Analysis

  • max time kernel
    152s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    30-01-2022 15:18

General

  • Target

    3f5aebcd4b96e70ce93a7e2de86559564850a9c425f7727ed480236e94b5893f.pdf

  • Size

    67KB

  • MD5

    8cbd420947d71c373a2a489488502dcd

  • SHA1

    84e54692ac1a516ca956ffee6c99d8c0bc9544f1

  • SHA256

    3f5aebcd4b96e70ce93a7e2de86559564850a9c425f7727ed480236e94b5893f

  • SHA512

    f7fea5a53676f4864e6f2e5e1d9087719363373a12b58dac60e9d2595213e324d5b65b8290d84122454c83499195fc8b673eccea03a7f3d40f482a269d156b6c

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\3f5aebcd4b96e70ce93a7e2de86559564850a9c425f7727ed480236e94b5893f.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1568

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1568-54-0x0000000076371000-0x0000000076373000-memory.dmp
    Filesize

    8KB