Analysis

  • max time kernel
    153s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    30-01-2022 15:03

General

  • Target

    4ba7c0d32f870a1cea7ae630fc171a0f4c9b844a1f5f08bb322ee5e75713b93a.pdf

  • Size

    67KB

  • MD5

    79b86fd8c0d427978e7f629eb5a271f1

  • SHA1

    dfe5648265e122c0575065aea18392320e0ed6e7

  • SHA256

    4ba7c0d32f870a1cea7ae630fc171a0f4c9b844a1f5f08bb322ee5e75713b93a

  • SHA512

    609a2deca00f87bb91a8731a4aaa7910bc1fe9c80a20015b1dedc5a380c7466355b4d9da12635a50fc5353b94fba20250cf2ec53b432ba81be7f3decdc8b2a2c

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\4ba7c0d32f870a1cea7ae630fc171a0f4c9b844a1f5f08bb322ee5e75713b93a.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:1916

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1916-54-0x0000000075F21000-0x0000000075F23000-memory.dmp
    Filesize

    8KB