Analysis

  • max time kernel
    162s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    02-02-2022 04:15

General

  • Target

    d7de68febbbdb72ff820f6554afb464b5c204c434faa6ffe9b4daf6b691d535f.pdf

  • Size

    398KB

  • MD5

    43f4c17f0851fc882b6d9fb588d141f2

  • SHA1

    1daeb5f0383ce4c9cce280bf607a17abeaf1ddec

  • SHA256

    d7de68febbbdb72ff820f6554afb464b5c204c434faa6ffe9b4daf6b691d535f

  • SHA512

    63c9a9288b87a7444751074383799e7b45ba08492b0654eb32dbb08a3c7ca66f260b6e51e559cb09a53480f8e8d3aa236312cc2f17e938d25567bda5ff15a002

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\d7de68febbbdb72ff820f6554afb464b5c204c434faa6ffe9b4daf6b691d535f.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1592

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1592-55-0x00000000758A1000-0x00000000758A3000-memory.dmp
    Filesize

    8KB