Resubmissions

08-04-2022 08:16

220408-j6ez3sffgr 3

07-04-2022 11:36

220407-nqzf1afeb8 6

07-04-2022 11:31

220407-nm4asacchn 3

Analysis

  • max time kernel
    154s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220331-en
  • submitted
    07-04-2022 11:36

General

  • Target

    TT copy (3).pdf

  • Size

    84KB

  • MD5

    29cee601ffd40bcbdded7b6b1ecb59c5

  • SHA1

    57551f4ba5b1da74f4d1890fe1ec25b4046e8d96

  • SHA256

    ec2917bf44eeb0bed1da25d1c37e7051f8b00916cb4606e7dad01a8fef691ee4

  • SHA512

    8b6b77627f6b13eeaeb058640628c2583847dece5f565da9d1aea2c54210ea655d68aaa20fc44ea44ac17b1ba46fd73ffb84cbc157af28f9d025f82b75ae73c1

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\TT copy (3).pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1940

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1940-54-0x0000000075AA1000-0x0000000075AA3000-memory.dmp
    Filesize

    8KB