Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-09-2024 23:59

General

  • Target

    f9918eb7f0bfb06425a16f79684e374404cf1363cf82b7c5cffb6f69e7b1c0c4.pdf

  • Size

    83KB

  • MD5

    c8eda71647f7ce6b808a12e996f2a387

  • SHA1

    53190fcaa1e7b68e5ba81e1bf615ac19ea401ad4

  • SHA256

    f9918eb7f0bfb06425a16f79684e374404cf1363cf82b7c5cffb6f69e7b1c0c4

  • SHA512

    8a6bb7fac3db449e0be2b6ae5d689b18f44b6713f9b4082826257260e19489565de167b1ee418d5d7735f5325297be285cc6fd2c3ad8573a080512c685d97b95

  • SSDEEP

    1536:ha0Poq178BupfE04pW5hQdDQoY6FHPdqu/nWkIiW3ak0fR0HwWQpOClZx3Bsmv:bAqQudEMQVtVFHrPhINaku6HfClZx3D

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\f9918eb7f0bfb06425a16f79684e374404cf1363cf82b7c5cffb6f69e7b1c0c4.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    cbf2775601ad91974102a870c4caa8c1

    SHA1

    382705af12249be3ec218ab56dee01a731440a5b

    SHA256

    acb1de8e5b1c360049c1acf352e416ed1824936952b9a7ee866ecd98a0f11301

    SHA512

    659c43478f9755922caa67cf790e8e4021f8fa94f60068d265683cbf425c958fb350883670e7fc6e7ffda0bb21c4884a643f70da49c520b8fb46e2716ebd1f4d