Overview
overview
10Static
static
4HowToBeatP...ci.pdf
windows7-x64
3HowToBeatP...ci.pdf
windows10-2004-x64
3NEW PAYPAL...14.pdf
windows7-x64
3NEW PAYPAL...14.pdf
windows10-2004-x64
3PolishPaypal.pdf
windows7-x64
3PolishPaypal.pdf
windows10-2004-x64
3Profiting ...i.html
windows7-x64
3Profiting ...i.html
windows10-2004-x64
3ScrewPaypal.pdf
windows7-x64
3ScrewPaypal.pdf
windows10-2004-x64
3StealthPaypal.pdf
windows7-x64
3StealthPaypal.pdf
windows10-2004-x64
3The Ultima...de.pdf
windows7-x64
3The Ultima...de.pdf
windows10-2004-x64
3Unlimited ...ut.pdf
windows7-x64
3Unlimited ...ut.pdf
windows10-2004-x64
3Yasuo.Payp....5.lnk
windows7-x64
10Yasuo.Payp....5.lnk
windows10-2004-x64
10files/Yasu....5.exe
windows7-x64
10files/Yasu....5.exe
windows10-2004-x64
10paypal stealth.pdf
windows7-x64
3paypal stealth.pdf
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 23:14
Behavioral task
behavioral1
Sample
HowToBeatPayPal-preci.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
HowToBeatPayPal-preci.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
NEW PAYPAL CASHOUT 2014.pdf
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
NEW PAYPAL CASHOUT 2014.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
PolishPaypal.pdf
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
PolishPaypal.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Profiting from Paypal - TCF Wiki.html
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
Profiting from Paypal - TCF Wiki.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
ScrewPaypal.pdf
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
ScrewPaypal.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
StealthPaypal.pdf
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
StealthPaypal.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
The Ultimate Privacy Guide.pdf
Resource
win7-20241023-en
Behavioral task
behavioral14
Sample
The Ultimate Privacy Guide.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Unlimited Stealth PayPal Acts and how to Cash them out.pdf
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Unlimited Stealth PayPal Acts and how to Cash them out.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Yasuo.Paypal.v4.5.5.5.lnk
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Yasuo.Paypal.v4.5.5.5.lnk
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
files/Yasuo.Paypal.v4.5.5.5.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
files/Yasuo.Paypal.v4.5.5.5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
paypal stealth.pdf
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
paypal stealth.pdf
Resource
win10v2004-20241007-en
General
-
Target
ScrewPaypal.pdf
-
Size
550KB
-
MD5
811bdc8ec33febb0cdf3c4954f3031a4
-
SHA1
5a3361b378827661fbdd3f9a02cc4d2c57826e14
-
SHA256
77be8e5c9396e4bc657387abf1ddf88b2ec8bdab60dc3477ae74ab7e03fea6c4
-
SHA512
a7fe181b945c1a4ad18d0b8ada41f5181c8fa3cd146c982cb1611e1b873426aa4a708c51af8847c6e0ebdc0d32e3f11a75d0f54ddb14d74680181f060e7e8ae0
-
SSDEEP
12288:Q4aZSMas5zyPlrc6HxXcBeW8DIa8VmhGQgprWXrM:Q4sorcWIeHD9E5rWI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2804 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2804 AcroRd32.exe 2804 AcroRd32.exe 2804 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ScrewPaypal.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5bb64a03528dde0610d11e9cb0ff4ac4a
SHA1431dea2661fcc2a45bee04c42deb24df08681cd3
SHA256a3d4ac4eab57f3aae847354ca4078fdc6f3318812e0ba2f8463e65c21e24145d
SHA512b5659890c9bf1e80119a5f3f90487500f0872edacd9e60063c143a309c0e275c9414bf81bea9d792bc6c79bc02e5ac2bafed5598678e6dbab1112c8fe3c92e15