Overview
overview
10Static
static
3About/About.pdf
windows7-x64
3About/About.pdf
windows10-2004-x64
3About/eulaLic.html
windows7-x64
3About/eulaLic.html
windows10-2004-x64
3PEiD-0.95-...le.bat
windows7-x64
1PEiD-0.95-...le.bat
windows10-2004-x64
1PEiD-0.95-...in.vbs
windows7-x64
1PEiD-0.95-...in.vbs
windows10-2004-x64
1Loader.exe
windows7-x64
10Loader.exe
windows10-2004-x64
10Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
05-01-2025 02:20
Behavioral task
behavioral1
Sample
About/About.pdf
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
About/About.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
About/eulaLic.html
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
About/eulaLic.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
PEiD-0.95-20081103_ExeinfoPE/pluginsdk/MASM/compile.bat
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
PEiD-0.95-20081103_ExeinfoPE/pluginsdk/MASM/compile.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
PEiD-0.95-20081103_ExeinfoPE/pluginsdk/PowerBASIC/PEiD_Plugin.vbs
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
PEiD-0.95-20081103_ExeinfoPE/pluginsdk/PowerBASIC/PEiD_Plugin.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Loader.exe
Resource
win7-20240903-en
General
-
Target
About/About.pdf
-
Size
185KB
-
MD5
f8e98d604f7c63275ee8739708345baf
-
SHA1
218bb6ab3a6b4899c22ae798691c30acfe423a7c
-
SHA256
dafccfc02c2ad502683ddf61224d6d66eba1e6d5ba13a92b15381af51bb4715a
-
SHA512
05076043c463a3483cd6be000407ba6a5641413a4e0928b2ea1f6ab84bf2b1244c6737b221be7dc9db7a1ea8fc5ea2c34782307babe77916d33ae6cb19b6de05
-
SSDEEP
3072:GdbzlBgmxq3pSxw8FE92HVePu0kiFRiNifT9hQfmRcUQ88k4YLs3L2yFAVxVRjKm:GdbvTq3Mk21GuUFENYTsmRcOoY46yFAV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 692 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 692 AcroRd32.exe 692 AcroRd32.exe 692 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\About\About.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5670b2d154c66ff237babf90e218b7d63
SHA17c4213781646377f5e7e4b5e1915ebf3231db971
SHA256a5363836a905772a7202259eefb9ee4ddcb2cf9e620703fe391cae81647bb004
SHA512b528136a87bf9dfb00fb5600da8771a0101dc1283bd88fbb75bc9fccd33fd8cf6d7e5b0b11910f3508f7f6de55930c989e0f9820f5b74444f3b95e337e9808fc