Analysis
-
max time kernel
94s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 00:19
Behavioral task
behavioral1
Sample
acb8d87940f324b6d98e9867847becb0N.pdf
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
acb8d87940f324b6d98e9867847becb0N.pdf
Resource
win10v2004-20240802-en
General
-
Target
acb8d87940f324b6d98e9867847becb0N.pdf
-
Size
33KB
-
MD5
acb8d87940f324b6d98e9867847becb0
-
SHA1
0e6b3ee0045113cf6d207560ad8c0c58447a2509
-
SHA256
76e87f1b6315dea6cce39fbece4eccfc5bdf8d256e6893b590e1dab754e06ab9
-
SHA512
b78cda2e2b4ae81603b5c234e7209a570497151f48915cfa7583c204b73362afe73d60b552833baa4200bdc02579aa613609b3d6793c32d3e39a4dc747c16aa5
-
SSDEEP
768:rvJJLF2vAa3xR5mnXTTQAs00UVU6nc4LJGI:rsvAE/5mn3VDBil41GI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2528 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2528 AcroRd32.exe 2528 AcroRd32.exe 2528 AcroRd32.exe 2528 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\acb8d87940f324b6d98e9867847becb0N.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a8ef9e9faa33a52f72e8073d7ec9d4ed
SHA126925773d8cf477effb8070eff076d9d185e8193
SHA256542d2c15670f24ea21e688a590f1a26b19add2608f32e75e61105fc867398458
SHA512e5e7193bdee472752e2c5659457eec64cd5fb9a9cbe8bfddbe2ee9b9ccee10d09d6e48ca1139d11d5ddbb194aaeab1c3f3784c89dc5aff491ce28fe70fadef92