Overview
overview
8Static
static
8sample.tar
windows7-x64
1sample.tar
windows10-2004-x64
1001e271055...89.pdf
windows7-x64
3001e271055...89.pdf
windows10-2004-x64
4004e74d54d...a0.pdf
windows7-x64
3004e74d54d...a0.pdf
windows10-2004-x64
30106fb569e...f19.js
windows7-x64
30106fb569e...f19.js
windows10-2004-x64
302bfe34bea...33.pdf
windows7-x64
302bfe34bea...33.pdf
windows10-2004-x64
4030423da29...aeb.js
windows7-x64
3030423da29...aeb.js
windows10-2004-x64
303042cc378...3e.pdf
windows7-x64
303042cc378...3e.pdf
windows10-2004-x64
304095314d5...c1.pdf
windows7-x64
304095314d5...c1.pdf
windows10-2004-x64
3049675afd5...89.pdf
windows7-x64
3049675afd5...89.pdf
windows10-2004-x64
30733c4e212...40.pdf
windows7-x64
30733c4e212...40.pdf
windows10-2004-x64
408da26158b...ff.pdf
windows7-x64
308da26158b...ff.pdf
windows10-2004-x64
30d711f2049...e5.pdf
windows7-x64
70d711f2049...e5.pdf
windows10-2004-x64
30e0c3a177b...077.js
windows7-x64
30e0c3a177b...077.js
windows10-2004-x64
30f24780097...37.pdf
windows7-x64
30f24780097...37.pdf
windows10-2004-x64
30f5d42aa99...7b.pdf
windows7-x64
30f5d42aa99...7b.pdf
windows10-2004-x64
30fc9c4e1e2...9e.pdf
windows7-x64
30fc9c4e1e2...9e.pdf
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
14/03/2025, 09:39
Behavioral task
behavioral1
Sample
sample.tar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sample.tar
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
001e2710555613a82e94156d3ed9c289.pdf
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
001e2710555613a82e94156d3ed9c289.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
004e74d54dcf79c641d5cf8a615488a0.pdf
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
004e74d54dcf79c641d5cf8a615488a0.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
0106fb569e87e02fc88d496064abdf19.js
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
0106fb569e87e02fc88d496064abdf19.js
Resource
win10v2004-20250313-en
Behavioral task
behavioral9
Sample
02bfe34bea55e327cfdead9cff215f33.pdf
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
02bfe34bea55e327cfdead9cff215f33.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
030423da29e1e6f4a527518126de4aeb.js
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
030423da29e1e6f4a527518126de4aeb.js
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
03042cc3786dafdb941019488d4cad3e.pdf
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
03042cc3786dafdb941019488d4cad3e.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
04095314d51057a13e21908de1266fc1.pdf
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
04095314d51057a13e21908de1266fc1.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
049675afd5c9505b9715872d499b9389.pdf
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
049675afd5c9505b9715872d499b9389.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
0733c4e2122cdfcfdd4699a3cbdc8b40.pdf
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
0733c4e2122cdfcfdd4699a3cbdc8b40.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
08da26158b76ca38e0ddb740aaf9b4ff.pdf
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
08da26158b76ca38e0ddb740aaf9b4ff.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
0d711f2049a6004cffe447dab78cd7e5.pdf
Resource
win7-20250207-en
Behavioral task
behavioral24
Sample
0d711f2049a6004cffe447dab78cd7e5.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
0e0c3a177b898c523e8303940ae99077.js
Resource
win7-20250207-en
Behavioral task
behavioral26
Sample
0e0c3a177b898c523e8303940ae99077.js
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
0f24780097467c4c54f8f306346dff37.pdf
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
0f24780097467c4c54f8f306346dff37.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
0f5d42aa99b17eabddc19a46013b517b.pdf
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
0f5d42aa99b17eabddc19a46013b517b.pdf
Resource
win10v2004-20250313-en
Behavioral task
behavioral31
Sample
0fc9c4e1e2148912188dd913ff95149e.pdf
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
0fc9c4e1e2148912188dd913ff95149e.pdf
Resource
win10v2004-20250314-en
General
-
Target
0d711f2049a6004cffe447dab78cd7e5.pdf
-
Size
925KB
-
MD5
0d711f2049a6004cffe447dab78cd7e5
-
SHA1
c28fd9c35d97293b7e9b0eaf2032e83e23ca78a4
-
SHA256
2ac705860b71aed9b7528a62ed1042723f6f7b4c16fb0edf4cddcf09a709c9f7
-
SHA512
1bfbde72eceb1055cd2a077e74972d1490bf6cf79f2687494bd1ad12934ff6385b1cb729e43f8ab82bbf44082c972f0abb0eda78fec4611633376b87b0378593
-
SSDEEP
24576:qSbzGTjB0IxmSIKoOCeerokFN7hp96rPyT:qj1QONQok7h1
