Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 12:32
Static task
static1
Behavioral task
behavioral1
Sample
9acd133a3c1b909d45a9e3e6d598de463d781c3c24fceeb889f2b56612a6e5e4N.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9acd133a3c1b909d45a9e3e6d598de463d781c3c24fceeb889f2b56612a6e5e4N.pdf
Resource
win10v2004-20240802-en
General
-
Target
9acd133a3c1b909d45a9e3e6d598de463d781c3c24fceeb889f2b56612a6e5e4N.pdf
-
Size
85KB
-
MD5
c00c854f1684a85898b6c00d116f2630
-
SHA1
e8f35fc3c14edd9deb622af354325f0ab567c008
-
SHA256
9acd133a3c1b909d45a9e3e6d598de463d781c3c24fceeb889f2b56612a6e5e4
-
SHA512
4db5c6e6241a154a8b87a537218ea1b6c1bc765bc960cc09698a91ba014171e7a4f8082375e50ef5357b6344052860f652bad8df897f5435c4a11e921461a40c
-
SSDEEP
1536:DmRPVU1HHobbYrtMkzweXI4150Z7gCxicnnuwp22tcrnhyiFs7rVM4e:KRPRb+wef50ZscNnnuwsa+nhPFs7rVMt
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2792 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2792 AcroRd32.exe 2792 AcroRd32.exe 2792 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\9acd133a3c1b909d45a9e3e6d598de463d781c3c24fceeb889f2b56612a6e5e4N.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD548db0768cc183f2ac93b430e85bd2e69
SHA12b655dfe3ea8b1e66aabfe3d6c619bb21224f4c6
SHA256400d349a4b0257fde75ed08bc6c418ce0e40d421a1afb7e13a6d2ea3a534eb1f
SHA512d5eb9431717ef5b993d008e7cc5375ea804bf0dba307f49f1b4d2c45741c6ebf6536bd534d315cb76baeffe0a772806723164e5e8e1f2013d5e909c2ba53ec7f