Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 13:40

General

  • Target

    CXL010000005610MAIN (1).pdf

  • Size

    26KB

  • MD5

    0fb861ba4f17f39aebb20c22ab6df72a

  • SHA1

    e6673fc3574c675535422574b21f989b1abb2bc1

  • SHA256

    f4564397c2e75b39d9bc20567f0080dfb234ef0dcee1425fb7d91f2f33ba183d

  • SHA512

    f8bbc43f488d739e4451db07878d480272a3b732f87561c10ec49752843499161bda6a348546db1c2b93838ba6228cda9fa50d61d32396f607dfe44a86e8a89b

  • SSDEEP

    768:eRmJ7yDJJGTIoq9kOXYoiwmlo2Wk12kGod14NTXpBajSI5Sy7E80:eR47y7GEjWNloC2ZodyNDpFIZ50

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\CXL010000005610MAIN (1).pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    66e6fe643de3049c191628662049c52b

    SHA1

    7dada650d5d5b5c5cbbb4ab48290eb39253b438d

    SHA256

    79e0f482bd698681e4928a105a5822b18f3c30ea0e1a6121ce0923b5be016312

    SHA512

    fdc39d8e25079e452b37e201fe72c14b800bcf4afe392adeafcca8303e0d5f22e1e01a96fb146391baba01dd39f6265cf518850d52bf98c35bbdb97a9358511f

  • memory/2156-0-0x0000000002BD0000-0x0000000002C46000-memory.dmp

    Filesize

    472KB