Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 13:40
Static task
static1
Behavioral task
behavioral1
Sample
CXL010000005610MAIN (1).pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
CXL010000005610MAIN (1).pdf
Resource
win10v2004-20241007-en
General
-
Target
CXL010000005610MAIN (1).pdf
-
Size
26KB
-
MD5
0fb861ba4f17f39aebb20c22ab6df72a
-
SHA1
e6673fc3574c675535422574b21f989b1abb2bc1
-
SHA256
f4564397c2e75b39d9bc20567f0080dfb234ef0dcee1425fb7d91f2f33ba183d
-
SHA512
f8bbc43f488d739e4451db07878d480272a3b732f87561c10ec49752843499161bda6a348546db1c2b93838ba6228cda9fa50d61d32396f607dfe44a86e8a89b
-
SSDEEP
768:eRmJ7yDJJGTIoq9kOXYoiwmlo2Wk12kGod14NTXpBajSI5Sy7E80:eR47y7GEjWNloC2ZodyNDpFIZ50
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2156 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2156 AcroRd32.exe 2156 AcroRd32.exe 2156 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\CXL010000005610MAIN (1).pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD566e6fe643de3049c191628662049c52b
SHA17dada650d5d5b5c5cbbb4ab48290eb39253b438d
SHA25679e0f482bd698681e4928a105a5822b18f3c30ea0e1a6121ce0923b5be016312
SHA512fdc39d8e25079e452b37e201fe72c14b800bcf4afe392adeafcca8303e0d5f22e1e01a96fb146391baba01dd39f6265cf518850d52bf98c35bbdb97a9358511f