Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 14:59

General

  • Target

    GPremiumBooster.pdf

  • Size

    218KB

  • MD5

    48c50d9d4b4a3436a4a0b751794958a5

  • SHA1

    695c171fd4af0b40d1b96a8ca62cfc085c42c428

  • SHA256

    a4ab5b9a112ba5be5d184e8912fe8f43a2a4cf1a542ccd605bd932123120e11e

  • SHA512

    23ef14e4803faf6e19b165e31d41f193f8b3cca5df39892c1266cfa7237833aa8f1921cc993f8f6f91000685fb3eff4b9482e6cfef43fcc650a37b16985c4eb5

  • SSDEEP

    6144:0EmA+hKOXd2Jc/Qcw+TgBJWm64IOcktoDdbGo:0ES1t2O6364ja

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\GPremiumBooster.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    82dcf3d8e149e6fba2a78412e1f23ad7

    SHA1

    e1f391855d657efaf5bf0a4caf671147f23b3876

    SHA256

    1cda29b6c8604eaf455f5695c8c7c94805c89210f501da06bb3e1b03ce90f1b5

    SHA512

    31cd275a927884a4f3a20fde2b165a7068d817903392d3e7a60d414cadb589893279adaffb41661860057dc6388d31de040cfff8f8b2333af0ba14e36139d1d3