Analysis
-
max time kernel
94s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 06:08
Static task
static1
Behavioral task
behavioral1
Sample
846c539aa6a90cbbad74c385b7771800N.pdf
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
846c539aa6a90cbbad74c385b7771800N.pdf
Resource
win10v2004-20240802-en
General
-
Target
846c539aa6a90cbbad74c385b7771800N.pdf
-
Size
83KB
-
MD5
846c539aa6a90cbbad74c385b7771800
-
SHA1
3bc918baebe3cbddad130678958f31751e3c3c44
-
SHA256
91960c0d4ab3a999f188c520d79bb0b8f8202c2ecded1e961be5e193eafd5e44
-
SHA512
caf930b021b3d9940d124e7445198fb691c027b888f75de673c2ced048f375b1ce2c3de827495ae80373fe9605e7205e97fd4edaba7cbd8e4b2731bc3e2308ef
-
SSDEEP
1536:ZBldrgW9uJeyQDhP53ZfURhWDq3KZQ/KthM+yffq14rYck/HUkb4Tx6AW9G2EaZz:ldrvwQDhP52b962bpfJhsUnTx6n9G+eS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2688 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2688 AcroRd32.exe 2688 AcroRd32.exe 2688 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\846c539aa6a90cbbad74c385b7771800N.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a6b46832d949a859b3155b3281bd7f13
SHA192a29c4eac983552cd842b0195c39fce5363cf4f
SHA256581c4b591fb7345787b2ff38abd346a5228018a15b0686a2676e8498a5e48743
SHA51226d3e67e59c8eaf874da9acdf047cf2cd9cca130a19fcf7ee4f99197e2a5a80e940fa226e7770994013b8eb20ad5e428babcb15a990bbb69d0a09212c45f8265