Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220331-en -
submitted
12-04-2022 16:32
Behavioral task
behavioral1
Sample
UC_DUELS_2022_SavetheDate_FRENCH_v2.pdf
Resource
win7-20220331-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
UC_DUELS_2022_SavetheDate_FRENCH_v2.pdf
Resource
win10v2004-20220331-en
0 signatures
0 seconds
General
-
Target
UC_DUELS_2022_SavetheDate_FRENCH_v2.pdf
-
Size
534KB
-
MD5
bbf52308d89a389234a73603f5f1ae78
-
SHA1
5f4ce7ddc7bb0ea3c3a6d3a332fa698983fc4694
-
SHA256
548b11131a40bd94bf39fa234ffe8c14985a9116c52789729c24ac604f91b56e
-
SHA512
07bfde81cfc5ebd6d4e390c7e0096904fa210e3a232d8e9ed067c036365dd427f3b02b8375ef65264ed147f919076770a43c715e8cd428015ad40e424a361d37
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 756 AcroRd32.exe 756 AcroRd32.exe 756 AcroRd32.exe 756 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/756-54-0x0000000075D31000-0x0000000075D33000-memory.dmpFilesize
8KB