Analysis
-
max time kernel
150s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
02-05-2022 21:28
Behavioral task
behavioral1
Sample
12f4119e90a149e36b4d91819dd9500f8301d40051311a92dbeada7f7a39d07b.pdf
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
12f4119e90a149e36b4d91819dd9500f8301d40051311a92dbeada7f7a39d07b.pdf
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
12f4119e90a149e36b4d91819dd9500f8301d40051311a92dbeada7f7a39d07b.pdf
-
Size
17KB
-
MD5
f4f2b478bdba464896f8015019062fbd
-
SHA1
db7957b1a930b72e494114a4ad1310db6f175b6a
-
SHA256
12f4119e90a149e36b4d91819dd9500f8301d40051311a92dbeada7f7a39d07b
-
SHA512
e8f23dbf81b708c1285a24e694775f5da7c4c330c0f18bfa58d91b62ccc63af6383a84673cd8741285397f875c8383f6036f991b3fa7e63890871b9bc0c4c68c
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 1468 AcroRd32.exe 1468 AcroRd32.exe 1468 AcroRd32.exe 1468 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1468-54-0x0000000075371000-0x0000000075373000-memory.dmpFilesize
8KB