Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:25

General

  • Target

    a69a63f6f10f92b039d8be2cd9efe0a85fdf193ed9211f161962560435531d65N.pdf

  • Size

    5KB

  • MD5

    e90569b407361f758df82d57f0712210

  • SHA1

    ad96361b0950d2c822760c6083b5fa9d0331ced8

  • SHA256

    a69a63f6f10f92b039d8be2cd9efe0a85fdf193ed9211f161962560435531d65

  • SHA512

    5417d714a03bdf27fb81bdbb439890438041239cc97854114a1aacc368927b1e26e769f61cdb3a64f05f19dfc7ff54797ed4ef477540d4e0fb33e78ab9ad9f5d

  • SSDEEP

    96:8YmavOl2UgJJnXaXRDppZQKlk5G5j8RO5Ihjpl5pM407zKI/AtgReG44S2+:Rvv0sJnq7VJWOOL5RYct84j

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\a69a63f6f10f92b039d8be2cd9efe0a85fdf193ed9211f161962560435531d65N.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    711f3b7ffab8f2a7abae694ca8a8825a

    SHA1

    7dd672349425a936b8fcf9d02b3daa599e55eec7

    SHA256

    7f0ac0473c83c8f6638e307e2d331376ceb1544bf78fc7300d5ab5e05f7c3651

    SHA512

    138c4e0c070524cdb37a86821ab813e631cb7f6c4becc995c77229d072c3a57569067f82e24899efdbc43434c4f26e48c690a13ce0a6c247e09b6e3f3c0bbdec