Analysis
-
max time kernel
95s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 08:13
Behavioral task
behavioral1
Sample
07878279f09a7abd3b7b18901d6ec79eef3e2308e4aabf415986e1acbf18da97N.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
07878279f09a7abd3b7b18901d6ec79eef3e2308e4aabf415986e1acbf18da97N.pdf
Resource
win10v2004-20240802-en
General
-
Target
07878279f09a7abd3b7b18901d6ec79eef3e2308e4aabf415986e1acbf18da97N.pdf
-
Size
76KB
-
MD5
c833e6ecce4b178cd4197c5dd8def410
-
SHA1
a6d0813f27b078466f892eb2bac479e9e9fb8974
-
SHA256
07878279f09a7abd3b7b18901d6ec79eef3e2308e4aabf415986e1acbf18da97
-
SHA512
12e2658e92c9f865675ddf69494d65f2ff82e87a53d6c104e2d9e6ed0f82f81d1b3c7042098991a694b73b48d3ad252e539940230ebdf2f25dc065813ceaa041
-
SSDEEP
1536:adqGVLo8t4ROtfLm9TnOXCgDF2222Whf2Y1EAYjxH:adqGVktAtyOyusp2Y1EBjxH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1644 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1644 AcroRd32.exe 1644 AcroRd32.exe 1644 AcroRd32.exe 1644 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\07878279f09a7abd3b7b18901d6ec79eef3e2308e4aabf415986e1acbf18da97N.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55baa4edd2ed9c60812ab37e63cb1cac9
SHA1760d35e0acefdc2a0da3d6112ac8bfb5184a6a33
SHA2561979588dcfed1c74c27206a2f080047130cc2150339e886f1e23255658747686
SHA512d5ce8680fffab4156f7caeb07d0ed961e2f1b28c9fcf70e5588b2502517dfcc9febe179ecfc53c576f6db020d5840480318fff853f7750029c2861f90c1cfaf2