Analysis
-
max time kernel
91s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/10/2024, 21:41
Behavioral task
behavioral1
Sample
48d776d14e2efcb70674742d6cdf5411042b298ce9c075bc81a6c3974ea4b895N.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
48d776d14e2efcb70674742d6cdf5411042b298ce9c075bc81a6c3974ea4b895N.pdf
Resource
win10v2004-20241007-en
General
-
Target
48d776d14e2efcb70674742d6cdf5411042b298ce9c075bc81a6c3974ea4b895N.pdf
-
Size
493KB
-
MD5
8827a43b877d5bd89679a6a0b1002c20
-
SHA1
d3a132d25f0146dbd74466c3ef6cd9c02793eba6
-
SHA256
48d776d14e2efcb70674742d6cdf5411042b298ce9c075bc81a6c3974ea4b895
-
SHA512
10c6d3f4c3081747c3860f8385a6e04cb13b354c4fab8539c7ec1b188bbef17e412228067a6f6c1088b1521190d8787b66b5e6b086b23697aaecd89d6d5cb21c
-
SSDEEP
12288:+DK2CGrXs54EdifQjm2+fgkP2lK4D46dLw+xcWCvBjVT:p2CGdE0oC20xgK406lgvll
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2468 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2468 AcroRd32.exe 2468 AcroRd32.exe 2468 AcroRd32.exe 2468 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\48d776d14e2efcb70674742d6cdf5411042b298ce9c075bc81a6c3974ea4b895N.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d11c9d0fcaa8adfda65ff6e2e6e96274
SHA19813bd013685f197ae8d8ad33fae97d215120e8f
SHA2562705b08683ba8fbd9994ec3307a3322ab13abc4d99de49a3c089d381d73db896
SHA512f21d18f389bb31a17e0247d06b308738962bbbf77f30fab8a073821468b5062cff2d8ad2291499f2fa625a539a123a639a7c64ac87f31374780a932f2a8f69bf