Analysis
-
max time kernel
26s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
14-04-2022 13:56
Behavioral task
behavioral1
Sample
1e45dc95f84bf9a013e7daba8672892da60ddf82dff3aa5e156fad3a5ec5cbcd.pdf
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
1e45dc95f84bf9a013e7daba8672892da60ddf82dff3aa5e156fad3a5ec5cbcd.pdf
Resource
win10v2004-20220331-en
0 signatures
0 seconds
General
-
Target
1e45dc95f84bf9a013e7daba8672892da60ddf82dff3aa5e156fad3a5ec5cbcd.pdf
-
Size
2KB
-
MD5
612ffb81cce63a5d0af3ee36025acfff
-
SHA1
d97a1a9b79e5277c1c1b124154e56274b57f40dc
-
SHA256
1e45dc95f84bf9a013e7daba8672892da60ddf82dff3aa5e156fad3a5ec5cbcd
-
SHA512
514011950c484a2fce75a0cba7b577aa590c7246755fcf87f441f5d53ac875b750ec27f93389fc68457c71adcd9d245826ecef6d20c25e878a795f4fefa2ef6c
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
AcroRd32.exepid process 1424 AcroRd32.exe 1424 AcroRd32.exe 1424 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1424-54-0x0000000075951000-0x0000000075953000-memory.dmpFilesize
8KB