Analysis

  • max time kernel
    151s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    02-05-2022 21:28

General

  • Target

    cb918a6f38d8e71148611772c2764791c16fe596f604b3e45af844f51cf86077.pdf

  • Size

    32KB

  • MD5

    8e3da494987d6fdb90b7f501d4f48661

  • SHA1

    25fdaecc1030f516feabfb453f53b99734302408

  • SHA256

    cb918a6f38d8e71148611772c2764791c16fe596f604b3e45af844f51cf86077

  • SHA512

    e924aa6250bb2da24101b0ce9b015a649180c2b267644ee3ad14c2459f9eb93e11d9d7fe29f6f9eeaf7823445b30ad6850caac746f4cd405b1f1af3277b2b481

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\cb918a6f38d8e71148611772c2764791c16fe596f604b3e45af844f51cf86077.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1640

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1640-54-0x0000000075AE1000-0x0000000075AE3000-memory.dmp
    Filesize

    8KB