Analysis
-
max time kernel
95s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 12:24
Behavioral task
behavioral1
Sample
9ba540d262377588f45a5666cc0a9c60N.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9ba540d262377588f45a5666cc0a9c60N.pdf
Resource
win10v2004-20240802-en
General
-
Target
9ba540d262377588f45a5666cc0a9c60N.pdf
-
Size
488KB
-
MD5
9ba540d262377588f45a5666cc0a9c60
-
SHA1
5f6eab5dcd4ff4442abac8de20cff7ffa9727ea1
-
SHA256
bea90b21e98284216ec52f1f56190193b0f8cb679103d6f41459e3cf12c79340
-
SHA512
8377a741ecd412476a970ca0bc5438eabe3acd2dac8dd7f0235e9f0761003e1556ac6543e38c6aaa8d1c10e517c1a0e0942524ed12e34de069a1c39f7bcfda38
-
SSDEEP
12288:MagrEjmnmSWARSKN8VHPVwEZC1P0tvOBOT7NdmhjMF:RgrEjPSWFKYaUis
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1872 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1872 AcroRd32.exe 1872 AcroRd32.exe 1872 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\9ba540d262377588f45a5666cc0a9c60N.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD56d6d251d3dffbc4cc4165f010f6368b4
SHA15f07cf78823e52d01daddd65d2d6f94286af2294
SHA2567602d418bd0ade4f386443a8212152f5262ccc7841087b3df97cfb30066e5bae
SHA5125038f5d16bb529ea214d8b30d80cb82fea8deeb1f630a734a19d84f3079960fb02b9e12557b124c1f84ddd2579bc670656b1393c13845f4e5a56335eda0a70a7