Analysis
-
max time kernel
94s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07/08/2024, 09:15
Behavioral task
behavioral1
Sample
9ac8e1868f426c630be70eb7aec1b0a0N.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9ac8e1868f426c630be70eb7aec1b0a0N.pdf
Resource
win10v2004-20240802-en
General
-
Target
9ac8e1868f426c630be70eb7aec1b0a0N.pdf
-
Size
133KB
-
MD5
9ac8e1868f426c630be70eb7aec1b0a0
-
SHA1
c8a834e4fa7a9853c96325c8f59f15c76cae4626
-
SHA256
6c5003efe7f399770ddafa6fc25dafb1f9808c26bfb1936b149332f8f1cb5ed3
-
SHA512
1494e0def9891743c8c3a09929b36312da28b043fa7279138616e46fe848622618a9b3b9a64c89398e7f407c08188e953cc02720a9ec5ecae16ca92fc837a78a
-
SSDEEP
3072:ClOxZ51N+i56CLq0VahjnvBmH7m7yjZmfuQ+o4gwtnt06pou:NPN+XeKjnvB+mLfunohU
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2852 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2852 AcroRd32.exe 2852 AcroRd32.exe 2852 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\9ac8e1868f426c630be70eb7aec1b0a0N.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD528181367bc6e453e4a8706bf56916e1c
SHA13634574da841ddb967abbad4719657f4c2ef6322
SHA256371af480739fde53f674c50f743795f2fb4b7b32a09d15b0f29ec056f48d7e26
SHA512e992a63a0d3e0e9d003e3589a042ca91e5201cc5449c8926ded3e817ee8a4a698434dd5f2378c9a4ac64e8237f18237bea44636982cfb7f175404287b5f57b61