Analysis

  • max time kernel
    152s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    19-02-2022 23:43

General

  • Target

    022b843128655547fcd512d5266fcbd45461bdb9dfee56f3fe3fc657d731d8c6.pdf

  • Size

    304KB

  • MD5

    b520f4f9d87940a55363161491e69306

  • SHA1

    584715be22d5067b43e3954c4c6fefaea3f1a99d

  • SHA256

    022b843128655547fcd512d5266fcbd45461bdb9dfee56f3fe3fc657d731d8c6

  • SHA512

    4b9e4889929182f8b280bed4e5cc3579fdbd39bd7abdbb99eb505f325c27135db52c4e010d5e607ab572e999c13676292187ec7f1148c96ce2beb112239fd3e1

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\022b843128655547fcd512d5266fcbd45461bdb9dfee56f3fe3fc657d731d8c6.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1548

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1548-55-0x0000000075AB1000-0x0000000075AB3000-memory.dmp
    Filesize

    8KB