Analysis

  • max time kernel
    26s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    14-04-2022 13:56

General

  • Target

    1e45dc95f84bf9a013e7daba8672892da60ddf82dff3aa5e156fad3a5ec5cbcd.pdf

  • Size

    2KB

  • MD5

    612ffb81cce63a5d0af3ee36025acfff

  • SHA1

    d97a1a9b79e5277c1c1b124154e56274b57f40dc

  • SHA256

    1e45dc95f84bf9a013e7daba8672892da60ddf82dff3aa5e156fad3a5ec5cbcd

  • SHA512

    514011950c484a2fce75a0cba7b577aa590c7246755fcf87f441f5d53ac875b750ec27f93389fc68457c71adcd9d245826ecef6d20c25e878a795f4fefa2ef6c

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\1e45dc95f84bf9a013e7daba8672892da60ddf82dff3aa5e156fad3a5ec5cbcd.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1424

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1424-54-0x0000000075951000-0x0000000075953000-memory.dmp
    Filesize

    8KB