Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 07:35
Behavioral task
behavioral1
Sample
25b86df3d371b65119287d8b0f88630f2d305fad24ef6d40cdd60ce74c812418.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
25b86df3d371b65119287d8b0f88630f2d305fad24ef6d40cdd60ce74c812418.pdf
Resource
win10v2004-20240802-en
General
-
Target
25b86df3d371b65119287d8b0f88630f2d305fad24ef6d40cdd60ce74c812418.pdf
-
Size
35KB
-
MD5
dc2145dc28262bb89c908c010e7b8036
-
SHA1
36cd3a6a14a2faee40916f6497f4b0f350fedb87
-
SHA256
25b86df3d371b65119287d8b0f88630f2d305fad24ef6d40cdd60ce74c812418
-
SHA512
60ac50e23dfb4f823d7ebaa9329e7078259cd54509cef200d8b45fd8200f622b72054570ea1c31741dad6fb4f391e20ed0a251bb42a8b5d18a4471983d005695
-
SSDEEP
768:5R6zK0k65ULwTMVD4vrs/D6lGyuSDwtxJGApzUG8WBd91KU7WQHg:5MLkQo9D69wtOApz58YvPWQHg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1984 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1984 AcroRd32.exe 1984 AcroRd32.exe 1984 AcroRd32.exe 1984 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\25b86df3d371b65119287d8b0f88630f2d305fad24ef6d40cdd60ce74c812418.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD50df5940a7115940ff0e0d404f2c702a5
SHA1550911bd393d2104e72ce126b97e0c5194dd3ee7
SHA256176e127ce5293d196a0e33ead0c9eae67352fdfb02c2b13188efa0feb5b3eb88
SHA51207ed0e724f441b83505e47ef3d085f199eed9598ddea7b6adca4214390b8d8c3244db7c06f6bb17ede637b9d70937caadf6cc7e93ee7a868226e548b6c35ccae