Analysis
-
max time kernel
18s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 05:38
Behavioral task
behavioral1
Sample
Example-One-Way-Non-Disclosure-Agreement.pdf
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
Example-One-Way-Non-Disclosure-Agreement.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
Example-One-Way-Non-Disclosure-Agreement pdf.pdf.accreport.html
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Example-One-Way-Non-Disclosure-Agreement pdf.pdf.accreport.html
Resource
win10v2004-20250314-en
General
-
Target
Example-One-Way-Non-Disclosure-Agreement.pdf
-
Size
18KB
-
MD5
8d406e9beda0d589ffde9df07fb658de
-
SHA1
b010eb666f933c54212dad09cb623c6c2e9d5564
-
SHA256
77823dcf8702d10508e2b079b837003e060c063acdf08d7ae01c29cbb668a620
-
SHA512
1bc89c5359ac6f0235cd68b5e1551d999ddb662f566a1df056d859253569d3e53aa73790bb380977a710e5ace35593996099bd54401e7e5127129f4921b6bf46
-
SSDEEP
384:oj7hA8OpsHyqhyhbWdVYrHQNNB2JN8v/h3Lu8:0C8OCHG8dJK/Y/1u8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1916 AcroRd32.exe 1916 AcroRd32.exe 1916 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Example-One-Way-Non-Disclosure-Agreement.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD571f94b364742681a9141e0530f64b698
SHA157dcbb1e3cf9ad10df3010f4b2d9c1534ab4fb0f
SHA25694384737459873b35f5aec3aadfc268d5ba0221aff30650bd3bf925261154769
SHA512d421bd59567cae2a2a8af986e41d2dc146f9dec71ae4166257b06c0669f09a91c20ff86628d5ded815f464c16fceda554725914585f87e6e6531a97b586c4a0d