Analysis
-
max time kernel
94s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 21:00
Behavioral task
behavioral1
Sample
f06363a85c100d12d8fe44c266636be0bdbdaa9a043eeba525a189b59873ff07N.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f06363a85c100d12d8fe44c266636be0bdbdaa9a043eeba525a189b59873ff07N.pdf
Resource
win10v2004-20240802-en
General
-
Target
f06363a85c100d12d8fe44c266636be0bdbdaa9a043eeba525a189b59873ff07N.pdf
-
Size
53KB
-
MD5
e612c174391270f36e7b5fa933d0ec90
-
SHA1
dd96066b411d56783c0d493df2e2dcda0063be89
-
SHA256
f06363a85c100d12d8fe44c266636be0bdbdaa9a043eeba525a189b59873ff07
-
SHA512
1943b839854ab8a145aae453680b698a873afd43dbc63e9b3aeb206f212573e624d1c39c5072a8c36110f1eaa47c42bc189c4aef7ca197a862bafe1bdfd2bda4
-
SSDEEP
768:SyuzdNIggou41dMV+foYlP135E7RTAxaM38vmXBo1vpEA3L8fvxvWrV:WzIW1dMV+foY5UpO8vmRoIuKxurV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2104 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2104 AcroRd32.exe 2104 AcroRd32.exe 2104 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\f06363a85c100d12d8fe44c266636be0bdbdaa9a043eeba525a189b59873ff07N.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD534c5d62a749d80e4f6104f09b1d56b8e
SHA13a20222802435f9e96595e47e9d511ab9f6e07ac
SHA2564bdfa388cfba9031435c097f0069a8285e375fd04039ac8d2ff7b8c86804c7af
SHA51280319221f28270ee7e5eee26dcdf7b58751fce3d2113f50a9f111cfa3cc25e2327a05f5d95905de5009a500b58ad621970300a1e07796f64da9710b02ecbcb65