Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 03:58
Behavioral task
behavioral1
Sample
8fc2e24cc0e6816ac646dd6365b5f230N.pdf
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8fc2e24cc0e6816ac646dd6365b5f230N.pdf
Resource
win10v2004-20240802-en
General
-
Target
8fc2e24cc0e6816ac646dd6365b5f230N.pdf
-
Size
121KB
-
MD5
8fc2e24cc0e6816ac646dd6365b5f230
-
SHA1
df66b7ca6bcf1d3856ce7caada67a819b656881a
-
SHA256
a046f45521eb6a96ab06dddc5dbb5f0f55e43342b1dd3c13a9e384a9c342a22e
-
SHA512
ef3d7faea805de43d165c179a8e67e84e4173a2b7a53b4fe3b76b6241aa867b2e00b3a833857b871fe12405f754e793d97eeb87a5c873f707a595462bfc07376
-
SSDEEP
3072:KA1i56CLq0bahjnvBmH7mJjZmfRkQ+o5iO5fjwBM+:ZXsKjnvB+mif+nos
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2980 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2980 AcroRd32.exe 2980 AcroRd32.exe 2980 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\8fc2e24cc0e6816ac646dd6365b5f230N.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5035ab1089dcddf84ac0c4c7cdd88dbe8
SHA13aac320436424f8afe81c6e7bb8906e3c6940ec0
SHA25637e7d1cfa1e48b427caefdb5d1075d5ed59665c6cda5506093f0af141507bbfe
SHA51295c40412cf8e1041ba9699657cefa0631f1720113fa0169cc740007f0a909b6ae6c6427261992334aab05deeb1f0f062c4020e7048026db38717c388f56c013b