Analysis
-
max time kernel
96s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 16:39
Behavioral task
behavioral1
Sample
bb480cc6b9b167a0a30e7a0e5d3dfa70N.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bb480cc6b9b167a0a30e7a0e5d3dfa70N.pdf
Resource
win10v2004-20240802-en
General
-
Target
bb480cc6b9b167a0a30e7a0e5d3dfa70N.pdf
-
Size
66KB
-
MD5
bb480cc6b9b167a0a30e7a0e5d3dfa70
-
SHA1
6f6c120b96c05ccc3ff7bdda46e7bfa33ed2b54e
-
SHA256
8783f41a4bcff6d7e95d90a64184e168392eb0c3d64577f2111355735a890475
-
SHA512
f7495384053ea458b705f6a58676b4f654ed7a23ed7652d2df5b41748c5863e042e6e237f57737722265495237f180e91b0d61f68e0c89f2ade8f51721d91596
-
SSDEEP
1536:4uN6EOIziafL5Dxhwh8xt5lTA6IGG+p8wnLby8m:GqL5DxhwmxhMGGg8wnLW8m
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2448 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2448 AcroRd32.exe 2448 AcroRd32.exe 2448 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\bb480cc6b9b167a0a30e7a0e5d3dfa70N.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d1003acbac78e3a06d0a811595f9b14b
SHA10973621d419a720f26b95152e7213e5d4bd4b0d8
SHA25640cdb10bfc1bb3e66b63b7409f9ac4889bda13900fc62b62125d8e2fe62a0f94
SHA512b904af67f972429ada254a1cbab3bc91258fa2de99e1ce034a122fcc4ef2513b0c78b821eea5e9fd5af6c2bfa22282720e2a128d737d5b924dbfaf4509ec6937