Overview
overview
8Static
static
8sample.tar
windows7-x64
1sample.tar
windows10-2004-x64
1001e271055...89.pdf
windows7-x64
3001e271055...89.pdf
windows10-2004-x64
4004e74d54d...a0.pdf
windows7-x64
3004e74d54d...a0.pdf
windows10-2004-x64
30106fb569e...f19.js
windows7-x64
30106fb569e...f19.js
windows10-2004-x64
302bfe34bea...33.pdf
windows7-x64
302bfe34bea...33.pdf
windows10-2004-x64
4030423da29...aeb.js
windows7-x64
3030423da29...aeb.js
windows10-2004-x64
303042cc378...3e.pdf
windows7-x64
303042cc378...3e.pdf
windows10-2004-x64
304095314d5...c1.pdf
windows7-x64
304095314d5...c1.pdf
windows10-2004-x64
3049675afd5...89.pdf
windows7-x64
3049675afd5...89.pdf
windows10-2004-x64
30733c4e212...40.pdf
windows7-x64
30733c4e212...40.pdf
windows10-2004-x64
408da26158b...ff.pdf
windows7-x64
308da26158b...ff.pdf
windows10-2004-x64
30d711f2049...e5.pdf
windows7-x64
70d711f2049...e5.pdf
windows10-2004-x64
30e0c3a177b...077.js
windows7-x64
30e0c3a177b...077.js
windows10-2004-x64
30f24780097...37.pdf
windows7-x64
30f24780097...37.pdf
windows10-2004-x64
30f5d42aa99...7b.pdf
windows7-x64
30f5d42aa99...7b.pdf
windows10-2004-x64
30fc9c4e1e2...9e.pdf
windows7-x64
30fc9c4e1e2...9e.pdf
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/03/2025, 09:39
Behavioral task
behavioral1
Sample
sample.tar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sample.tar
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
001e2710555613a82e94156d3ed9c289.pdf
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
001e2710555613a82e94156d3ed9c289.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
004e74d54dcf79c641d5cf8a615488a0.pdf
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
004e74d54dcf79c641d5cf8a615488a0.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
0106fb569e87e02fc88d496064abdf19.js
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
0106fb569e87e02fc88d496064abdf19.js
Resource
win10v2004-20250313-en
Behavioral task
behavioral9
Sample
02bfe34bea55e327cfdead9cff215f33.pdf
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
02bfe34bea55e327cfdead9cff215f33.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
030423da29e1e6f4a527518126de4aeb.js
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
030423da29e1e6f4a527518126de4aeb.js
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
03042cc3786dafdb941019488d4cad3e.pdf
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
03042cc3786dafdb941019488d4cad3e.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
04095314d51057a13e21908de1266fc1.pdf
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
04095314d51057a13e21908de1266fc1.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
049675afd5c9505b9715872d499b9389.pdf
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
049675afd5c9505b9715872d499b9389.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
0733c4e2122cdfcfdd4699a3cbdc8b40.pdf
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
0733c4e2122cdfcfdd4699a3cbdc8b40.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
08da26158b76ca38e0ddb740aaf9b4ff.pdf
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
08da26158b76ca38e0ddb740aaf9b4ff.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
0d711f2049a6004cffe447dab78cd7e5.pdf
Resource
win7-20250207-en
Behavioral task
behavioral24
Sample
0d711f2049a6004cffe447dab78cd7e5.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
0e0c3a177b898c523e8303940ae99077.js
Resource
win7-20250207-en
Behavioral task
behavioral26
Sample
0e0c3a177b898c523e8303940ae99077.js
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
0f24780097467c4c54f8f306346dff37.pdf
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
0f24780097467c4c54f8f306346dff37.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
0f5d42aa99b17eabddc19a46013b517b.pdf
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
0f5d42aa99b17eabddc19a46013b517b.pdf
Resource
win10v2004-20250313-en
Behavioral task
behavioral31
Sample
0fc9c4e1e2148912188dd913ff95149e.pdf
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
0fc9c4e1e2148912188dd913ff95149e.pdf
Resource
win10v2004-20250314-en
General
-
Target
004e74d54dcf79c641d5cf8a615488a0.pdf
-
Size
115KB
-
MD5
004e74d54dcf79c641d5cf8a615488a0
-
SHA1
6413fbe0d90cb7f445f76dc8d1ccaacddd55df4a
-
SHA256
ba79bdf796b57696cc9f9f61ef00bb2c0fd21e2f2188a29a17dff00f9f0fad7f
-
SHA512
7b65d9d49dd27706948cd321cf873279cb0ef6e36d62f90095b9d7280b0f7bbee93827601e0ddabcf2850184483a43eabb71a02d71f4b48df6980c650fbfc0e6
-
SSDEEP
3072:bxb9EwZtg9daX+RVaMyvjCNUUAtkBrryl5Fi:FaDdusV/yv8/Y0rp
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3060 2200 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2200 AcroRd32.exe 2200 AcroRd32.exe 2200 AcroRd32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 3060 2200 AcroRd32.exe 30 PID 2200 wrote to memory of 3060 2200 AcroRd32.exe 30 PID 2200 wrote to memory of 3060 2200 AcroRd32.exe 30 PID 2200 wrote to memory of 3060 2200 AcroRd32.exe 30
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\004e74d54dcf79c641d5cf8a615488a0.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2200 -s 7562⤵
- Program crash
PID:3060
-