Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 15:29
Behavioral task
behavioral1
Sample
Packing List, BL Checking documentation/BL, PL and Receipts.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Packing List, BL Checking documentation/BL, PL and Receipts.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Packing List, BL Checking documentation/BLChecking.pdf
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Packing List, BL Checking documentation/BLChecking.pdf
Resource
win10v2004-20240802-en
General
-
Target
Packing List, BL Checking documentation/BLChecking.pdf
-
Size
2.6MB
-
MD5
fad36874ff0a6792b7afc542c3fbaf91
-
SHA1
fa1c1b8f04b84564471b0dbde2b46f045d334be1
-
SHA256
af5680454ba5d8e0ff8867ca338e7e6853fe21c9e9195b7e94a425f7757c27f2
-
SHA512
b22f7afc0f14b3e8f116d48ea012e9fa452e54731018c4a65632bcedaf39e334fa9b3c9826086d15bef146d14b74d3a1eb9987dff3885aedf3a02b7d8da44265
-
SSDEEP
49152:1OAnOw8SsiP8hnv2vq56lEEmSvPdjTWmLgM/Zhe2ir+qbaypVK6YU79TFc0F7:1OAOJiP85156lBmMjp7e1pc6XRxc0B
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2352 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2352 AcroRd32.exe 2352 AcroRd32.exe 2352 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Packing List, BL Checking documentation\BLChecking.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f090219cef3f7252f4a0dd42bdc0221f
SHA1820d897000dd826a32af10d375100c1db47c1133
SHA256f4d2c28265afdfbd49859f4e597837c8c68b91903c3f6c57c686e56d29d3947e
SHA51206a4735ae249fccbf1a76c66049c692a4abcbefefb5da715e9b95144aad22a5a6ed692730a981af5fc37807e6ecde616101b58a611601cf35f9c070fb7ad107d