Analysis
-
max time kernel
151s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
02-05-2022 21:27
Behavioral task
behavioral1
Sample
ee2e3b18a567686350e8ad567a3671bacd7cc464257403e1f83ba40f68be9985.pdf
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
ee2e3b18a567686350e8ad567a3671bacd7cc464257403e1f83ba40f68be9985.pdf
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
ee2e3b18a567686350e8ad567a3671bacd7cc464257403e1f83ba40f68be9985.pdf
-
Size
16KB
-
MD5
ff697c0961553e8b12380d5f72945e79
-
SHA1
71797e85c256fcaf8b4a8f3789e1e1a8bfa36898
-
SHA256
ee2e3b18a567686350e8ad567a3671bacd7cc464257403e1f83ba40f68be9985
-
SHA512
e3db672f1be688e56697c7fa73b16c8e8d26313bc97b4f542af13a51b15373ba524355106dfb879ce5597323a3764557c8ccdffc52be2fc52df3c099263d2254
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 1700 AcroRd32.exe 1700 AcroRd32.exe 1700 AcroRd32.exe 1700 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1700-54-0x00000000753B1000-0x00000000753B3000-memory.dmpFilesize
8KB