Analysis
-
max time kernel
134s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-08-2024 20:26
Behavioral task
behavioral1
Sample
8f8264c173e6d036e87b706dbb87e3036ae17df32e53a683c87bff94fce2c242.pdf
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8f8264c173e6d036e87b706dbb87e3036ae17df32e53a683c87bff94fce2c242.pdf
Resource
win10v2004-20240802-en
General
-
Target
8f8264c173e6d036e87b706dbb87e3036ae17df32e53a683c87bff94fce2c242.pdf
-
Size
50KB
-
MD5
3c218594fe3db33cff5c3d4dc7b5b14c
-
SHA1
f7c625f1d3581aa9a3fb81bb26c02f17f0a4004e
-
SHA256
8f8264c173e6d036e87b706dbb87e3036ae17df32e53a683c87bff94fce2c242
-
SHA512
a881a1bb9ad3cbe26f6de6feddac5733a14899f48ae275dbc879e40744c3ee0cdcbcf8223b356b8ad43d02624b606721af855de030c567616f67efa3f177f530
-
SSDEEP
384:2cSDvX7hWFcTPm/K7Uzzzzzzzzzzzzzzzzz32cm8:2cST7hWGTO/Kr8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1644 AcroRd32.exe 1644 AcroRd32.exe 1644 AcroRd32.exe 1644 AcroRd32.exe 1644 AcroRd32.exe 1644 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\8f8264c173e6d036e87b706dbb87e3036ae17df32e53a683c87bff94fce2c242.pdf"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:1644