Analysis

  • max time kernel
    153s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    02-05-2022 21:28

General

  • Target

    b1359d9a81ee5c73332d5b02cf40a1976aa4e82322a326273039f47b7592ca60.pdf

  • Size

    19KB

  • MD5

    fc7c767396c90b47f45e8c0393cb8216

  • SHA1

    3492dc96256540dcdac58dad1f3a157f904b3299

  • SHA256

    b1359d9a81ee5c73332d5b02cf40a1976aa4e82322a326273039f47b7592ca60

  • SHA512

    a6685d25576f62c14b43dc130646ecbe13ad9f4cbfe7758cee017c25e8869d730f453afcd12d30210f427ed1e0bea68c8bd085ee471e820239df15172b96d18d

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\b1359d9a81ee5c73332d5b02cf40a1976aa4e82322a326273039f47b7592ca60.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1860

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1860-54-0x0000000075E41000-0x0000000075E43000-memory.dmp
    Filesize

    8KB