Analysis

  • max time kernel
    154s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    19-02-2022 23:37

General

  • Target

    0b2226eacb382e9194b5cd3efa45622ae4a41f8241cad80cc9025737313f333d.pdf

  • Size

    227KB

  • MD5

    40c1156d98c39ac08fd925d86775586d

  • SHA1

    75dc7f8e72ed42151c175dbe1fb8903a20596fcb

  • SHA256

    0b2226eacb382e9194b5cd3efa45622ae4a41f8241cad80cc9025737313f333d

  • SHA512

    2fa9fd8792ca2ba0bb4226ded49c9144abc4c3a8f22b41d022eacfecdb3b3137c30bf4820860a0b1ca6da16a3d824ed9b1097696c1d25a2c14b6476746f17a3d

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\0b2226eacb382e9194b5cd3efa45622ae4a41f8241cad80cc9025737313f333d.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1672

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1672-55-0x0000000075321000-0x0000000075323000-memory.dmp
    Filesize

    8KB