Analysis

  • max time kernel
    151s
  • max time network
    25s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    29-10-2021 19:14

General

  • Target

    ntrvooah592 q.yjolu592 p.zqad592 yzydam.592 ielybzze592 .wqz592 dotcq592 q.gckl.592 ujsj.teudo592 j.dsl592 u.pdf

  • Size

    108KB

  • MD5

    4976cbe7689cead5ef94849ecd11c96f

  • SHA1

    58736bf5d24383bad85587550b2a2c3628726063

  • SHA256

    785f6f6b7e16e7bde00cc1f640ca142764deff42700271cacdf607fa416735b5

  • SHA512

    03e075239963a6bb0451283aa176cdec67983b71a582b933aa74f9564e0c23b8c317f21a332b367916e2aa31effbe158ac9075bc58e4076f0940063e99b62c3b

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ntrvooah592 q.yjolu592 p.zqad592 yzydam.592 ielybzze592 .wqz592 dotcq592 q.gckl.592 ujsj.teudo592 j.dsl592 u.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1380

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1380-53-0x0000000075C11000-0x0000000075C13000-memory.dmp
    Filesize

    8KB