Analysis
-
max time kernel
94s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16/08/2024, 22:31
Behavioral task
behavioral1
Sample
7655de1e04de80a9ce9c7c83dde35ba0N.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7655de1e04de80a9ce9c7c83dde35ba0N.pdf
Resource
win10v2004-20240802-en
General
-
Target
7655de1e04de80a9ce9c7c83dde35ba0N.pdf
-
Size
69KB
-
MD5
7655de1e04de80a9ce9c7c83dde35ba0
-
SHA1
cc270f81fefa32528aac72ed60613f9e909e5db6
-
SHA256
96a4fed19ec06382ed3ee6cbd3f4d4bbfbcebf659cb2ce4d38b33a17a24512af
-
SHA512
629b8da9ea0638d8426c1273c794aa20a67ab2964b938d4e246d588f81063663820df6048f6f11f70596187e103471297a91a9337768fe0c46d6f4008da10e15
-
SSDEEP
1536:5fU0CjZXMNmJrEjDeeVOxU2AcS06WOr2hbKrWWOpOwrKWVYOFmir:C0YZXkkrEueyU2UYOr26LwrXF3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2996 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2996 AcroRd32.exe 2996 AcroRd32.exe 2996 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\7655de1e04de80a9ce9c7c83dde35ba0N.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD541e5c5d63415097b4f2486882530932f
SHA1017aa3310f371c3e9b5c4345c526ba991885c039
SHA2566cf1b8f5aed0982dc5e0f3a1e6edb2755d197ebc67db75062f3f9d4d3fa79558
SHA51274bf295c53f5f21a8e8abc7fe80390e181c9772edee117b4641b09d2c009c7c77398c448d45aa26f1ef99621c57874408109e6cdcd4cadfda12abf1d1b792325