Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-11-2024 23:43
Behavioral task
behavioral1
Sample
c97ed89d6f57e16c204ec2016a9b2b1923e08bd6300ea2ea5baadf7bff73137aN.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c97ed89d6f57e16c204ec2016a9b2b1923e08bd6300ea2ea5baadf7bff73137aN.pdf
Resource
win10v2004-20241007-en
General
-
Target
c97ed89d6f57e16c204ec2016a9b2b1923e08bd6300ea2ea5baadf7bff73137aN.pdf
-
Size
467KB
-
MD5
348d3385a9c2c0d04890d04a66fd7820
-
SHA1
3f4029aa7de9cd6fdf007ce04a07f49718275b73
-
SHA256
c97ed89d6f57e16c204ec2016a9b2b1923e08bd6300ea2ea5baadf7bff73137a
-
SHA512
6bea021723e06c517f63ba11a9f926e518e821895021e4a6bec8702d639301c483177701d1746c0b484a5e2dacc83dca02ccc5164dcdab82f159f7913ad766cf
-
SSDEEP
6144:YNPOGTz1Zps0hGNLsPDwl98RS0OIhxEDW53nVK7e1UifDBpEcIryizmlY:MhjrLwlH0xa2V4e1UiftpcyiH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1848 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1848 AcroRd32.exe 1848 AcroRd32.exe 1848 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\c97ed89d6f57e16c204ec2016a9b2b1923e08bd6300ea2ea5baadf7bff73137aN.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5aadd21b65048965bb3653dfff0e3f309
SHA125b419e73da3ea7fffe89d496ead0451fd42f801
SHA2567d9f5578d03e2cba3887f9ff46288cf2e998f74925f5da5d19467b16440f8448
SHA51240ed106daede7b2324785241c185cbcad35e266e69ca0607fb26c8cc054e5750c86f6ee570bdb533bdac0793b56efd8cdbb5aeca88e100d31045b85e0f085712