Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 15:21
Behavioral task
behavioral1
Sample
侵犯著作權的圖片和影片證據.zip
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
侵犯著作權的圖片和影片證據.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
msimg32.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
msimg32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
rename_me.pdf
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
rename_me.pdf
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
侵犯著作權的圖片和影片證據.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
侵犯著作權的圖片和影片證據.exe
Resource
win10v2004-20240802-en
General
-
Target
rename_me.pdf
-
Size
130.0MB
-
MD5
f158d3387c6e2cb1b482f7b7abee7e20
-
SHA1
9aadedb8049339dd027a45bc733caa1f6f3dc7a9
-
SHA256
c052369f476b624913e8aec1a3ba729d30b5d5f145c4c5c58d64f7d09cfa54b5
-
SHA512
93e92533c93d966007eaf6fb35772e362326eb8bd321f1db28cfa98943277589a393081157a8832f162776127eb91974e3f93a2ea3475e936db1f228973bc40e
-
SSDEEP
3145728:96lH+byk0ZggBznCh2HCea5bQ92NmDVr9XqnZGWp:
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid Process 3032 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid Process 3032 AcroRd32.exe 3032 AcroRd32.exe 3032 AcroRd32.exe 3032 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\rename_me.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD548883e780749f5d4bcac196757299e43
SHA1b4afdf76904d71c83b955d25454737d520d38702
SHA25684bcc4d91e8357c2a2a9351da5c0c4b3351dc4cc34a6b35b9909a1389898aab8
SHA512c197c412939584384d73e1f3e5df1330a46ef466187b3f23ed626f45325ec58306c2bf983af1e6e2166dfb75a26e0341bf2ed5085dc7ff5426dfd5ebc52734c7