Analysis

  • max time kernel
    152s
  • max time network
    101s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    29-10-2021 19:14

General

  • Target

    ljdkhsya.t110 mgif110 .zubmbq110 kub.xusa110 sdkj110 c.icc110 ljq.j110 gzq.110 nnurmlpu.c110 wvuvp11.pdf

  • Size

    167KB

  • MD5

    480449c0e271ed60b76862aa235309f4

  • SHA1

    88ba99767dd441f0cf41a834ac35c281bfc08594

  • SHA256

    d84fd8df6a76e4f44703a22d5c23de112f42cad47ec8800233a510edd672f4e2

  • SHA512

    14e502450376e136bd55b648612d9347758b81ca5ecf4cc0cec83fb90301e0b75664cfaa413c9ead578facd76239ebb73df520cd806da0fc801e9cad572063a4

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ljdkhsya.t110 mgif110 .zubmbq110 kub.xusa110 sdkj110 c.icc110 ljq.j110 gzq.110 nnurmlpu.c110 wvuvp11.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:564

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/564-54-0x0000000076581000-0x0000000076583000-memory.dmp
    Filesize

    8KB