Analysis
-
max time kernel
133s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 05:31
Behavioral task
behavioral1
Sample
global-verdict-report (1).pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
global-verdict-report (1).pdf
Resource
win10v2004-20250313-en
General
-
Target
global-verdict-report (1).pdf
-
Size
47KB
-
MD5
dec6942d8dd6c685e17e272b9ccce7c3
-
SHA1
2fc55e51f442e94c804e407fa10333b3de5e928e
-
SHA256
6c2fc5957724789f70e13f277da203a23fb6e81e2b5e3257e293415a42308a52
-
SHA512
b7fdde734413b8c5f61e13e1f492db775d36e769ac354197438df8d87b29d9e7a54724df594ce8c9cc611cc21059e2d4bc130f84e784cfaee0179e857318f970
-
SSDEEP
768:ercvrE6gazpHWIxyQDIMVC+25OxsZYWn7pSclPeG0OKFwKGWybwV80IclhWZtdtz:eHIA8DsWWFlPeG0KKGWykV8ohWLdlL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2672 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2672 AcroRd32.exe 2672 AcroRd32.exe 2672 AcroRd32.exe 2672 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\global-verdict-report (1).pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD551dbabd7416b11d8e5a38e84925b1344
SHA10e1dd162d924cb17a4421a3c8682761371c08d56
SHA2565c241b33de01914c6087263ce8c9c2251a4742ba02b03181d62b791cf0d4844a
SHA5122f015f96d9be1a984b77e1e968a6a1c8f56a260733c9c53c8713048e4e7de1a3607bc818961dd9ea4a91b4fe7eaf77808c22827e5ec6b67126ba7d9dd8f629bf