Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-09-2024 18:48

General

  • Target

    1e8819800cad9225966bcca3d964da937e4f837fb07f0c45b7823bdc749d8519.pdf

  • Size

    81KB

  • MD5

    41fe4e84da8d64d63555d01f4a1ee5d3

  • SHA1

    d493bdfefc7167c6a721edec093954493b18987e

  • SHA256

    1e8819800cad9225966bcca3d964da937e4f837fb07f0c45b7823bdc749d8519

  • SHA512

    ae39ad05640ce99aa7f48fe10b95f999c9faac6397875e43e4f3720fde0d112ebc6f347e0980010dd9c06aa93661795681c1a76af1fbc74265c06a7b734292fd

  • SSDEEP

    1536:G1WhwSJ+C917QiZmW1DZR72NIMnu1HyKMryL2xl9uvWyWLpaOLN+5Kg9V2OTWcp/:Xw3C5ZjZR2NIMnuZyvxKvWjaOJIH4Oyi

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\1e8819800cad9225966bcca3d964da937e4f837fb07f0c45b7823bdc749d8519.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    6f0e6d470ffcd8c02bcc229725f83041

    SHA1

    b4188a8889cb6793dc4b82f8c4cf953f50be374b

    SHA256

    06d3fa7dc8289b37134e44a10a7e020d16822306781759cce843978ffe1a9f09

    SHA512

    e34ea28895298fd399a69967adc05e56b3a782de29403921377c75b5e77ce7a15bea72d57e37b9576675f62007afa42f64d4e66e9a9d03574ce2653a0fb74bca