Analysis
-
max time kernel
103s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-10-2024 03:26
Static task
static1
Behavioral task
behavioral1
Sample
003843e1547dc627873b7af000133be7883afd700a7ddbd42d546d87d166324aN.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
003843e1547dc627873b7af000133be7883afd700a7ddbd42d546d87d166324aN.pdf
Resource
win10v2004-20241007-en
General
-
Target
003843e1547dc627873b7af000133be7883afd700a7ddbd42d546d87d166324aN.pdf
-
Size
103KB
-
MD5
e88a8c8a2fcba48cad472c2b07d047e0
-
SHA1
f55dd14bdbbcf5d4d081185f2f30a06ffb7f69ff
-
SHA256
003843e1547dc627873b7af000133be7883afd700a7ddbd42d546d87d166324a
-
SHA512
b80cbc727cc0127143e4e9fb5b3a22a026846b85a8501c400352af31198aff51bfe7893d7f5befeff13123a74310a1046611ad788fde5431fcf760aa8c4a151e
-
SSDEEP
3072:pJo0pWQPuf+eRZNnUh1cmXjKvNNovkGlr:ph4QPuxBUjcm2FNMkGR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2376 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2376 AcroRd32.exe 2376 AcroRd32.exe 2376 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\003843e1547dc627873b7af000133be7883afd700a7ddbd42d546d87d166324aN.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53b815172242d195d9e8c0ccf51331595
SHA1aaf9fca86c9e9a9364b38ad52251fc48d34dec7a
SHA2567b42b5253b15e45a31fa64048465c245db6320d53f74d1404ce8903a98107c87
SHA51220e380623c68d66f3a0c895ed51de2f971e1819e96186acf5d12dbef55e20e8159e0559e4c5ddd4704227ebeb36a8325d9429fc67d05b343b147352b72cbdc16