Analysis
-
max time kernel
92s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 04:03
Behavioral task
behavioral1
Sample
0da0271ca79cedd1a93449df80e42e0dfc6293aaa8bdb6194ae255c07aa303cdN.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0da0271ca79cedd1a93449df80e42e0dfc6293aaa8bdb6194ae255c07aa303cdN.pdf
Resource
win10v2004-20240802-en
General
-
Target
0da0271ca79cedd1a93449df80e42e0dfc6293aaa8bdb6194ae255c07aa303cdN.pdf
-
Size
112KB
-
MD5
41132f44a622ca7c7c211e6d83979ab0
-
SHA1
c7206aa899cd08448ef8848f93de84da8eec32a7
-
SHA256
0da0271ca79cedd1a93449df80e42e0dfc6293aaa8bdb6194ae255c07aa303cd
-
SHA512
c80516dc3c13858531553a3f5e6b10070d330a71027e5c2679d5e60b3cf120e3c2ed76a98260058f8f2b33f4fcac8abbb404f5b441c0ffe8a9f52a1add92602a
-
SSDEEP
3072:xOAISyvJuJz0zHX7XJHDgJRrZ5OhgiyUa2q1x/o2J:pWJuM9HsJRrydjE/dJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2720 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2720 AcroRd32.exe 2720 AcroRd32.exe 2720 AcroRd32.exe 2720 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\0da0271ca79cedd1a93449df80e42e0dfc6293aaa8bdb6194ae255c07aa303cdN.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD537bb85395663236bdad4ba49601be3e7
SHA118f5e02879339289dd7f78bd1190e2c1df8b8a29
SHA256fdc26bb9f1e1d14c7b27b1819904170c4dbbc0ca840619c77398c0fb23ec4479
SHA51217afd35e77caf2277db93323de4ebb542ef43f00e8198f116935ddb85e8bc15980ac0650660976a2efac48404926d08e3a18c62492a1762f995df6d6412b2c40