Analysis
-
max time kernel
151s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
18-04-2022 13:27
Behavioral task
behavioral1
Sample
Payment- Claim.pdf
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Payment- Claim.pdf
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
Payment- Claim.pdf
-
Size
27KB
-
MD5
69087c06785b6092e959c1c89202a09d
-
SHA1
cb5ad3a48d7668ce8f9ddb244670fbc24410502c
-
SHA256
9d75b42815897f96fb541f473545b135089507b8c7cf69a32d4006f22ac44cc1
-
SHA512
c5598661b2ed13cd41f944847333b8f122eee92cd9815f391ccd9bdf63f7a02a35fb2f2d2f1337da785b8807986da9862bd1c8d25f7c9e0ae5687c6a4625bcfc
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 1280 AcroRd32.exe 1280 AcroRd32.exe 1280 AcroRd32.exe 1280 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1280-54-0x00000000756E1000-0x00000000756E3000-memory.dmpFilesize
8KB