Overview
overview
6Static
static
6Planilla S...2).zip
windows7-x64
1Planilla S...2).zip
windows10-2004-x64
10572b627ee...ab.eml
windows7-x64
50572b627ee...ab.eml
windows10-2004-x64
3Autoliquid...do.pdf
windows7-x64
3Autoliquid...do.pdf
windows10-2004-x64
3Autoliquid...do.pdf
windows7-x64
3Autoliquid...do.pdf
windows10-2004-x64
3email-html-2.txt
windows7-x64
1email-html-2.txt
windows10-2004-x64
1email-plain-1.txt
windows7-x64
1email-plain-1.txt
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/03/2025, 19:55
Behavioral task
behavioral1
Sample
Planilla SS juan Verona meworlshop Número de solicitud_ 4606-password(jRxqZTI2).zip
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
Planilla SS juan Verona meworlshop Número de solicitud_ 4606-password(jRxqZTI2).zip
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
0572b627eeb2d0f8d17f6982f1297d10b2de94b3c81204a5256be6c2b1646cab.eml
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
0572b627eeb2d0f8d17f6982f1297d10b2de94b3c81204a5256be6c2b1646cab.eml
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
Autoliquidaciones_1071142518_Consolidado.pdf
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Autoliquidaciones_1071142518_Consolidado.pdf
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
Autoliquidaciones_1071142983_Consolidado.pdf
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Autoliquidaciones_1071142983_Consolidado.pdf
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
email-html-2.txt
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
email-html-2.txt
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
email-plain-1.txt
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
email-plain-1.txt
Resource
win10v2004-20250217-en
General
-
Target
Autoliquidaciones_1071142518_Consolidado.pdf
-
Size
51KB
-
MD5
48c6b51f190690a43c1afe1a6626b317
-
SHA1
9a87dfa49713c77f4ad00cd08bae0c720b9ea165
-
SHA256
45e6432b4a9c21f5ab7d1e727e95e70e00e956d09862413c812dbd2d3307de2b
-
SHA512
07580d39a12251dc1145a4e02a478430dd5a7cb721c0f03064caf63344f861eea73805964a2d04704b615be0ee0ad88f1ce618c88d36b737f5fef4f8cc19ec19
-
SSDEEP
768:xXxxSI/RBQLPge7BtPkf3k/08F/L5NiRuWQiqwkUPlnen1gwiekD1YyDD5EFwJXh:saBQLo6BSPCtlNSuWQiqwdPZwiTQwJXh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2760 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2760 AcroRd32.exe 2760 AcroRd32.exe 2760 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Autoliquidaciones_1071142518_Consolidado.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ad9bfa79f03f298f5264eb1eb570e298
SHA12cb7be442494fe0938731ff094b049c217213ae3
SHA25649af3ea9a84a1b45e6f0255c0fb55735e577d5e45777446a7b4f75543c12324a
SHA512eafc15eb250e43c0ef6406f104f597bebf9c39e6ec69ef9ee1c8b28ee638ad90c80d6cef93c9e5e4d00da8ad286a3619f769e7100ea82ba83fc92f0a88bba804