Analysis
-
max time kernel
134s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-11-2024 12:03
Behavioral task
behavioral1
Sample
Service COMPANYNAME (1).pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Service COMPANYNAME (1).pdf
Resource
win10v2004-20241007-en
General
-
Target
Service COMPANYNAME (1).pdf
-
Size
36KB
-
MD5
0c8378428b81b02e3b027b8e7fc41343
-
SHA1
9b95083808dd9d4dee45faa283da21eeceeba033
-
SHA256
ccbe69634ce05a1eac0b46412ae232ee1f302490e8c3fa6c7d9a393c85afc8a7
-
SHA512
4491b4c7304d06d1b65569fbf1d9b4062559cadeed198b66c0d4ef7c95977e6de6a4c98c85e380b1a10d16ebc6a5196d4f9d7c7bfa99afb07e555bebefa5c9d3
-
SSDEEP
768:9xRzk1tUDopLFseJAbJBBYEaZjRNCPSL5EtOJUsS:9LutiopZseGC1ZVNA85bxS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2504 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 2504 AcroRd32.exe 2504 AcroRd32.exe 2504 AcroRd32.exe 2504 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Service COMPANYNAME (1).pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5732aa9a9cbf9551d4b0ca5ac76564fd8
SHA1044aa4dcf1f072934e2b77b0ddff3039b44cfe11
SHA256ac3395020bdbbc316808680c97a57f0d7ad36d7586d781b42e145f006bb6207b
SHA512f2c7c2a94fdf3b9b7df72dc8309e07eb435b47ed1186af6f43f859e8067196a33fe9552184d20cef6215fad41d9141e03d2b47ceeb817dd5600699fce55d8b02