eba248b96996eac324249ef71052b3661d0ed5dc4ba6bb6015069b1db8d0f07150936ae1351de3890119a15f63274a49e53c580fe1d255afa1
-
SSDEEP
3072:sizHM+trPuwOb9TtfU0Hv8aa4UUd3frqK/DYJr2fm8FtioQP+u9CgGiwAe2OblaQ:sJ8+9TtfUmv8aPw7/PksI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2276 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2276 AcroRd32.exe 2276 AcroRd32.exe 2276 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\150299f710b000d8f96d602cb095bab0N.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55fe7e2f47aa1b54af1878e33208d1f31
SHA1a40cbb67751b2839a11c624bce4e14027e37db30
SHA25640f121190572ee8a18c2f354ba8553b82448faeba77a0594d8b662cc5c921af1
SHA51205f18d0b82324ad4a44f22b57db9ff3e2ff5afc7539e8fdbea5aea17ad589d97ccd0af08d5abc5f847c6e918cefc8887886e01064896355f582a357eab1bf2a5