Analysis
-
max time kernel
59s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/03/2025, 14:46
Behavioral task
behavioral1
Sample
EDF Contract.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
EDF Contract.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
IA LOA.pdf
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
IA LOA.pdf
Resource
win10v2004-20250314-en
General
-
Target
EDF Contract.pdf
-
Size
176KB
-
MD5
a2a194326a05472e0516a4a56359ac89
-
SHA1
0e25cd4f1632bb193e61e4a897610f61c4509f3f
-
SHA256
ce5cd042f04dce2d2efaac9950724d70bc6cf6b90c163fc5cc40adfbadbb21da
-
SHA512
a96d6160621aa616269f78020e721ae99d21edc1241f2a039316cb536dd1aeab3249907b78cb554537c7cf13a2c087b82d51d0ec310687e98f9434d6b7987a4b
-
SSDEEP
3072:ziwIRU/dQ6a5zpbmhLQnY9ErX9haPo0U2Gc7JSTMrzOwmbtYgOrNMsoRztqGbcIw:OOON5zpyplgsU2GMJSTdwmC51o3qGbcF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1640 AcroRd32.exe 1640 AcroRd32.exe 1640 AcroRd32.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD51567d028344733d74c37239c2515268c
SHA1ae98dcea8f3753f1df2c1ac9a4a461be89165085
SHA256d0ea6ddd60217db73e43bc38cfdee4d314be0a511845698121dce9176a9d10d6
SHA5121ef3f57d460634e17b2f910a1162d998ab92d204cde40a3e8d6bfa868061ef1f6b6275270a7d185f383135f035767c1487118a2e88e821ea44ec8b455513c93f