Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 19:35
Behavioral task
behavioral1
Sample
Pedido Despachado.eml
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0000011506_03BUC.pdf
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
email-html-2.html
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
email-plain-1.txt
Resource
win7-20240903-en
General
-
Target
0000011506_03BUC.pdf
-
Size
7KB
-
MD5
57d3243760f0aeb3d1eae07617a31796
-
SHA1
ec9d00e6481ff35ff742ea670d1764932c72abc3
-
SHA256
9dce45fd25c1892177e4d5514fbda63bfead64f081ebbacb5bb889f0b89c0932
-
SHA512
0aa2adee2656db7ac1bc425a5c44df37cb1b50c66f09379fe267e564fb74c972ab469ee587e42ed3fb9b0dfba5370bf3ca2c5d3d76e6d3c9720e8b51809afe5c
-
SSDEEP
192:n96DB+IVvksm2rxoKnkrOldsGqseWsMpY0xnVLJLHXmC:nADlcuOKn2qdPq5WxNVLJLHWC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2128 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2128 AcroRd32.exe 2128 AcroRd32.exe 2128 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\0000011506_03BUC.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5cb573094ad79b05fbe68a1ebd22d61d0
SHA121d7b198126e1548d29cafa0d47a6b4a66d2120e
SHA25666308081f523cfc9c38865d8faae1e18c95f5e39c0acf88e9c759207dee4aeaa
SHA512299842137763c3c18400a4899a4305968c8f4dd8b99c37a2862e5c89b39a4c8e25e8b4051e89eb683664363b4f373f53ff0c18824b64efc3e62bded5ab83b65b