Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 13:14
Behavioral task
behavioral1
Sample
2da1c249d3743f873e8d7f65fcc8e7e0N.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2da1c249d3743f873e8d7f65fcc8e7e0N.pdf
Resource
win10v2004-20240802-en
General
-
Target
2da1c249d3743f873e8d7f65fcc8e7e0N.pdf
-
Size
57KB
-
MD5
2da1c249d3743f873e8d7f65fcc8e7e0
-
SHA1
fe217e479104d88a2e9b62a2abdcf3445b99468f
-
SHA256
7497da2abeaf31a7663a688434b35d6da0825ae5ef33e4e112368a0428bce73d
-
SHA512
e350320d1e016b70decd3db6aed50b030c5751929efa2fa677f1759c7e9f94276d37bf1d3a4632ada4c5b1c8745638500c6e1970c48762ed4967b2d4cd502b34
-
SSDEEP
1536:2IzIW1dMV+foY5JxgJ7OIGCH8AT04cCa0111rR:qWHMkZg7OIGCcmtcCfR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2884 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2884 AcroRd32.exe 2884 AcroRd32.exe 2884 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\2da1c249d3743f873e8d7f65fcc8e7e0N.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5892ae01ed091fb13b5f91703b118fc27
SHA18e6acc789f48211f1072fcd1e078d2973dca82f3
SHA2563beac950765addc72c20fb8780bf3aded49e891288c245212ae3754fabaa2b58
SHA512862e7c67e929a2d35bf6ebf2f5ea9591d58915cd6a891203c56b39a0b071a13318b4da4de41ab6f54c02c3e08f707439a2837bd26ac1d7faaa0125138479e7d4