Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 14:05
Behavioral task
behavioral1
Sample
742d3a681f12b01ab26a63685ce5513e2c5c4980.pdf
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
742d3a681f12b01ab26a63685ce5513e2c5c4980.pdf
Resource
win10v2004-20241007-en
General
-
Target
742d3a681f12b01ab26a63685ce5513e2c5c4980.pdf
-
Size
28KB
-
MD5
d6f9c2d4c953ec668ffd7c0b685dfbe4
-
SHA1
4352d932a672c0643fab84b5639a6a53d16a1f0b
-
SHA256
dbd4f1a68a3d77e629bb38f6f3ee62306500a2d5d2f51cda91ab598d708a78fe
-
SHA512
1d18ec613db36283ed78ee3e5852446d173b715fc6703c018270f0ffc4f38c5e82b6fbebe4b2051eea84d84719f0f69ded006db1d388cb4c26523c318b823c7d
-
SSDEEP
384:IwBUJ7ah4SMkslVe/FTG47BsEC8zJs+0N8D21Po17m6O3Klk24202PTkao1D7JjH:MJ7aONgTT+glsfqD2OpOab4F2b2JjEy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1064 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1064 AcroRd32.exe 1064 AcroRd32.exe 1064 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\742d3a681f12b01ab26a63685ce5513e2c5c4980.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ec692484c19515e4d7be5715cf46fb90
SHA17aae634a0291300647554cdeb082bb494566a890
SHA25636b98af79bf522a9e82fa045babdf70a60feb33afa937d6eac0372130a5055b3
SHA51285058001334fb9771b78ec726dab518e893bb64e9d455c3c576b3cc3677a140800a954e06ab3f43d694a8cab89c7e2af35ef626e2e85bb2f326f649c6c7d4171