Analysis
-
max time kernel
151s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
02-05-2022 21:27
Behavioral task
behavioral1
Sample
f62401a759b42a0779c0e0cfb7adf8d832d055280b643bc28f657f16a4f40871.pdf
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
f62401a759b42a0779c0e0cfb7adf8d832d055280b643bc28f657f16a4f40871.pdf
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
f62401a759b42a0779c0e0cfb7adf8d832d055280b643bc28f657f16a4f40871.pdf
-
Size
16KB
-
MD5
8687b2d8ea3112a79defe53f7a6b3857
-
SHA1
23879c04b89e417b2ad55a9f6a7f27f7bd4e7e52
-
SHA256
f62401a759b42a0779c0e0cfb7adf8d832d055280b643bc28f657f16a4f40871
-
SHA512
3a3dc2e8caa87d1610565892eee3965736ec799a4b413bf29ba5bcb408a96860875f2686603f2e7154cf003272b14f93d2851c7c924de1389155705efb76dff1
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 1792 AcroRd32.exe 1792 AcroRd32.exe 1792 AcroRd32.exe 1792 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1792-54-0x0000000075C51000-0x0000000075C53000-memory.dmpFilesize
8KB