Analysis
-
max time kernel
167s -
max time network
144s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
21-01-2022 23:39
Behavioral task
behavioral1
Sample
7790daa6919363d95e44145128c67d1002cd598746ae3daf7dc6d7dc781d5247.pdf
Resource
win7-en-20211208
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
7790daa6919363d95e44145128c67d1002cd598746ae3daf7dc6d7dc781d5247.pdf
Resource
win10-en-20211208
0 signatures
0 seconds
General
-
Target
7790daa6919363d95e44145128c67d1002cd598746ae3daf7dc6d7dc781d5247.pdf
-
Size
67KB
-
MD5
76a6a7d2ab9e95b28876139cd6a887ee
-
SHA1
65f4323b6eb7dc9f08c377485b40596eee2feb06
-
SHA256
7790daa6919363d95e44145128c67d1002cd598746ae3daf7dc6d7dc781d5247
-
SHA512
4c7937b32b44cad38afd84ecdcb2b9caada9f0c62ad769d005f3e58a42125bc843c8bdf0a25ccd4cd77b139e8204bab5826e8d382dc0778dbcb43d53c095ac86
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 1412 AcroRd32.exe 1412 AcroRd32.exe 1412 AcroRd32.exe 1412 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1412-55-0x0000000076851000-0x0000000076853000-memory.dmpFilesize
8KB