Analysis
-
max time kernel
151s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
02-05-2022 21:27
Behavioral task
behavioral1
Sample
f427888cb8d0fbae894701a215867e734aee90f17ea1fa13434454ee5854ecce.pdf
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
f427888cb8d0fbae894701a215867e734aee90f17ea1fa13434454ee5854ecce.pdf
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
f427888cb8d0fbae894701a215867e734aee90f17ea1fa13434454ee5854ecce.pdf
-
Size
17KB
-
MD5
827214945ea006306718bdcfbcb940e6
-
SHA1
8d1aa12da0d951fd027bbea55d7eb60c765b4126
-
SHA256
f427888cb8d0fbae894701a215867e734aee90f17ea1fa13434454ee5854ecce
-
SHA512
01cd628ac0ecb46b5a0cfe84957111ee847beb860e6461ad4bf3efb1c8c9a8cab0931bb9a58d3394854bf1beab980b22561d7d463fa08267e9c1c530eb275a9e
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 1280 AcroRd32.exe 1280 AcroRd32.exe 1280 AcroRd32.exe 1280 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1280-54-0x00000000756E1000-0x00000000756E3000-memory.dmpFilesize
8KB