Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 22:37
Behavioral task
behavioral1
Sample
c7cd39bbfb25fd12de55f82d0e01b740N.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c7cd39bbfb25fd12de55f82d0e01b740N.pdf
Resource
win10v2004-20240802-en
General
-
Target
c7cd39bbfb25fd12de55f82d0e01b740N.pdf
-
Size
1.2MB
-
MD5
c7cd39bbfb25fd12de55f82d0e01b740
-
SHA1
1561a441f4df86d5a8c6152178c93ab7d3362e67
-
SHA256
e874af68d9ca888a98e5cc88e63368be6f2aaf7406da9d2aaf33934b0d289c0c
-
SHA512
96958820e0597990b0ddaa09da69ca9429545226f2be618f40eabacafd40b1ddae5c76a4b724fddb7980edd1c28aeab6bf2f824d3012deca408bf89c91bc7bc2
-
SSDEEP
24576:09e+SNx2a7MYBwhEsMQaQ6+uIpYMHKe/pAqWN0Y4jINndATTT0J4xD:mTSNga7MavGab+uIpYxe/pAqWN2INndY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3052 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3052 AcroRd32.exe 3052 AcroRd32.exe 3052 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\c7cd39bbfb25fd12de55f82d0e01b740N.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5dd21b9e8c3318d4efa6dfeff37868001
SHA15956a08f8d03c55f56cf4a16f235c7151405094e
SHA256085086ec0c6e8046823ec83af85e909ca96301c5812f0c79ac7a818f75a944c9
SHA512dfbd0c8442424fd30e37c6c333a8c63eee243ea5740a0605441aee8f4cd17a5363b1324139c7e2f684eed3e08d2045988120d7ebbdd154f46ac0580432bd6c40