Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 13:55
Behavioral task
behavioral1
Sample
DAE_43308.pdf
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
DAE_43308.pdf
Resource
win10v2004-20241007-en
General
-
Target
DAE_43308.pdf
-
Size
101KB
-
MD5
8f73c496f47ec2c305da547d25d9168d
-
SHA1
08bb0f823690a5cf1bf1e1910ce0c29aebcec632
-
SHA256
bfe446754135292ec5eee96e7fb279f67de2b4783bc46b7a8daad8d254896e9d
-
SHA512
bf342e7791e06ce04e6ed8b1bbf236528f71fd46d397bb1b9abccb8e45d613ba6f92499c847218e162f89b5f6c55a5a9642a0adf46c472789e9a81a1a9716c37
-
SSDEEP
3072:hvILBQRNTLV7NTE5Uo6gt5XqKS0DmtYMDNA9w3J1:hQOl7y5UoznkqmC451
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2260 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2260 AcroRd32.exe 2260 AcroRd32.exe 2260 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\DAE_43308.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD50e084b9c1ce85d9fd09cf89eadd2901a
SHA11cc7bbe12b077a335b6c7fab2af0cbcfc97ecd08
SHA2564395149cf41e696d00f019d9b328170c7b8d9a97eebde68d529db1c8c180042f
SHA5129c4b85a28aee477ffcf687eca7f1d9f0090e9cee736166078aaa17a3abb1c5fc66d76c5441d40ec82103a04a496e465f88039444843ad71d6099ec7300dcf1b8