Analysis
-
max time kernel
94s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07/08/2024, 01:23
Behavioral task
behavioral1
Sample
3ecf37b45bb7d019274d97a85ad53b30N.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3ecf37b45bb7d019274d97a85ad53b30N.pdf
Resource
win10v2004-20240802-en
General
-
Target
3ecf37b45bb7d019274d97a85ad53b30N.pdf
-
Size
133KB
-
MD5
3ecf37b45bb7d019274d97a85ad53b30
-
SHA1
692d0f33621d84a6f0503e6dda225f8d2fe9f502
-
SHA256
4e006a85cae27d1b92b52555fa14e42667e707d62071013c6f04fc11cdd6bc7a
-
SHA512
6b6b653dc45085809567c0c70f7a72d49d0152f783c1902a08d680181b866ea013af6819ea685e6838eeb812ef7157afd3bc7bcaa161892d3a5080a93bde3bc5
-
SSDEEP
3072:Lcti56CLq0PahjnvBmH7mvUjZmfkQ+oo3uG7iL:EXIKjnvB+mFfkno8GL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1660 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1660 AcroRd32.exe 1660 AcroRd32.exe 1660 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\3ecf37b45bb7d019274d97a85ad53b30N.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD51a1fd46967175dd8298226c8e290f0b4
SHA1f11546e314f46710d136bfe859e9c5a4b1163eb0
SHA256aaefd9461370d889818e0ef9b5f15e35afe4a472afa1b3899a3bb642996240b6
SHA512f7819a1faf5f8b3c35669d8e1ca21323633cbab3c6b944515648d67d571f6decdca9a3225d38f93dcfd7707387ed63700efbd5fa3ac8a463a9b352ff24eb87a4