Analysis
-
max time kernel
94s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06/08/2024, 20:52
Static task
static1
Behavioral task
behavioral1
Sample
0563a97ec0db5d69a1d99f5194685070N.pdf
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
0563a97ec0db5d69a1d99f5194685070N.pdf
Resource
win10v2004-20240802-en
General
-
Target
0563a97ec0db5d69a1d99f5194685070N.pdf
-
Size
264KB
-
MD5
0563a97ec0db5d69a1d99f5194685070
-
SHA1
29105d7c8294b276753f9bbcbfeb5f1c68b25aa8
-
SHA256
de3f167f236cf4bb3f1bd016408a0e367450502991162c7469a64faca04d82b2
-
SHA512
ae8d713fc98e38308c5f778ee8af9808c6d38f09b2fbf2c16471563876bb97e976a381bc526da72c2aea92674b37f77b281388a35a97835a34b5f1942d18192f
-
SSDEEP
6144:o6WoimguJL8EpNoCH+5k+9qIzAE/wS203Jgk92pm:o6WFO9pNl+0Iz73qk92I
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1732 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1732 AcroRd32.exe 1732 AcroRd32.exe 1732 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\0563a97ec0db5d69a1d99f5194685070N.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD57ef6c97e25eed56e09e9bd1a1c27861d
SHA114aad4f548ef65d342f7339a36d4f7d92e615e35
SHA256c234685ff2f282807a3d0e81860cf5d895fda78656aa36388d5ad70b69e0261a
SHA5125be2664938b6a5a2108ae61ea5435ee7d014e72b5640f9f4365b442a72e77824286483abc2e15fe61a7c0b4a8bcf150ed9809eb3b0a5e95ead9767d4ad8e00be