Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-10-2024 02:19
Static task
static1
Behavioral task
behavioral1
Sample
001.赤湾停车场钢连桥-连桥柱锚栓(一~五区)-加工图0版-20240905(只加工22个��.xlsx
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
001.赤湾停车场钢连桥-连桥柱锚栓(一~五区)-加工图0版-20240905(只加工22个��.xlsx
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
001.赤湾停车场钢连桥-连桥柱锚栓(一~五区)-加工图0版-20240905(只加工22个��.pdf
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
001.赤湾停车场钢连桥-连桥柱锚栓(一~五区)-加工图0版-20240905(只加工22个��.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
001.赤湾停车场钢连桥-连桥柱锚栓(一~五区)-加工图0版-20240905(只加工22个��.pdf
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
001.赤湾停车场钢连桥-连桥柱锚栓(一~五区)-加工图0版-20240905(只加工22个��.pdf
Resource
win10v2004-20241007-en
General
-
Target
001.赤湾停车场钢连桥-连桥柱锚栓(一~五区)-加工图0版-20240905(只加工22个��.pdf
-
Size
819KB
-
MD5
10134e01f9e345110210ab071e4fa0d3
-
SHA1
d5ffa45bf293e3c44664dc9af961d6fa05b27ca5
-
SHA256
24d6749dcf94e70a3cb2f12aa898f1827145c26f7e4c013b0f769069a63370e8
-
SHA512
0c961742c82bbd7df7c68ee50b02d13345b349f1b73628e96921bd08f9ecdb593f2383a4745de35b0c973bd1c6144dbd01c1afbbdc4abc76c43fd4379ec7c652
-
SSDEEP
24576:KLZAB4H8tidbyps0EeObWCypb2DPMUH+rERT:6BMiFis/ekWCypbOPSERT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1252 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1252 AcroRd32.exe 1252 AcroRd32.exe 1252 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\001.赤湾停车场钢连桥-连桥柱锚栓(一~五区)-加工图0版-20240905(只加工22个��.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD50e1cec6915dcda534d247d8cc9f7a66c
SHA1337cdc86446b358701f7145882c8fb811f7e0d44
SHA256abe74b88bbd64bfd673c6baa07e41c0b5b82f8739d551e2197858065b3615ba1
SHA51283114d5303b29efaa338a0dd24d1319f77e274f2066d7ebbe3588f710a76397efba81627057f686af091f5964529079e6aca2f41b9f95e9686432864ee9de45b