Analysis

  • max time kernel
    155s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    02-11-2021 19:12

General

  • Target

    open and click xcndli9 cyuaa.yu9 bmgnfz.nr9 uzuquf9 .ziohsjg.9 ibsg.bj9 rbe.dkild.9 twfm.sk9 zajg9 b.pdf

  • Size

    164KB

  • MD5

    6896ff328a29309670a01f70cbd65153

  • SHA1

    98ad7cc5a77c5f53708e9c128954a35122a6ffc7

  • SHA256

    14737347ce754e897172f07082eb9eba97cbd1ed341ec9281c7729e661410d06

  • SHA512

    2d0e7b0a2dde6925d6481017aa4ddaab627a84c6a338068f822438313903bd1c4187db3a005822b6ee19ce05d5a733180d1bd014adb73fce1cfc9705e64dd744

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\open and click xcndli9 cyuaa.yu9 bmgnfz.nr9 uzuquf9 .ziohsjg.9 ibsg.bj9 rbe.dkild.9 twfm.sk9 zajg9 b.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:1684

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1684-55-0x0000000075B71000-0x0000000075B73000-memory.dmp
    Filesize

    8KB