Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-10-2024 02:03
Behavioral task
behavioral1
Sample
8b899ec1e7cfdbfd9c462876762ab18157e3e18448e5c022108678142a984e89.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8b899ec1e7cfdbfd9c462876762ab18157e3e18448e5c022108678142a984e89.pdf
Resource
win10v2004-20241007-en
General
-
Target
8b899ec1e7cfdbfd9c462876762ab18157e3e18448e5c022108678142a984e89.pdf
-
Size
186KB
-
MD5
d2925d5ef655663f1f83db6ca3557868
-
SHA1
598da7bfb90f27c4615e7785de60cbd0ab7b1d6d
-
SHA256
8b899ec1e7cfdbfd9c462876762ab18157e3e18448e5c022108678142a984e89
-
SHA512
23f3677f6e9faa010e4e907e7e4666e417fcde23afe98e34be46ac0b77e5fcc89698f34083fae05a1fe108b6a52eb91a655c766d458aab1c3da6321e2994f528
-
SSDEEP
3072:81+frvo6mJpfpWu7rivhlexaX91W+ttLwK22lXoMgRWf7V8:/jWpfpWu7WXe8Nk+tWKPD4T
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2084 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2084 AcroRd32.exe 2084 AcroRd32.exe 2084 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\8b899ec1e7cfdbfd9c462876762ab18157e3e18448e5c022108678142a984e89.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52b7ce77e69137fa403fbece840fe4b41
SHA1393525da664d80e4c6893f97302d52fc91364b5b
SHA2563faae105b5eea094163c0ea3c593efbc1f17b34d4d5e9e31d70dcb1bfaf78b69
SHA512069f0c77dd66e15c7b0abc481981aca5f61a1201f9918f4e608e5706f1761dd1c33e38d8ab99123fabade4c4b178e024ffa465fe63b574182088a629ae468a36