Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 00:06
Behavioral task
behavioral1
Sample
a062afb1aeb7644b362e90f66850cd757bfd5b2bbc2bb26f54f3f730915221fbN.pdf
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a062afb1aeb7644b362e90f66850cd757bfd5b2bbc2bb26f54f3f730915221fbN.pdf
Resource
win10v2004-20241007-en
General
-
Target
a062afb1aeb7644b362e90f66850cd757bfd5b2bbc2bb26f54f3f730915221fbN.pdf
-
Size
220KB
-
MD5
154377e2fe1e42f7bdccd26f8e36e430
-
SHA1
02bb3125ced7e4265e90a754789401a8361d18bd
-
SHA256
a062afb1aeb7644b362e90f66850cd757bfd5b2bbc2bb26f54f3f730915221fb
-
SHA512
5afd65792836fd9cedf23c997a247c0b05b4a3e129529c501469c79f5f15b1a3808f3cf67a067db3fd0fcf39e84dcde3b1198ba81e8bdec8dbba5f07703f72e0
-
SSDEEP
6144:iI35sEtmL+A081dvDKY2cfEGQGRjnvtwMgVSibLIVaxwcUT3nEXw:p608jvD12YEGQGRjnvtwMgVSibLIVa30
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2772 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2772 AcroRd32.exe 2772 AcroRd32.exe 2772 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\a062afb1aeb7644b362e90f66850cd757bfd5b2bbc2bb26f54f3f730915221fbN.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58b214d4ed7c2031e370aadd632310b0d
SHA196734f4c624f1ef945cdf64940d8f2ed093ea578
SHA256b8a1961524158a2d2469bee46a9bc952d033a27d06218ec87d7ec72b42195fa2
SHA5126f39d138c884c2f7bdfde057fcea7cd714c0ecc4f2b8efa76ee5ba2dc9852516228845d753c43f8b1b4b2e2e52ffe817489703b20592dfdd728c5657c1bda42c