Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 13:53
Behavioral task
behavioral1
Sample
DAE_817588.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DAE_817588.pdf
Resource
win10v2004-20241007-en
General
-
Target
DAE_817588.pdf
-
Size
101KB
-
MD5
23b36b7f723cb34424a353c94a1b4759
-
SHA1
06b0977528e4610c354fc6ffd024f6bedb38bfe6
-
SHA256
c9ec0863858e9189cb84206a04046a99c0f7e241c8bf01c55035d3a6f36c5e5d
-
SHA512
710fe653ddaea2315cbe4935e9ee3a2b4193dcddbc621330b2260d89a7e8ccdc5f350a17d53f0664f3c99871ff0fec40246ddebf22214616e5148c462fff277f
-
SSDEEP
3072:ekvILBQRNTLV7NTE5Uo6gt5XqKS0DmtYMDNA9w3Ja:HQOl7y5UoznkqmC45a
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3044 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3044 AcroRd32.exe 3044 AcroRd32.exe 3044 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\DAE_817588.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5465537ca45c5ec1fc6680dbf8d1d9301
SHA1d2338bbe4c93a5ec6647dc642e1d5479aa9bf316
SHA25647475dbfb33fb791f239bd22101c3ad6e365705b232b4b04ae50601b6c31dbb4
SHA512fd130086b552b68af2a3cb3d9252ad6903a082d2ff963e2bea2596a39d22b88eb412ea1cd10cf44111a5ea8013081983a57e5ff172085c96876302b569d2c767