Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:25
Behavioral task
behavioral1
Sample
9446cafe5fc3b5c636f8782c92df53d4178b622ef8d265199c5b63d8e9ca377bN.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9446cafe5fc3b5c636f8782c92df53d4178b622ef8d265199c5b63d8e9ca377bN.pdf
Resource
win10v2004-20240802-en
General
-
Target
9446cafe5fc3b5c636f8782c92df53d4178b622ef8d265199c5b63d8e9ca377bN.pdf
-
Size
188KB
-
MD5
6d72d2ecd549b46f15e36d2945210120
-
SHA1
a34d3a6c75c1c31c230d6b800e5b8a8c3d805dcc
-
SHA256
9446cafe5fc3b5c636f8782c92df53d4178b622ef8d265199c5b63d8e9ca377b
-
SHA512
1e576b622ff22db3f3766bb5d832b7f2d94fdfe1618c9a1a7da1c3a8d2a6459ad6601813fd0bee68d39d72f9af290e30fb0ae07b5251397bbfb109fb3cb44117
-
SSDEEP
3072:FHO2OKGov8hdejnOR+uR+dOOT3hN6Y6ha0jDC95iil3iTjISSQWpeJ+TRSqSDd:FuM8hgOR+LOObhNV0nC9tSTjFCTRSxd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3024 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3024 AcroRd32.exe 3024 AcroRd32.exe 3024 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\9446cafe5fc3b5c636f8782c92df53d4178b622ef8d265199c5b63d8e9ca377bN.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a6300727957146fb7f795a5d13f8d292
SHA16c43e75cbb9f444f7e0e5ecf4858e37df6a8947e
SHA2567d040c7f229777c7231cdace92cd4838ff6be1c40c64e7040115830beee96af1
SHA512ffcb1ed7c9ee9114313bebe17ad1b05f88f3827bfce312204a3aa59e03e2b48b04a353aa4d4988be805f49ceeeb0cf3098bacb7260d532a10fe735535db17361