Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 19:02
Behavioral task
behavioral1
Sample
f4e9111c63978df30897bd508d49a8ca0cf5d0905f1b357d8198657fbab65839N.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f4e9111c63978df30897bd508d49a8ca0cf5d0905f1b357d8198657fbab65839N.pdf
Resource
win10v2004-20240802-en
General
-
Target
f4e9111c63978df30897bd508d49a8ca0cf5d0905f1b357d8198657fbab65839N.pdf
-
Size
75KB
-
MD5
5bbf34427f92211edb8989a16f87a920
-
SHA1
4e5b0b95bd21a784439a6a96e3d4fb1af7954321
-
SHA256
f4e9111c63978df30897bd508d49a8ca0cf5d0905f1b357d8198657fbab65839
-
SHA512
00cdc035bf259cf7273360c22b6767c1fc382c0e81d30c564f0888f34e008176433a19229d9d9eff07b2401aff7b99446f70737d2c3c0031a69882d4a5434edb
-
SSDEEP
1536:idqGVLo8t4ROtfLm9TnOXCgDF2222W1TeQyfzyx:idqGVktAtyOyus1NIyx
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2208 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2208 AcroRd32.exe 2208 AcroRd32.exe 2208 AcroRd32.exe 2208 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\f4e9111c63978df30897bd508d49a8ca0cf5d0905f1b357d8198657fbab65839N.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5aa1709eb9ef5413aa308943ac25da8dc
SHA19a90df3a4c42ab77b16e748d2651f7fb419bd435
SHA256e0aaf354bb082854dd77d8d080d2e0f4b5953673daf5dc365b0eeeae8f70be42
SHA5122c0a73eb2719a366b5a9e37691316ba19adf7f7f919c3e81b286866a270929ef810b0bc60a0db1b44b1126b4953ade20023b12f854eb9b60aaa478decd47a67d