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2956 AdobeARM.exe 2776 SVCHOST.EXE -
Loads dropped DLL 4 IoCs
pid Process 2232 cmd.exe 2232 cmd.exe 2164 cmd.exe 2164 cmd.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCHOST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdobeARM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2956 AdobeARM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3048 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2988 AcroRd32.exe 2988 AcroRd32.exe 2988 AcroRd32.exe 3048 AcroRd32.exe 3048 AcroRd32.exe 3048 AcroRd32.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2164 2988 AcroRd32.exe 31 PID 2988 wrote to memory of 2164 2988 AcroRd32.exe 31 PID 2988 wrote to memory of 2164 2988 AcroRd32.exe 31 PID 2988 wrote to memory of 2164 2988 AcroRd32.exe 31 PID 2988 wrote to memory of 2232 2988 AcroRd32.exe 32 PID 2988 wrote to memory of 2232 2988 AcroRd32.exe 32 PID 2988 wrote to memory of 2232 2988 AcroRd32.exe 32 PID 2988 wrote to memory of 2232 2988 AcroRd32.exe 32 PID 2232 wrote to memory of 2956 2232 cmd.exe 35 PID 2232 wrote to memory of 2956 2232 cmd.exe 35 PID 2232 wrote to memory of 2956 2232 cmd.exe 35 PID 2232 wrote to memory of 2956 2232 cmd.exe 35 PID 2164 wrote to memory of 2776 2164 cmd.exe 36 PID 2164 wrote to memory of 2776 2164 cmd.exe 36 PID 2164 wrote to memory of 2776 2164 cmd.exe 36 PID 2164 wrote to memory of 2776 2164 cmd.exe 36 PID 2776 wrote to memory of 2920 2776 SVCHOST.EXE 37 PID 2776 wrote to memory of 2920 2776 SVCHOST.EXE 37 PID 2776 wrote to memory of 2920 2776 SVCHOST.EXE 37 PID 2776 wrote to memory of 2920 2776 SVCHOST.EXE 37 PID 2776 wrote to memory of 3008 2776 SVCHOST.EXE 38 PID 2776 wrote to memory of 3008 2776 SVCHOST.EXE 38 PID 2776 wrote to memory of 3008 2776 SVCHOST.EXE 38 PID 2776 wrote to memory of 3008 2776 SVCHOST.EXE 38 PID 2956 wrote to memory of 3048 2956 AdobeARM.exe 40 PID 2956 wrote to memory of 3048 2956 AdobeARM.exe 40 PID 2956 wrote to memory of 3048 2956 AdobeARM.exe 40 PID 2956 wrote to memory of 3048 2956 AdobeARM.exe 40 PID 2956 wrote to memory of 2964 2956 AdobeARM.exe 41 PID 2956 wrote to memory of 2964 2956 AdobeARM.exe 41 PID 2956 wrote to memory of 2964 2956 AdobeARM.exe 41 PID 2956 wrote to memory of 2964 2956 AdobeARM.exe 41
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\0d711f2049a6004cffe447dab78cd7e5.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""%temp%\svchost.exe""2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\explorer.exeexplorer4⤵
- System Location Discovery: System Language Discovery
PID:2920
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del /F C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE4⤵
- System Location Discovery: System Language Discovery
PID:3008
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ""%temp%\AdobeARM.exe" "C:\Users\Admin\AppData\Local\Temp\----Amph Ops - AF aspects.pdf""2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\AdobeARM.exe"C:\Users\Admin\AppData\Local\Temp\AdobeARM.exe" "C:\Users\Admin\AppData\Local\Temp\----Amph Ops - AF aspects.pdf"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\----Amph Ops - AF aspects.pdf"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3048
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\AdobeARM.exe4⤵
- System Location Discovery: System Language Discovery
PID:2964
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD500582f6aa1a0504c44b2901200eeb6a1
SHA1e8349eae0935bb8acb4de9fe5555b29a2e7fc60e
SHA256f6524bb1ab9e115c8fdf3fe799cc96e4590056585e53a9a0d6dd6761b6130e17
SHA51243a75911559d54468af171b8efda0a6febb543b40338962e66557a85ff39b7c7b81cc48579bfb6380f09860e4618be9d30b50d38159bfac221c2f1c501ebaa92
-
Filesize
358B
MD5e85a5f934031877e0d5ea964a2aa0fec
SHA14af16127d65356a7bc0f1de85ff3d256e0f582fe
SHA256e0327ad9a1579ca9a7a44903b5cb761f3f6cdda5a726d27b105d41ea88494b78
SHA512c584d8f162314e5a18b592c7d46adcb9ae4658078f972ba67876211d8b3587aee81ee2c88eeb095c0e805591e26f3aed790e3462ab11b9765833132038239652
-
Filesize
3KB
MD5536b8a8b431792b4c81e7c28df1d70db
SHA1deaf80952c98195955900deeb2b44e5f8b0fac41
SHA2564992b5d0808325585ff5495588bc07ca388c96872159d8f956e33f160ac26bc2
SHA512bfbbb1fa69eff5e86349dfdb94494022c332714f5f70b0800b0e3319296b1d96199d6b30dee4adcbfa359485b8d66f4748eb916e83929aacdbfbf7c44d564c64
-
Filesize
28KB
MD5de619081e22b3ed7372f3148e18cac66
SHA113a5744c2e5da6f9bddefd965d3476ec43aa9df1
SHA256b704057cff16ac3e7045383680551966a921e1f26f9fd86308a2e5c5aca89850
SHA5120febf14fe2ce63266758ff7279cb8959ea4cc59df6fc3e59e2bcc3e465395a8e7a83de093563f141db498873aa3ddded3e3831a7344a69f128fd368e54937e66