Analysis

  • max time kernel
    4294179s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20220311-en
  • submitted
    22-03-2022 21:46

General

  • Target

    d9f2f82553ec178a507196b0a5c2ce7118c90676759a31230afbf0e686ff12ac.pdf

  • Size

    67KB

  • MD5

    5f950f9e14c8f049b2b08a34f2ea342d

  • SHA1

    561fda249ade07e00fa87eb9e06c0d6e15d6a3c2

  • SHA256

    d9f2f82553ec178a507196b0a5c2ce7118c90676759a31230afbf0e686ff12ac

  • SHA512

    b5e7df3b4084fcd443f1ce20efe0a7781e794d2dfbb2795e0dea50ecd5aff207a519d77fae5e79ee95fcaa451de088f5e5cd1928e11c4fec41c50bde963b1e42

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\d9f2f82553ec178a507196b0a5c2ce7118c90676759a31230afbf0e686ff12ac.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1084

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1084-54-0x0000000075C41000-0x0000000075C43000-memory.dmp
    Filesize

    8KB