Analysis
-
max time kernel
94s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 09:20
Behavioral task
behavioral1
Sample
3468e683bd3de37c9b2f9b45cbb821622ae176f4862f368055cad420af44bc89N.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3468e683bd3de37c9b2f9b45cbb821622ae176f4862f368055cad420af44bc89N.pdf
Resource
win10v2004-20240802-en
General
-
Target
3468e683bd3de37c9b2f9b45cbb821622ae176f4862f368055cad420af44bc89N.pdf
-
Size
294KB
-
MD5
736a502d5e4d0aa6259cc879192544e0
-
SHA1
c495ab937571361658816095ca1d6f4f8fa0d27f
-
SHA256
3468e683bd3de37c9b2f9b45cbb821622ae176f4862f368055cad420af44bc89
-
SHA512
a23a2287c6734ecde5c5aad3d003b768fae0fc7c495fe763682e4806f7b478e4bd062553c612c15dc2f0a5b9da7d43b7905fe6ba7b56678a18fc332738f73779
-
SSDEEP
6144:ELb3rkq4mgUMRIgXNts/caZAZGJ6AiQDu8unnuh:EfgcUIKNCDZAQyQu/I
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2420 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2420 AcroRd32.exe 2420 AcroRd32.exe 2420 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\3468e683bd3de37c9b2f9b45cbb821622ae176f4862f368055cad420af44bc89N.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD50efa174c3a8a575f7fb913297f8d921f
SHA1a791c30e13b9f887fc025646cf5a692475439df9
SHA256ef180185dbb6f2bede6f5b55234b03ca58d9dad64899619e83f9f9c4a3b4359d
SHA51255c310a802719200b2430c42d681ddd6cc144682975170b2a112a32cbc7deb277384fedca59393ced3c29798a3a9271d60fd08b19049bbc7c3e186dd1e5d3bc1