Analysis
-
max time kernel
150s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220331-en -
submitted
12-04-2022 16:35
Behavioral task
behavioral1
Sample
UC_DUELS_2022_SavetheDate_v4.pdf
Resource
win7-20220331-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
UC_DUELS_2022_SavetheDate_v4.pdf
Resource
win10v2004-en-20220113
0 signatures
0 seconds
General
-
Target
UC_DUELS_2022_SavetheDate_v4.pdf
-
Size
533KB
-
MD5
914ae06f27821e276c442428b9c1c981
-
SHA1
86a66171fa7f714fabb1a46db0353de7c14f82b1
-
SHA256
0f2ee96c1cf3a5740e72db1ce1bf4584b7b212c9ce8c216d42576c620dc2f427
-
SHA512
efe8d3ba28ed9499e089a8c2b885d143f513b47d2a9cb71fdda7dd98c3018988ad4c9f866d0d6db5c4734ff09a57cfc980e4c72725317f1524ed60910cf206d1
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 1620 AcroRd32.exe 1620 AcroRd32.exe 1620 AcroRd32.exe 1620 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1620-54-0x0000000075A41000-0x0000000075A43000-memory.dmpFilesize
8KB