Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
03/09/2024, 02:35
Behavioral task
behavioral1
Sample
6855c1ff7870c0c74ba0291fb77b5e27e7265a72a9685297ba0fe35a942d7a42.pdf
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6855c1ff7870c0c74ba0291fb77b5e27e7265a72a9685297ba0fe35a942d7a42.pdf
Resource
win10v2004-20240802-en
General
-
Target
6855c1ff7870c0c74ba0291fb77b5e27e7265a72a9685297ba0fe35a942d7a42.pdf
-
Size
94KB
-
MD5
90aa3b504dfaab771697d851e6080d52
-
SHA1
bd08670e74c4161130cd334ab33d0c5d28ba7e04
-
SHA256
6855c1ff7870c0c74ba0291fb77b5e27e7265a72a9685297ba0fe35a942d7a42
-
SHA512
7976b630954a6ea1913ae338e04824b8810e30ab85d401568664903a8ed0b9f9bfabf5674283574726e0b15c867fd49e0ed82a3ee6c604329cad16bc3de0533d
-
SSDEEP
1536:k2s+c5i6vfqVRsxsDK0voKix3vaqJn9sb6zyOf6+j1Wb6uLb8rxWapOnQyiTz:9sfV3qVRskK0v7Q3vTV9seZj9uLYryne
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3016 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3016 AcroRd32.exe 3016 AcroRd32.exe 3016 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\6855c1ff7870c0c74ba0291fb77b5e27e7265a72a9685297ba0fe35a942d7a42.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e43ae4ccc0514a7e69d4657dddc598d1
SHA1040ee1ad0de0e7a19f677c03db5089dc9aeb66de
SHA256926220f6e6acdd90187c83d83a98e4255bb1d3aa37818e33ece3a176747402eb
SHA512de40d3f4cc2b2e1142383df05709387746ce5d312657cb638ed9f4d1c97b997c7fcfd55a033a9c4636a7b5bf9f0705de5c67774f9b03f4ff8f23c8f79099aba7