Analysis

  • max time kernel
    42s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220331-en
  • submitted
    06-04-2022 07:00

General

  • Target

    =?UTF-8?B?7KCcMTXtmozsnbztlZjquLDsoovsnYDquLDsl4XrjIDsg4EucGRm?=.pdf

  • Size

    1.3MB

  • MD5

    59e923834ba97c7afc43132eb97934f2

  • SHA1

    71e2167717e5328867968e59d7485fce11379691

  • SHA256

    e7000b5f6a519e3bccc302c2933363a4afe3775a0bed024eeb8484af5a64f912

  • SHA512

    113aa8282a979ac04267dba869ea906e557e28a194c699f4f6f9b890c3bf6d3764101488e2eb232fc86b7d049c3db4e910bd12f052bf45d430125255b1bcd94d

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\=_UTF-8_B_7KCcMTXtmozsnbztlZjquLDsoovsnYDquLDsl4XrjIDsg4EucGRm_=.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1328

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1328-54-0x0000000075341000-0x0000000075343000-memory.dmp
    Filesize

    8KB