Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 19:10
Behavioral task
behavioral1
Sample
Crackme3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Crackme3.exe
Resource
win10v2004-20240910-en
Behavioral task
behavioral3
Sample
R4ndom_tutorial_8.pdf
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
R4ndom_tutorial_8.pdf
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
tut8.htm
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
tut8.htm
Resource
win10v2004-20240802-en
General
-
Target
R4ndom_tutorial_8.pdf
-
Size
567KB
-
MD5
84727f4f5aae490fcbc5f0943b95679b
-
SHA1
23ffe55ece26b52e662238237ca02461cf1edb9f
-
SHA256
ba60a33a9f8bd44b2f2dc8b0a597af040e96d5d67cd810742931572de78ff78f
-
SHA512
b797b9059f56b40645cc456a6081e003c0b19048f1ada627f63d7342a98b12632a8654e393fe0af910ca60d5a29e7e4c89a311a33f664d247123594709bb2b12
-
SSDEEP
12288:AXFgtlCf7SWzisT77Z7wErM7u5vyR+UwE54:A1gtlCf7SWHnryu5g+UwEa
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2944 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2944 AcroRd32.exe 2944 AcroRd32.exe 2944 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\R4ndom_tutorial_8.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5caadb47fb3e1a955174ee26cd83671f2
SHA1a46c19dda77a044b4ae962af374adacc8ded151a
SHA25628b7a459d9ae59638fff6a1104d8cac4e5d3535165f60c3e53ca5b85ae4ba11e
SHA512d47ab9ce3d1d653a8cde25c79a876b9150f2e09a8dde1549bc8d229dc6314f6c67be2eb1a82fc150ce7d5ac061d0b37b130b1dbd131422aa8d1f34b1d1cb34d4