Overview
overview
10Static
static
3About/About.pdf
windows7-x64
3About/About.pdf
windows10-2004-x64
3About/eulaLic.html
windows7-x64
3About/eulaLic.html
windows10-2004-x64
3PEiD-0.95-...le.bat
windows7-x64
1PEiD-0.95-...le.bat
windows10-2004-x64
1PEiD-0.95-...in.vbs
windows7-x64
1PEiD-0.95-...in.vbs
windows10-2004-x64
1Loader.exe
windows7-x64
10Loader.exe
windows10-2004-x64
10Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 12:21
Behavioral task
behavioral1
Sample
About/About.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
About/About.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
About/eulaLic.html
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
About/eulaLic.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
PEiD-0.95-20081103_ExeinfoPE/pluginsdk/MASM/compile.bat
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
PEiD-0.95-20081103_ExeinfoPE/pluginsdk/MASM/compile.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
PEiD-0.95-20081103_ExeinfoPE/pluginsdk/PowerBASIC/PEiD_Plugin.vbs
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
PEiD-0.95-20081103_ExeinfoPE/pluginsdk/PowerBASIC/PEiD_Plugin.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Loader.exe
Resource
win7-20240729-en
General
-
Target
About/About.pdf
-
Size
185KB
-
MD5
f8e98d604f7c63275ee8739708345baf
-
SHA1
218bb6ab3a6b4899c22ae798691c30acfe423a7c
-
SHA256
dafccfc02c2ad502683ddf61224d6d66eba1e6d5ba13a92b15381af51bb4715a
-
SHA512
05076043c463a3483cd6be000407ba6a5641413a4e0928b2ea1f6ab84bf2b1244c6737b221be7dc9db7a1ea8fc5ea2c34782307babe77916d33ae6cb19b6de05
-
SSDEEP
3072:GdbzlBgmxq3pSxw8FE92HVePu0kiFRiNifT9hQfmRcUQ88k4YLs3L2yFAVxVRjKm:GdbvTq3Mk21GuUFENYTsmRcOoY46yFAV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2280 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2280 AcroRd32.exe 2280 AcroRd32.exe 2280 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\About\About.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5abc91e4493d6dc0d607e2d66877ca9b6
SHA1d222b7bf630e4658ec55fd10918158b599c603a4
SHA25649e61ce7ebbf56faee24fd54ae5762b6aaadaf69d6cb1703c6af4f59571bb15f
SHA5126850f16d5ec253b3d7482161fc9fd5232297f76a269edfeaaafd891ce44167768864df5069530ec0c024265e7e59b056a329a31b173e1292d66403bc00171a94