Overview
overview
10Static
static
35af0f5b0ba...de.exe
windows7-x64
105af0f5b0ba...de.exe
windows10-2004-x64
10MihalyLeve...g.docx
windows7-x64
3MihalyLeve...g.docx
windows10-2004-x64
1Mihály Le...17.pdf
windows7-x64
3Mihály Le...17.pdf
windows10-2004-x64
3Mérések ...2.xlsx
windows7-x64
3Mérések ...2.xlsx
windows10-2004-x64
1Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/03/2025, 21:03
Static task
static1
Behavioral task
behavioral1
Sample
5af0f5b0bada5b7aaa681eddebc47734267af06eb39610590a625315f449d4de.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
5af0f5b0bada5b7aaa681eddebc47734267af06eb39610590a625315f449d4de.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
MihalyLevente_Vezetotrening.docx
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
MihalyLevente_Vezetotrening.docx
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
Mihály Levente_Tartalmi kivonat_2017.pdf
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Mihály Levente_Tartalmi kivonat_2017.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
Mérések Co2 lézeres kezelésre_v2.xlsx
Resource
win7-20250207-en
Behavioral task
behavioral8
Sample
Mérések Co2 lézeres kezelésre_v2.xlsx
Resource
win10v2004-20250314-en
General
-
Target
Mihály Levente_Tartalmi kivonat_2017.pdf
-
Size
393KB
-
MD5
0c45e66bfc426204973a46d445390cba
-
SHA1
dc19b9cdd3f6610e4b9aa6dbf98f9d4005a94d47
-
SHA256
06abc5656494da7c43fecd8f35fe21d9ea20663e7639717e8adf631ee3c15207
-
SHA512
2d0de5d667829a1b72331c532b4f38fedae33f99f35e8589b5f9ef2185b34af66f65976f9686995e2f7c2b2cdafe823b0a372ceecd8952e9de7ef0ef477cb4e8
-
SSDEEP
12288:bShkqN0cQbIy6hVh2eOaH8anOvZ0ox/gV1xOvtP0+sw:bShjZ4ZGhcAYRB4181PJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3060 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3060 AcroRd32.exe 3060 AcroRd32.exe 3060 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Mihály Levente_Tartalmi kivonat_2017.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55dbe44ce039bc0f84dea1463455f8624
SHA17fa85387030dc33d0c6462a360624a1921b86f92
SHA25609f7e5a320d4e3dd6a63501bdcfc4eeabc9a0573fc4614a21a0467dfdcc9d7ff
SHA51238d2ab5c193e735cd45b385bd0686ae56f3432e1a88fdc040229e01136900efaa37a6c8b29f716f72af4337319279d69a0fda47f9cf4cdc6a13673ffdf0ad408