Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:25
Behavioral task
behavioral1
Sample
a69a63f6f10f92b039d8be2cd9efe0a85fdf193ed9211f161962560435531d65N.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a69a63f6f10f92b039d8be2cd9efe0a85fdf193ed9211f161962560435531d65N.pdf
Resource
win10v2004-20240802-en
General
-
Target
a69a63f6f10f92b039d8be2cd9efe0a85fdf193ed9211f161962560435531d65N.pdf
-
Size
5KB
-
MD5
e90569b407361f758df82d57f0712210
-
SHA1
ad96361b0950d2c822760c6083b5fa9d0331ced8
-
SHA256
a69a63f6f10f92b039d8be2cd9efe0a85fdf193ed9211f161962560435531d65
-
SHA512
5417d714a03bdf27fb81bdbb439890438041239cc97854114a1aacc368927b1e26e769f61cdb3a64f05f19dfc7ff54797ed4ef477540d4e0fb33e78ab9ad9f5d
-
SSDEEP
96:8YmavOl2UgJJnXaXRDppZQKlk5G5j8RO5Ihjpl5pM407zKI/AtgReG44S2+:Rvv0sJnq7VJWOOL5RYct84j
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2316 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2316 AcroRd32.exe 2316 AcroRd32.exe 2316 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\a69a63f6f10f92b039d8be2cd9efe0a85fdf193ed9211f161962560435531d65N.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5711f3b7ffab8f2a7abae694ca8a8825a
SHA17dd672349425a936b8fcf9d02b3daa599e55eec7
SHA2567f0ac0473c83c8f6638e307e2d331376ceb1544bf78fc7300d5ab5e05f7c3651
SHA512138c4e0c070524cdb37a86821ab813e631cb7f6c4becc995c77229d072c3a57569067f82e24899efdbc43434c4f26e48c690a13ce0a6c247e09b6e3f3c0bbdec