Analysis
-
max time kernel
129s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
27/03/2025, 13:45
Behavioral task
behavioral1
Sample
KAS Career Services.pdf
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
KAS Career Services.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
UMASS CL.pdf
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
UMASS CL.pdf
Resource
win10v2004-20250314-en
General
-
Target
UMASS CL.pdf
-
Size
70KB
-
MD5
086af8ceee2f387277a843d55f5b7846
-
SHA1
0496e536883d9390dd05e7b3c3fecc2a98807afc
-
SHA256
e816a2437080aa9b23f3589ec9b9605ca14df374ac94a45a4984f0d6784e4ef0
-
SHA512
18b2128835600d2cc27f5e853b9b2e9b17c4d1f6fb453f42973ca7a1e84cf003445aa23567361f5521f6e659f45fc4bbcae77cda5aec8d8a078444fe5098e7f7
-
SSDEEP
1536:Ea7QNLKOLsF5tNXKZQZpC5q8PoW7z4Fohyz1oKqY5VWMsXz2La/yKS1u:z7QNLKOAHt6fo8gW7zomyLfsXzsrtU
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1972 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1972 AcroRd32.exe 1972 AcroRd32.exe 1972 AcroRd32.exe 1972 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\UMASS CL.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD525dcef12f257a36321ac4d9b047c2567
SHA1df77af1c90e25cb173d2a8b7db7996bd06d9a25a
SHA2566bc17528f37bde58a040129f2665981e8d5a55d86faa1771aab01a5ef714b23c
SHA5128474b3b8b5ded6290430308821ecd827bcafbe698c915faee88bd46a77ba3912d277e92436c791048981443f53d5186d1bb5fa94b8894ea3b990ba0a261d4c08