Overview
overview
5Static
static
5DOCUMENTAL 1-1.pdf
windows7-x64
3DOCUMENTAL 1-1.pdf
windows10-2004-x64
3DOCUMENTAL 1-2.pdf
windows7-x64
3DOCUMENTAL 1-2.pdf
windows10-2004-x64
3DOCUMENTAL 1-3.pdf
windows7-x64
3DOCUMENTAL 1-3.pdf
windows10-2004-x64
3DOCUMENTAL 1-4.pdf
windows7-x64
3DOCUMENTAL 1-4.pdf
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 14:50
Behavioral task
behavioral1
Sample
DOCUMENTAL 1-1.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DOCUMENTAL 1-1.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
DOCUMENTAL 1-2.pdf
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
DOCUMENTAL 1-2.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
DOCUMENTAL 1-3.pdf
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
DOCUMENTAL 1-3.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
DOCUMENTAL 1-4.pdf
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
DOCUMENTAL 1-4.pdf
Resource
win10v2004-20241007-en
General
-
Target
DOCUMENTAL 1-1.pdf
-
Size
17.3MB
-
MD5
fd9200b0f12e90553659878b229385cf
-
SHA1
ed87e565389c6a502cb4455b87f5c6bccd560d3e
-
SHA256
cd46a476dec62af22a1e10e2c154190a08da3afa842110fca75c4f48848c1168
-
SHA512
e8c851e79c0bf8c4a00b03812e6c4effbe3471a9345230a4f08c913604f925defb571cff8e7d3ca06abe3e84a7ba029c109e7b701c57af9306b926ce1a50abd7
-
SSDEEP
196608:a9KnBkFt/SlmtxYfTFCK6L2hKUp5R3wUPnis4FHQwU65fVEN6FWR7rl/KNUO99uU:Uxlq/PIUhDPv4zUAG6FWR3lGbaEI7Yl
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1704 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1704 AcroRd32.exe 1704 AcroRd32.exe 1704 AcroRd32.exe 1704 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\DOCUMENTAL 1-1.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55c1994c672eecd5cab761f624273d496
SHA1fe1c1331187f7e0dbc322c8d75f6b255d7d561ad
SHA25655211405230f42d2439e247499518bc230b5c8412a702b513e591e0e9b4f5f69
SHA51282547bb96217ae3273d2965c8e4ff5223cd2443bff8bdbf14a4750b6193f07871865e32301bf4a90a8fe6f42d1ce1518725c9344a05fb5a2c67416344c846a15