Analysis
-
max time kernel
94s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 00:17
Behavioral task
behavioral1
Sample
ff371924283834995ee75470cd98d32600ba11ea8458602e03e7201d7c9b01e9N.pdf
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
ff371924283834995ee75470cd98d32600ba11ea8458602e03e7201d7c9b01e9N.pdf
Resource
win10v2004-20241007-en
General
-
Target
ff371924283834995ee75470cd98d32600ba11ea8458602e03e7201d7c9b01e9N.pdf
-
Size
420KB
-
MD5
0f8aac30a3d169ad79ebeedfa375d8f0
-
SHA1
3c6382f0132596c2d7591f314b2b77c937b77745
-
SHA256
ff371924283834995ee75470cd98d32600ba11ea8458602e03e7201d7c9b01e9
-
SHA512
b750b8187a939e415957b1f378dcae38ecace1f91146104ef8adf95313e244ed3ea8940259fb49c3c654f9c0e3c9b8df2a1d0494059abac15958f774bf4905d1
-
SSDEEP
6144:HgUlN3q3QbjaXlYeMiAiO/cZXrQ9DTsJq4U/WWu1TFwOiysQVpdTA/itiK:HvlN3Jj7eMiTRrkTcUubT3iZYzLR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1956 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1956 AcroRd32.exe 1956 AcroRd32.exe 1956 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ff371924283834995ee75470cd98d32600ba11ea8458602e03e7201d7c9b01e9N.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD57a48877de9853e5a33b13e289baab0ec
SHA18b4cecb5144b956ab8f536df92279a77bc8b4b41
SHA25686f09f9b9c7a0c5cb0dc674ee97786eb9ed94331c3326b56f31c0db07b57353a
SHA5121578cebe387a4a2866bf8a3ed24b4ccc1d5c8b17ac104ddb928c9634c063d0e631a969449e5bfe9c51c83f9fcf2c5e50261aa3e184e649f38b2885626e6dd123