Analysis
-
max time kernel
152s -
max time network
132s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
19-02-2022 23:43
Behavioral task
behavioral1
Sample
022b843128655547fcd512d5266fcbd45461bdb9dfee56f3fe3fc657d731d8c6.pdf
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
022b843128655547fcd512d5266fcbd45461bdb9dfee56f3fe3fc657d731d8c6.pdf
Resource
win10v2004-en-20220112
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
022b843128655547fcd512d5266fcbd45461bdb9dfee56f3fe3fc657d731d8c6.pdf
-
Size
304KB
-
MD5
b520f4f9d87940a55363161491e69306
-
SHA1
584715be22d5067b43e3954c4c6fefaea3f1a99d
-
SHA256
022b843128655547fcd512d5266fcbd45461bdb9dfee56f3fe3fc657d731d8c6
-
SHA512
4b9e4889929182f8b280bed4e5cc3579fdbd39bd7abdbb99eb505f325c27135db52c4e010d5e607ab572e999c13676292187ec7f1148c96ce2beb112239fd3e1
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 1548 AcroRd32.exe 1548 AcroRd32.exe 1548 AcroRd32.exe 1548 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1548-55-0x0000000075AB1000-0x0000000075AB3000-memory.dmpFilesize
8KB