Analysis

  • max time kernel
    150s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    26-04-2022 12:21

General

  • Target

    QMCO053193 Speck Pumps YAN-SAV FCL 04 22 22.pdf

  • Size

    60KB

  • MD5

    85734b1437b83936499b75c3714da72d

  • SHA1

    b3e83cc1fbe3df90c32cf1fcba87f959961cf91a

  • SHA256

    d64328f9bd62ca0dd3e89e2b5ab49a0828504f383a2c36daf61a760e3173dfe2

  • SHA512

    3b6ceaab70e0b4e1b802394acf1bea8bcfc491cff35eadf91730c45ba0dd953f0fd1c0ddc7ee98bff77abae3de2e55c8b9e62ad529311e8f0647b2d56f4c6e3c

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\QMCO053193 Speck Pumps YAN-SAV FCL 04 22 22.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1596

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1596-54-0x0000000075781000-0x0000000075783000-memory.dmp
    Filesize

    8KB