Analysis
-
max time kernel
59s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
27/03/2025, 14:46
Behavioral task
behavioral1
Sample
EDF Contract.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
EDF Contract.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
IA LOA.pdf
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
IA LOA.pdf
Resource
win10v2004-20250314-en
General
-
Target
IA LOA.pdf
-
Size
44KB
-
MD5
9acaf961023ea16caa8ec9a0ce22ed07
-
SHA1
0a82755ea05d50e2cb2dd199b03e0d55ee5f425f
-
SHA256
e489e9cdd91df1db360c15841942aca7941f1255d5d7d4f285086cf41701073f
-
SHA512
b4a6825bbc9bc67b2ed6ccd7b784d9ef18ee055309ec37b26246b4f5b4fa9b520f844d3d9938833abf049be00a466b50527c2c47b88710d8b3a7e50bfd25a2c3
-
SSDEEP
768:6eLUilCqs/Dqhd/Y3jhzEPdISO2wWGk9TkNvlPWYtTbGQQ8yVUmsvKn:6ehYqs/DqEdEe32wn79TLyVUvvKn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2568 AcroRd32.exe 2568 AcroRd32.exe 2568 AcroRd32.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a1483436ba801da048524a6081cc5870
SHA1497a99dcd9dd9f773262b369c526062c7c689c89
SHA25645c5b64a2e0437db521d7d47cf9bd5a246799569247df7241547412d58f8e003
SHA5122e30ebcd328451f908f4c50d2d96f0c47d6281967bb48596d35182d6603f00e43fa3d12d49ca18247af9b359159275f3df90acf2703779ed795f6f0f9f90b60d