Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 17:54
Behavioral task
behavioral1
Sample
Screenshot (12).pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Screenshot (12).pdf
Resource
win10v2004-20241007-en
General
-
Target
Screenshot (12).pdf
-
Size
35KB
-
MD5
e1b6b284fcc384449a81b1bb97e226e6
-
SHA1
7ecd37cfc70fbe7a3cd4fd242ee09a4daedbc2c3
-
SHA256
a7e5386623c492eabbc2dec32093e42a0f2d0a49496b06fced75cecb8dcc2fb6
-
SHA512
817db234c4222f07402bb46272fce2360f10182e695c3e83f95dd755010fa1464dd351fcf2ca649db21a139aebdd7d6268b409f5d35db8c919f7e26c5285e273
-
SSDEEP
768:nq6l7y/VJFDYyeDReD0WPNiwCyl0zfh8jLgWoqlOZOatYNopWQe4Y:nTk/bFUzYAWQwgzfhMgWkZO7D4Y
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2084 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
AcroRd32.exepid process 2084 AcroRd32.exe 2084 AcroRd32.exe 2084 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Screenshot (12).pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e27b6972816bb75eceeefee8147281ed
SHA10d75f039cba547980e64b4907c96dbcb6e5ebeec
SHA25623d3fdca70c63bb98ad20bfaa34a9874a7e1927f74546b7cede7f69309b27c81
SHA512b92fcc5baab006bbd8ed0908f1dd0924f514481632cc6ded8c0f9dfd8c39d011057b19196bafc2555cb1013d37feb3ebe09a29a1d6887fcf832865f57b4282da