Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-11-2024 02:24
Behavioral task
behavioral1
Sample
8c5859f239aecdecb8bd51f4d78022c453d5b137d2d47f584b929bda5454e2c7.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8c5859f239aecdecb8bd51f4d78022c453d5b137d2d47f584b929bda5454e2c7.pdf
Resource
win10v2004-20241007-en
General
-
Target
8c5859f239aecdecb8bd51f4d78022c453d5b137d2d47f584b929bda5454e2c7.pdf
-
Size
114KB
-
MD5
014442d0d578209dec698264f2628cf1
-
SHA1
70f516dc60bf173e04515ff2c3d468e640b65e08
-
SHA256
8c5859f239aecdecb8bd51f4d78022c453d5b137d2d47f584b929bda5454e2c7
-
SHA512
8cdde12b13b6ebbee8655cc5f796d1ee69285b1a750349df64285e43cc04452834f25bd9c29bf3c1acd4be87f28869825e97cfff6cac239e8a90a71885dc2bf9
-
SSDEEP
3072:vMqAhuXGX3KXy6I9bV1IYoODg2c12yetBRLC3yr2z:v3XE3KXy6Whfo2c12ywLCK2z
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2400 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
AcroRd32.exepid process 2400 AcroRd32.exe 2400 AcroRd32.exe 2400 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\8c5859f239aecdecb8bd51f4d78022c453d5b137d2d47f584b929bda5454e2c7.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD50d692d42b2d6abe4d00dd5d1962c238a
SHA1d1b35da846a735d1bf5a6903a78d27bbdc010919
SHA256480773ff7446dd1c5e3603deea006b14bcceae8c7cca2b2621e60263b1fbed40
SHA512b962cde3b319d42c0d00703eb08d71525181f8ccc88e9153b3409e9c364791edcf30675817992c5475787b1439aea41644b3175238d133ca68fdc8b912544569