Analysis

  • max time kernel
    158s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    21-01-2022 23:01

General

  • Target

    e32944abfe4d11cb0cf3f05d5d259520590e1ba4992919ecd08deec9de1b62a0.pdf

  • Size

    64KB

  • MD5

    19aaaaf2be7c21f97652173840f6b449

  • SHA1

    82b3eedc49bfa287ca0debd41c9834b79eb4c185

  • SHA256

    e32944abfe4d11cb0cf3f05d5d259520590e1ba4992919ecd08deec9de1b62a0

  • SHA512

    17e38b6efd031388d73d4473af9e90c20796408eb42c0cf4c07688ff478717ca2cf60301781c916b7c5975175323b006ea1f4b2326c531dc5d77c47406e84202

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\e32944abfe4d11cb0cf3f05d5d259520590e1ba4992919ecd08deec9de1b62a0.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1672

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1672-55-0x0000000075321000-0x0000000075323000-memory.dmp
    Filesize

    8KB