Analysis
-
max time kernel
40s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-04-2022 23:59
Behavioral task
behavioral1
Sample
JRF.pdf
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
JRF.pdf
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
JRF.pdf
-
Size
121KB
-
MD5
f068db5e2e1519c72d2bedf93b78f1ab
-
SHA1
7f952bdcf2f3051c40df9feddc146627d5cb3009
-
SHA256
978768741f478bccdd53d5f262d1a92f85de4a73cb8d142d0f05a441a120a64c
-
SHA512
793df3f6b1fddd79b0fcd9907c4124452269aa57a9388021337d24044a8d942c74cca8568b07e3072b2996b71d0f212b406d2af8bd8d9db1a8145764790ab340
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 1672 AcroRd32.exe 1672 AcroRd32.exe 1672 AcroRd32.exe 1672 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1672-54-0x00000000753B1000-0x00000000753B3000-memory.dmpFilesize
8KB