Analysis

  • max time kernel
    173s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    02-05-2022 21:28

General

  • Target

    499153866ace7fa11faa1e284ff53ba1059a59b5e2d738e55e1bc041fdc2f5ac.pdf

  • Size

    17KB

  • MD5

    40f10b13d7de9b305ac8347130e189c8

  • SHA1

    61cedb3b71ef3399ad1cb5d5e52254540c407c50

  • SHA256

    499153866ace7fa11faa1e284ff53ba1059a59b5e2d738e55e1bc041fdc2f5ac

  • SHA512

    b805c50bca1c37e3cd4334db1b3a8ee537e4bea009953704fa7030acbb96af1797f5d81910113cc988cec4af82f855125e0cab98d3cd298368fd783a5d0df1bf

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\499153866ace7fa11faa1e284ff53ba1059a59b5e2d738e55e1bc041fdc2f5ac.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1792

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1792-54-0x0000000075C51000-0x0000000075C53000-memory.dmp
    Filesize

    8KB