Analysis
-
max time kernel
150s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 12:09
Behavioral task
behavioral1
Sample
Rebut_25-03-28_Oficina Antifrau de Catalunya__INSTANCIA.pdf
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Rebut_25-03-28_Oficina Antifrau de Catalunya__INSTANCIA.pdf
Resource
win10v2004-20250314-en
General
-
Target
Rebut_25-03-28_Oficina Antifrau de Catalunya__INSTANCIA.pdf
-
Size
138KB
-
MD5
1c51fb95a1a4208a852fd3f6af97dc47
-
SHA1
3288265918fe15bcd88cd60f13c9ec4311d37d74
-
SHA256
77c736516453d05b3e79bcba60fe4311a67eb83b03e339c38dfb786bfeda8f91
-
SHA512
d16be4a31767e8149b31d335b50ba67141d2be11fff3b16c1fec4b9304e99ae13e8895375ffe4080c01d1b92d5a7cb390a58247dabd1763d7b800cf1789ad329
-
SSDEEP
1536:FITw+NZ5MIFVZPRt/xX1dZAsswFW5Nlq1aND3elVJTclX5dUi493Tc:8w0ZrrxXLwlq1aND3+Vun
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2104 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2104 AcroRd32.exe 2104 AcroRd32.exe 2104 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Rebut_25-03-28_Oficina Antifrau de Catalunya__INSTANCIA.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD54618312ec50b52c81043bb6ff393cfc3
SHA180537497d939529b34de993b14d96510068bf075
SHA256e8e27396e2a043abd283eed4fd5b8fa256cc22e741defd522158fc9e29205839
SHA512fc589a974f35ee83c297784c7d7cc62826854422ceec2d5ff46aa6575f5b2bade27d26c1dfc0686602c81e5c14f75f7abd23e6c19fd90a2dbe70e0f5c09251e9
-
Filesize
3KB
MD53d1c5c4e65d9ef5fb9cf9c4010528121
SHA17197bd1780411bcfa090425466253b0a11a073a9
SHA25638c71c70105cc96e5c787a9612a095ae88a566c70755298e646ad807712a4e8c
SHA512e76c3690507d925e31b746efc6e0cf8e40232b9106996fab98ffcd7b85ba1a8f33f6b0def3154d33424ff6eb2fade9786de19108452d5567a7565a1f222ab81d