Analysis
-
max time kernel
150s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220331-en -
submitted
11-04-2022 03:35
Behavioral task
behavioral1
Sample
vunateduremar.pdf
Resource
win7-20220331-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
vunateduremar.pdf
Resource
win10v2004-20220331-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
vunateduremar.pdf
-
Size
74KB
-
MD5
72950325644838b18c5d4e86d4dbda1d
-
SHA1
190443eaa2ea924fadda7a57646d57f5337d42b0
-
SHA256
b2a6385c3f4b161aeaa731ea60d419bf75a0ff098dd397ecd6f0c2c1431a691c
-
SHA512
d05d313d8a6acf694b5f82474ceb9fb53b73883c6f3da5ab64a14f38e81bfddad64cbdd8f3b6853a838a044c61933aff73a153add288077024d524fba315bfe5
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 1648 AcroRd32.exe 1648 AcroRd32.exe 1648 AcroRd32.exe 1648 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1648-54-0x0000000075D11000-0x0000000075D13000-memory.dmpFilesize
8KB