Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 04:51

General

  • Target

    748fe2c5e7b74f06730de68428c2fbb1583683e77867a9582f938df5983f35a3N.pdf

  • Size

    60KB

  • MD5

    5971aaade5635f85fe37bed89f281ed0

  • SHA1

    7b0f66ee3f7f6af3834e13ca6a79fe87c1c3f49d

  • SHA256

    748fe2c5e7b74f06730de68428c2fbb1583683e77867a9582f938df5983f35a3

  • SHA512

    d70e5ac054bc9052c1eb2153dfbfa0ee24fcf78e7196008d120edaf12347259558b287c3096ef3135e9d1b0087087a1582d5fc8a686a68f62de5ae875a885c45

  • SSDEEP

    768:guzdNIggou41dMV+foYlP13xLBrw9ShHhS7/3WUsOoJUKdUMhItWtIBp:LzIW1dMV+foY57FEs8L3XsfmKS3tWtIX

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\748fe2c5e7b74f06730de68428c2fbb1583683e77867a9582f938df5983f35a3N.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    2a6a19cd3f8f0732f0b36ed00efc9bb5

    SHA1

    f581e342397c722f14db6493e0257bbfc2be4a20

    SHA256

    a56b7380f2fff61457ef3807417b33b16826f85be8dd3ebb1d6ff14d7eb5bde8

    SHA512

    29ca1d0b0109343a55c7b82eacad0177c0e8106f81b4da36af3e847ad3035ec3e54d72715f12fc776ebd57a3d6ce12ea14870c24c336ccc8f597a99452dbaaf7