Analysis
-
max time kernel
3s -
max time network
1s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13-11-2024 08:21
Behavioral task
behavioral1
Sample
Message.pdf
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Message.pdf
Resource
win10v2004-20241007-en
General
-
Target
Message.pdf
-
Size
86KB
-
MD5
3550dfa2f401198845a983d606591dbf
-
SHA1
7427462cc94f2b16f8f3bc914a982d09496e163c
-
SHA256
79746c52e20ca5c99ce065b5e2f797e5374a9dff6682b2536e2c6365f9b89079
-
SHA512
601939b7c0271230b771a203b79bbc9b70f3436c58e65afa39153ee35f6d09b457807bb727aea9ac7c2e1d9fc50bf45264ea25e79c978699c23cea64505da562
-
SSDEEP
1536:QmimEyJTVVVVVVVVVVVVVOsbRnlhT1b/b/aqPSXYaoH3AlOl9za//Ip:nimbxVVVVVVVVVVVVVZ5/xKXYaoH3Al4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 2344 AcroRd32.exe 2344 AcroRd32.exe 2344 AcroRd32.exe 2344 AcroRd32.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD59716629ac2499b1e26cbe81c2b67ed3f
SHA148122e91d28e07437c38c753fb7bfe4b65223121
SHA2561cacbb6273e0154dc7e090232f154d5da5a2ed3eae74e9447213b88efeb38b53
SHA512fd05f2a4e8129da872055375d38384b5fdd1f4ec1058f01913f76f1d9019def6602680fa4c3f3f52e72e95cbc62106be9d18bb9cb8b27173cece68a8438b4f60