Overview
overview
10Static
static
3nj230708full.pdf.exe
windows7-x64
10nj230708full.pdf.exe
windows10-2004-x64
10.data
windows7-x64
3.data
windows10-2004-x64
3.rdata
windows7-x64
3.rdata
windows10-2004-x64
3.reloc
windows7-x64
3.reloc
windows10-2004-x64
3.rsrc/DIALOG/105
windows7-x64
1.rsrc/DIALOG/105
windows10-2004-x64
1.rsrc/DIALOG/106
windows7-x64
1.rsrc/DIALOG/106
windows10-2004-x64
1.rsrc/DIALOG/111
windows7-x64
1.rsrc/DIALOG/111
windows10-2004-x64
1.rsrc/GROUP_ICON/103
windows7-x64
1.rsrc/GROUP_ICON/103
windows10-2004-x64
1.rsrc/ICON/1.png
windows7-x64
3.rsrc/ICON/1.png
windows10-2004-x64
3.rsrc/ICON/2.ico
windows7-x64
3.rsrc/ICON/2.ico
windows10-2004-x64
3.rsrc/ICON/3.ico
windows7-x64
3.rsrc/ICON/3.ico
windows10-2004-x64
3.rsrc/MANIFEST/1.xml
windows7-x64
3.rsrc/MANIFEST/1.xml
windows10-2004-x64
1.text
windows7-x64
3.text
windows10-2004-x64
3CERTIFICATE
windows7-x64
1CERTIFICATE
windows10-2004-x64
1[0]
windows7-x64
1[0]
windows10-2004-x64
1[1]
windows7-x64
1[1]
windows10-2004-x64
1Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 09:15
Static task
static1
Behavioral task
behavioral1
Sample
nj230708full.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
nj230708full.pdf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
.data
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
.data
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
.rdata
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
.rdata
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
.reloc
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
.reloc
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
.rsrc/DIALOG/105
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
.rsrc/DIALOG/105
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
.rsrc/DIALOG/106
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
.rsrc/DIALOG/106
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
.rsrc/DIALOG/111
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
.rsrc/DIALOG/111
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
.rsrc/GROUP_ICON/103
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
.rsrc/GROUP_ICON/103
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
.rsrc/ICON/1.png
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
.rsrc/ICON/1.png
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
.rsrc/ICON/2.ico
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
.rsrc/ICON/2.ico
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
.rsrc/ICON/3.ico
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
.rsrc/ICON/3.ico
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
.rsrc/MANIFEST/1.xml
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
.rsrc/MANIFEST/1.xml
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
.text
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
.text
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
CERTIFICATE
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
CERTIFICATE
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
[0]
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
[0]
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
[1]
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
[1]
Resource
win10v2004-20241007-en
General
-
Target
.reloc
-
Size
4KB
-
MD5
7531f98f48bae981154531be7b0e3ec6
-
SHA1
154defc8109ba0ee2834f575c61ca810c198bf2d
-
SHA256
5451208cf24050fe1627207138157fd21e4cd3adea6ce5e865e9b03324b6c6c2
-
SHA512
a8d9ec0b2d4e1311af7ec0409415053cbd9f912b4e6cec2337db08a4607f82aa3f713481484ce7d02c4d68b6354b7a87b5265f70a3071bf5be56e1b409910555
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2076 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2076 AcroRd32.exe 2076 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1636 wrote to memory of 2072 1636 cmd.exe 29 PID 1636 wrote to memory of 2072 1636 cmd.exe 29 PID 1636 wrote to memory of 2072 1636 cmd.exe 29 PID 2072 wrote to memory of 2076 2072 rundll32.exe 30 PID 2072 wrote to memory of 2076 2072 rundll32.exe 30 PID 2072 wrote to memory of 2076 2072 rundll32.exe 30 PID 2072 wrote to memory of 2076 2072 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\.reloc1⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\.reloc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\.reloc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2076
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5dd2e7fea6fbd83ee317b4c5572fa98c7
SHA1aa7054562b8f2ae5ca6be27f895eeabccc92d649
SHA2567c1fda530539089082efe4b02f77fc03eebacc27e92c6df67ec6489275bd14b1
SHA5124b4fda3b0aab4a3afc5b3ab8e20c1cf482e72e800bde273935b1fa70ab0149a715dad207f7114334961ce14b1124d6d50941715e3e7682b9d0c20093218ed33e