Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:41
Behavioral task
behavioral1
Sample
EXT24-00135005.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
EXT24-00135005.pdf
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
OFI24-00184459 GFPU.pdf
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
OFI24-00184459 GFPU.pdf
Resource
win11-20240802-en
General
-
Target
OFI24-00184459 GFPU.pdf
-
Size
134KB
-
MD5
a5ca4b5841ddc098426cac1f1999b393
-
SHA1
5539db779e0f50a0c13781ef65c7e1a74128c80a
-
SHA256
45465998501ca95e96b0e144ca844a3433bb4015b62519d409575325b10821f8
-
SHA512
f9522b5e40d77f1453042e13d9d862704370c7ed16f8eedbdc665d4900b88cf43456cc107c249a97ef733a714cc9aada731b9a75fb3dbb80e0ffea3ca151dbbf
-
SSDEEP
3072:Vcxf/UbGA05yyEFeXmHSiEndpeYzVLN7cworN:Vyf/7Q5FeXGvkpecVLmRrN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1756 AcroRd32.exe 1756 AcroRd32.exe 1756 AcroRd32.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5af2f6992905c3f88c24aba2f0c2502f1
SHA1554d78b1de010613bd5743cfaacf7669dccbd025
SHA2562d75021c20e570940b3fc3d2660237f3f5ed3627c5b7477ecb4090e6cb86fdfa
SHA5127eb802480a0cd26d0360d00b9be525a2c166c04b275fce0abee45909da3d20984d49fc972b3f56467d2a1573e8b7d559719d51d208d6944a347930984d797278