Analysis
-
max time kernel
150s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220331-en -
submitted
04-04-2022 03:45
Behavioral task
behavioral1
Sample
uc?export=download&id=1YBJzMgSa40PNHZPt8EyWUVuukCXP_zBl.pdf
Resource
win7-20220331-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
uc?export=download&id=1YBJzMgSa40PNHZPt8EyWUVuukCXP_zBl.pdf
Resource
win10v2004-20220331-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
uc?export=download&id=1YBJzMgSa40PNHZPt8EyWUVuukCXP_zBl.pdf
-
Size
90KB
-
MD5
f0eb26862f3f9f99ad2f68a40dcd18ee
-
SHA1
e6058c2b2b28b87b19285586fbd23258b2cd2f6f
-
SHA256
55f343fef0e9bbad69f53442a619df80c3b2226cd6a1cb960eefc5c8f13f5a2b
-
SHA512
dae5850964be81466e4c03dc6f3699eb073d2f5d8c5b50a442a05c8c9162047bc93f449485736e8e0a6ca1a0179f1aedaa355e9b2f1bf881a881943cf1986db9
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 336 AcroRd32.exe 336 AcroRd32.exe 336 AcroRd32.exe 336 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/336-54-0x00000000755F1000-0x00000000755F3000-memory.dmpFilesize
8KB