Analysis
-
max time kernel
161s -
max time network
141s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
19-02-2022 23:42
Behavioral task
behavioral1
Sample
0322c8b0586ef9af81fd28fcc09d916da6c30b1238d832156d57ae712c259988.pdf
Resource
win7-en-20211208
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
0322c8b0586ef9af81fd28fcc09d916da6c30b1238d832156d57ae712c259988.pdf
Resource
win10v2004-en-20220113
0 signatures
0 seconds
General
-
Target
0322c8b0586ef9af81fd28fcc09d916da6c30b1238d832156d57ae712c259988.pdf
-
Size
651KB
-
MD5
6f1bd3cb6e104ed6607e148086b1e171
-
SHA1
301d18b23e4259ea3bdc67d34555fefbb2d2795e
-
SHA256
0322c8b0586ef9af81fd28fcc09d916da6c30b1238d832156d57ae712c259988
-
SHA512
09c39d92f428ffeb32bc07a08e3e1f63c208ef3c469fd602733498a0102cab60187d2ac80c303c116fe181754329a5535f764e5c9b2ee2f6241148db2ae037d7
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 1940 AcroRd32.exe 1940 AcroRd32.exe 1940 AcroRd32.exe 1940 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1940-55-0x00000000760F1000-0x00000000760F3000-memory.dmpFilesize
8KB