Overview
overview
10Static
static
4HowToBeatP...ci.pdf
windows7-x64
3HowToBeatP...ci.pdf
windows10-2004-x64
3NEW PAYPAL...14.pdf
windows7-x64
3NEW PAYPAL...14.pdf
windows10-2004-x64
3PolishPaypal.pdf
windows7-x64
3PolishPaypal.pdf
windows10-2004-x64
3Profiting ...i.html
windows7-x64
3Profiting ...i.html
windows10-2004-x64
3ScrewPaypal.pdf
windows7-x64
3ScrewPaypal.pdf
windows10-2004-x64
3StealthPaypal.pdf
windows7-x64
3StealthPaypal.pdf
windows10-2004-x64
3The Ultima...de.pdf
windows7-x64
3The Ultima...de.pdf
windows10-2004-x64
3Unlimited ...ut.pdf
windows7-x64
3Unlimited ...ut.pdf
windows10-2004-x64
3Yasuo.Payp....5.lnk
windows7-x64
10Yasuo.Payp....5.lnk
windows10-2004-x64
10files/Yasu....5.exe
windows7-x64
10files/Yasu....5.exe
windows10-2004-x64
10paypal stealth.pdf
windows7-x64
3paypal stealth.pdf
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 23:14
Behavioral task
behavioral1
Sample
HowToBeatPayPal-preci.pdf
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
HowToBeatPayPal-preci.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
NEW PAYPAL CASHOUT 2014.pdf
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
NEW PAYPAL CASHOUT 2014.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
PolishPaypal.pdf
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
PolishPaypal.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Profiting from Paypal - TCF Wiki.html
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Profiting from Paypal - TCF Wiki.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
ScrewPaypal.pdf
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
ScrewPaypal.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
StealthPaypal.pdf
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
StealthPaypal.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
The Ultimate Privacy Guide.pdf
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
The Ultimate Privacy Guide.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Unlimited Stealth PayPal Acts and how to Cash them out.pdf
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
Unlimited Stealth PayPal Acts and how to Cash them out.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Yasuo.Paypal.v4.5.5.5.lnk
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Yasuo.Paypal.v4.5.5.5.lnk
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
files/Yasuo.Paypal.v4.5.5.5.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
files/Yasuo.Paypal.v4.5.5.5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
paypal stealth.pdf
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
paypal stealth.pdf
Resource
win10v2004-20241007-en
General
-
Target
PolishPaypal.pdf
-
Size
40KB
-
MD5
8ccd0910daa227a0333e7198aa698a8e
-
SHA1
0232b99524d17c26fa09bfa2230f5fb7aadf433a
-
SHA256
1913f5048d667984b35b89f695b26e52d398034d222736c1d0d5120a9f8431c6
-
SHA512
a9286c7d1211992f81cd88bd5f33142f6beea2e71cd311cdd52878e84900f6476c2254879a56f3da5e69992e63d9cc73b4a74c72657e271e63269efdc69eff71
-
SSDEEP
768:TN/EfO0OMYgixR0HsWlLox4Vk4PBO6tRckYl0HPfmd1a4dtkRgmT2nMDzssdvJfd:VE5QgUyxYGr5xRckYl0HP+dQgs2n+Rl
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2076 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2076 AcroRd32.exe 2076 AcroRd32.exe 2076 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\PolishPaypal.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d5d46e8b431ced3c750137f6b1e986ba
SHA1149c9f5aaf95ebe98bb021ca365070c714fdc985
SHA25628950cf3976972d17a043310fcbc3404e636bb153c51828771213f1e4dfba6f1
SHA512df28d830efb3097edb02ead8c074d1a2ab333b160ba08883b32f7834e81802bceb88cd1eb7ebfccb5ecd78d8354153416caf94397dacc56b90a231e966c1f33f