Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
03-09-2024 02:48
Behavioral task
behavioral1
Sample
ec9c288f7df7fcca832e5b682042e0b29951526bb196d62f43995a887b710222.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ec9c288f7df7fcca832e5b682042e0b29951526bb196d62f43995a887b710222.pdf
Resource
win10v2004-20240802-en
General
-
Target
ec9c288f7df7fcca832e5b682042e0b29951526bb196d62f43995a887b710222.pdf
-
Size
81KB
-
MD5
024bbfeb3e48e8fc2ec43c82df9b5392
-
SHA1
96e14520fa79afd871db901e3c34639f4e3a1995
-
SHA256
ec9c288f7df7fcca832e5b682042e0b29951526bb196d62f43995a887b710222
-
SHA512
07793b236b1302d8ab67748d06be4c27d03a47dfddbae4270c7c3f67a23d5e6640f50874100772af59373cb6c1ac2ccc0ec4b6128f451c362046c136c0e709f1
-
SSDEEP
1536:gjxQFSNgFHTN0To7Yx33WhtuHMLPtHRt7og9OMkWNzVN7HOan+WspORAOPHj:5SNQP7m33Wh0sLvR5JR1nnRRz7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1968 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1968 AcroRd32.exe 1968 AcroRd32.exe 1968 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ec9c288f7df7fcca832e5b682042e0b29951526bb196d62f43995a887b710222.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58a26e3a890302853e1aac67ebb588e30
SHA1b91601e3be1a2ae5b0d2e3087e9ac2774c2f2b54
SHA2562ccbd01ae303f4122e040b6492cd02dd2bc363442d9dd1c42f9613bf54b01a0a
SHA512705937466ffe5138b6a8b928cd0cdc223b1664b9a176753ac7c5caed0732a21b1748f88b0b0ee2a8646eb91544e438699d7ce53b4554041cd506e6b4d1724888