Analysis

  • max time kernel
    153s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    19-02-2022 21:25

General

  • Target

    c071047197f546135bcbb8dea0b8857ac11d37047c50abc063c9bbbb46acb056.pdf

  • Size

    330KB

  • MD5

    73ddf9f8fc3dc81671ea6c7600e68947

  • SHA1

    39774a74e746a11b29d7cbffe55d2f4603f5699f

  • SHA256

    c071047197f546135bcbb8dea0b8857ac11d37047c50abc063c9bbbb46acb056

  • SHA512

    e70b3f123350e4ae41231faf08616f80e8fa2d86e290a4479612bca678be0f2bf0afcf6b8d432e60a8c01e71cc16be6dd7a2bfbdcfb5ef17d198e896b737268b

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\c071047197f546135bcbb8dea0b8857ac11d37047c50abc063c9bbbb46acb056.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2032

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2032-55-0x0000000076731000-0x0000000076733000-memory.dmp
    Filesize

    8KB