Analysis

  • max time kernel
    94s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    25/03/2025, 17:33

General

  • Target

    4dc9b0c20ea61d91d6a1b5bdce76fb5365de0762efb8f6c2925113c6a8950cae.pdf

  • Size

    211KB

  • MD5

    930fc7badacf1a19816a97775662ae54

  • SHA1

    d950e144b4c5a3eaacd2d9ed22b4c63264f70426

  • SHA256

    4dc9b0c20ea61d91d6a1b5bdce76fb5365de0762efb8f6c2925113c6a8950cae

  • SHA512

    585d5d16ed27e2e647d94bb7ce053ea4cb73c40a1ccad7502cb71d066b82fc17b605d23c2d04e25521e1785471a3fa678e26caee8d1075f271f69268042236e6

  • SSDEEP

    6144:BahViqwtQgMGSsMoca/wuLQY7tXirGLz6VMgt:Be2QOSsPJPLQY7krGazt

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 42 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\4dc9b0c20ea61d91d6a1b5bdce76fb5365de0762efb8f6c2925113c6a8950cae.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1584
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    2c455386eba139def58917a950624647

    SHA1

    9a6db39ef8f836e6a953d4907369c1f55401ea0b

    SHA256

    b4cb1cfb09be9f4bc44b8f4e44543bdfc09cbed901e16a5abeb09095dd9cbcb1

    SHA512

    c6e24f048c9077bfea3faca11591d183462982468bb387c285b2dde5510f53493e37fa79d9188a7f5d7895b50573677ae48fa520c95abfcff724b4a89b56d97f

  • memory/1584-17-0x0000000000E80000-0x0000000000E82000-memory.dmp

    Filesize

    8KB