Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03-09-2024 02:06
Behavioral task
behavioral1
Sample
5aea2593466c94e35cc17fd4bd9ac359993c183f9824d480f53b9b6156bc0f7a.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5aea2593466c94e35cc17fd4bd9ac359993c183f9824d480f53b9b6156bc0f7a.pdf
Resource
win10v2004-20240802-en
General
-
Target
5aea2593466c94e35cc17fd4bd9ac359993c183f9824d480f53b9b6156bc0f7a.pdf
-
Size
34KB
-
MD5
e1b1b8f7a3184cf2334f2e91d9bc7606
-
SHA1
34b54e76916e3c9ad0d76e1cbbd0c0088d5efe92
-
SHA256
5aea2593466c94e35cc17fd4bd9ac359993c183f9824d480f53b9b6156bc0f7a
-
SHA512
dc2f562a21dd14dca2194826fe2f4be9b8b5669214f15861117765e67aeae2b0d4568b370a942cac9d5ded7baeb3a5be493141631368259d4eb866cd26ab0a4e
-
SSDEEP
768:qMhpYw1G2sNpt+NCQhfVzO5Oszujqkdeyj2H8Y:lhpL1KkoeNz8OQQVU9H8Y
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2128 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2128 AcroRd32.exe 2128 AcroRd32.exe 2128 AcroRd32.exe 2128 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\5aea2593466c94e35cc17fd4bd9ac359993c183f9824d480f53b9b6156bc0f7a.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5866711eaed5046b01f09b37e32872ec3
SHA17a1695f0adef58c04403c5cd1945cc23f5e0099e
SHA2560dd0af33dcf7f70b4bdc6a7ee45f4e69551ec6a7b82e3e7f4821ceefcc95538b
SHA5129dc3f4eef1f4739c6349f73adfebf2e734b16619395d89dfd37817dc0110f0238de3cc227b630fd267faa72fcf3aadab0e2d73ceb1479b328d84bdb42a05734b