Analysis
-
max time kernel
153s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
02-05-2022 21:28
Behavioral task
behavioral1
Sample
b1359d9a81ee5c73332d5b02cf40a1976aa4e82322a326273039f47b7592ca60.pdf
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
b1359d9a81ee5c73332d5b02cf40a1976aa4e82322a326273039f47b7592ca60.pdf
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
b1359d9a81ee5c73332d5b02cf40a1976aa4e82322a326273039f47b7592ca60.pdf
-
Size
19KB
-
MD5
fc7c767396c90b47f45e8c0393cb8216
-
SHA1
3492dc96256540dcdac58dad1f3a157f904b3299
-
SHA256
b1359d9a81ee5c73332d5b02cf40a1976aa4e82322a326273039f47b7592ca60
-
SHA512
a6685d25576f62c14b43dc130646ecbe13ad9f4cbfe7758cee017c25e8869d730f453afcd12d30210f427ed1e0bea68c8bd085ee471e820239df15172b96d18d
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 1860 AcroRd32.exe 1860 AcroRd32.exe 1860 AcroRd32.exe 1860 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1860-54-0x0000000075E41000-0x0000000075E43000-memory.dmpFilesize
8KB