Analysis
-
max time kernel
94s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 16:09
Behavioral task
behavioral1
Sample
bc6d417438099712ac5c3be569de78c54eb05997c3da320205bc787d4d9a40e6N.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bc6d417438099712ac5c3be569de78c54eb05997c3da320205bc787d4d9a40e6N.pdf
Resource
win10v2004-20240802-en
General
-
Target
bc6d417438099712ac5c3be569de78c54eb05997c3da320205bc787d4d9a40e6N.pdf
-
Size
57KB
-
MD5
3f8894045108f4524f91a2cfcad804b0
-
SHA1
bdde51491a6363acca9a639ca9c39ba251737ec4
-
SHA256
bc6d417438099712ac5c3be569de78c54eb05997c3da320205bc787d4d9a40e6
-
SHA512
a1e3173a2bc54811ba30764421c78dcb5c740d827eef740eee115c29440534f72d3c2fc9ee0062c33e898e248892763c8f74056b805fb3526087c76ab777f2df
-
SSDEEP
768:4uzdNIggou41dMV+foYlP13pQIOVNo6LF1T0vFXSTq8XyGubkO:jzIW1dMV+foY5OF3g9+q8iGubkO
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2348 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2348 AcroRd32.exe 2348 AcroRd32.exe 2348 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\bc6d417438099712ac5c3be569de78c54eb05997c3da320205bc787d4d9a40e6N.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a185e3456c87f21f65c5fa035d5475ff
SHA1573e4ad2c8f985a6ac98f8b89acc3cfadaa3fa01
SHA256965ab8b3bd4e8cddcba3da355c640cc6c7bdd10c22b9b634eebe8be769ec0f1a
SHA5129c0ca8d5b4944969d71c28ee406fe883278e7fd37bdafdd99fecac304fe4115b2b5f88eaf22e839c79f1cf834d38acb75b6e7ae911ffce449b4ae7a8f7e4a652