Analysis

  • max time kernel
    161s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    19-02-2022 23:42

General

  • Target

    0322c8b0586ef9af81fd28fcc09d916da6c30b1238d832156d57ae712c259988.pdf

  • Size

    651KB

  • MD5

    6f1bd3cb6e104ed6607e148086b1e171

  • SHA1

    301d18b23e4259ea3bdc67d34555fefbb2d2795e

  • SHA256

    0322c8b0586ef9af81fd28fcc09d916da6c30b1238d832156d57ae712c259988

  • SHA512

    09c39d92f428ffeb32bc07a08e3e1f63c208ef3c469fd602733498a0102cab60187d2ac80c303c116fe181754329a5535f764e5c9b2ee2f6241148db2ae037d7

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\0322c8b0586ef9af81fd28fcc09d916da6c30b1238d832156d57ae712c259988.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1940

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1940-55-0x00000000760F1000-0x00000000760F3000-memory.dmp
    Filesize

    8KB