Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 02:49
Behavioral task
behavioral1
Sample
1c609ac35eb26966c384f9ee44ab0400N.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1c609ac35eb26966c384f9ee44ab0400N.pdf
Resource
win10v2004-20240802-en
General
-
Target
1c609ac35eb26966c384f9ee44ab0400N.pdf
-
Size
217KB
-
MD5
1c609ac35eb26966c384f9ee44ab0400
-
SHA1
37cf55fbc898e0223a14777ca4b9004f33567690
-
SHA256
93dec1d8f3d945ea16ad4e4c8badfa0717167979e800c3c14f93148b3dabe436
-
SHA512
d3b0bd7e0b037bfc13e2187ad4e518f3575d0a1fca1dff275f820a1ae34d35ae8fdd3a32bd9278886dbb6b802074d809fdcd42d6a82c754876f6ec130b6535ea
-
SSDEEP
6144:ghv9rncKr+a+CD1CV+rCgKdL7VUNLuoz3NKK:6vZOCxI+mgKAz3wK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1488 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1488 AcroRd32.exe 1488 AcroRd32.exe 1488 AcroRd32.exe 1488 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\1c609ac35eb26966c384f9ee44ab0400N.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f605adf83e372db87e4774a2cb035ddc
SHA17e959825c3d17c99c6eac2cb9a7a2c2b5f939eae
SHA2561d55c842e09ac0a22c4945be3f90508d23eeef679ba1a0b875300fac458fd7cc
SHA512cf220f7e76b6ad29ed8bef7757c5639ba8d30bb781499a6b6a6a3eba3b04f850a0fcf18814d42c386b89b0445df296e473a8db86ebcf4a90ccbda94ad607808e