b3488ce3546e22ec56fa048de1ce2440b50e33e9d513dea2f51a6246a9df774c.pdf
General
Target
Filesize
Completed
b3488ce3546e22ec56fa048de1ce2440b50e33e9d513dea2f51a6246a9df774c.pdf
984KB
24-11-2021 15:07
Score
1/10
MD5
SHA1
SHA256
3c5e75bc707edf5cf7e4906d9576582c
45c3ddf74581fc0a2a9af9b3fbbf69229f986609
b3488ce3546e22ec56fa048de1ce2440b50e33e9d513dea2f51a6246a9df774c
Malware Config
Signatures 2
Filter: none
-
Suspicious behavior: GetForegroundWindowSpamAcroRd32.exe
Reported IOCs
pid process 652 AcroRd32.exe -
Suspicious use of SetWindowsHookExAcroRd32.exe
Reported IOCs
pid process 652 AcroRd32.exe 652 AcroRd32.exe 652 AcroRd32.exe 652 AcroRd32.exe
Processes 1
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\b3488ce3546e22ec56fa048de1ce2440b50e33e9d513dea2f51a6246a9df774c.pdf"Suspicious behavior: GetForegroundWindowSpamSuspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Replay Monitor
00:00
00:00
Downloads
-
memory/652-55-0x0000000076241000-0x0000000076243000-memory.dmp
Title
Loading data