Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 01:44
Behavioral task
behavioral1
Sample
GB 03478-1.pdf
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
GB 03478-1.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
喜欢此软件_love it.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
喜欢此软件_love it.exe
Resource
win10v2004-20241007-en
General
-
Target
GB 03478-1.pdf
-
Size
3.0MB
-
MD5
9743a0cb7d6df5f657cbd35ecb4f251c
-
SHA1
59fbe777396d85b95743bfb156d01e0bf304eac9
-
SHA256
9ee53ea13cf7ebe12f1cd1c29c62f2bd4c5dbe1dbe12acda60d6355d1e413c49
-
SHA512
b716cb10f58ba9dc6b55d7bc9bdbfd50be2e526439ea3469aafe2e776e47116159912e5babd43164243c7d8d67f13d2da3f9f11f283565f196a8e5d22f112d57
-
SSDEEP
49152:IbARrZG8VQc8YZVrpnyZFX+cIGxUriVYmsiRZthP42DPk2bvfX+B9v2JQtn6F8Zs:Ib2Frh77rkDlnxiiVYBirwaMq18i
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1996 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1996 AcroRd32.exe 1996 AcroRd32.exe 1996 AcroRd32.exe 1996 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\GB 03478-1.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD56a3b60cb8da68627dddff4a8fe42f7a1
SHA1664e6deb7c908a06b66123dea644a7c016545148
SHA256d2950b631fbef4b20477c4e24b2d3c76a17815340878c4e07f4567560d702c47
SHA512ed500b4537e7b354f274fb93a67591334b5f05216df3ed3f8636e6d5f49ea5d7000806ffa694062d3ad60ca083df95a39969bbb6be570952fbe296f8931debdc