Analysis

  • max time kernel
    167s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    21-01-2022 23:39

General

  • Target

    7790daa6919363d95e44145128c67d1002cd598746ae3daf7dc6d7dc781d5247.pdf

  • Size

    67KB

  • MD5

    76a6a7d2ab9e95b28876139cd6a887ee

  • SHA1

    65f4323b6eb7dc9f08c377485b40596eee2feb06

  • SHA256

    7790daa6919363d95e44145128c67d1002cd598746ae3daf7dc6d7dc781d5247

  • SHA512

    4c7937b32b44cad38afd84ecdcb2b9caada9f0c62ad769d005f3e58a42125bc843c8bdf0a25ccd4cd77b139e8204bab5826e8d382dc0778dbcb43d53c095ac86

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\7790daa6919363d95e44145128c67d1002cd598746ae3daf7dc6d7dc781d5247.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1412

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1412-55-0x0000000076851000-0x0000000076853000-memory.dmp
    Filesize

    8KB