Analysis

  • max time kernel
    150s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220331-en
  • submitted
    04-04-2022 03:45

General

  • Target

    uc?export=download&id=1YBJzMgSa40PNHZPt8EyWUVuukCXP_zBl.pdf

  • Size

    90KB

  • MD5

    f0eb26862f3f9f99ad2f68a40dcd18ee

  • SHA1

    e6058c2b2b28b87b19285586fbd23258b2cd2f6f

  • SHA256

    55f343fef0e9bbad69f53442a619df80c3b2226cd6a1cb960eefc5c8f13f5a2b

  • SHA512

    dae5850964be81466e4c03dc6f3699eb073d2f5d8c5b50a442a05c8c9162047bc93f449485736e8e0a6ca1a0179f1aedaa355e9b2f1bf881a881943cf1986db9

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\uc_export=download&id=1YBJzMgSa40PNHZPt8EyWUVuukCXP_zBl.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:336

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/336-54-0x00000000755F1000-0x00000000755F3000-memory.dmp
    Filesize

    8KB