Resubmissions

07-04-2022 09:58

220407-lzv4tsbdcq 6

07-04-2022 09:52

220407-lwhpbseec2 3

Analysis

  • max time kernel
    104s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220331-en
  • submitted
    07-04-2022 09:52

General

  • Target

    Lazada Voucher Worth PHP3,500.00 ( Reference # MB-92297560 ).pdf

  • Size

    496KB

  • MD5

    d5fb926b2e51aeda4baafe5b8a5e3be8

  • SHA1

    144fb55fedf75d2a57fff39a849babf4eaf59567

  • SHA256

    cd04570c16f5c8ce0412e4535dc22c0dbfb14f3cb0ff35047100cb84fda59804

  • SHA512

    5447041ac5fb2f8c3c23a4f7776a81eca8128d68e7a472f3c3f1e299e9cd878b6424a7900b085c05523a65305407020ccc2f33778a432e93d172466d2d8e2728

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Lazada Voucher Worth PHP3,500.00 ( Reference # MB-92297560 ).pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1532

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1532-54-0x0000000076A51000-0x0000000076A53000-memory.dmp
    Filesize

    8KB