Analysis
-
max time kernel
187s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
02-05-2022 19:22
Behavioral task
behavioral1
Sample
a32b7f22634afd18f3eb44e4ad0dd8ffcd90fe4ff40ab39a3c633a00971309a4.pdf
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
a32b7f22634afd18f3eb44e4ad0dd8ffcd90fe4ff40ab39a3c633a00971309a4.pdf
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
a32b7f22634afd18f3eb44e4ad0dd8ffcd90fe4ff40ab39a3c633a00971309a4.pdf
-
Size
50KB
-
MD5
f6ee8435f5aa6330b7dbb261373c5874
-
SHA1
d8ad33a5586aaab4512805a539a1a31380612152
-
SHA256
a32b7f22634afd18f3eb44e4ad0dd8ffcd90fe4ff40ab39a3c633a00971309a4
-
SHA512
76621ea1d9c1d3d8252aa7ff5e80e2a3183eb57c4294d85c1e95b851fb47e134214d75817660c49bd700b2647bc33e960425a7fd76c00d3e26ccadd4f1b23bf1
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 1168 AcroRd32.exe 1168 AcroRd32.exe 1168 AcroRd32.exe 1168 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1168-54-0x00000000765C1000-0x00000000765C3000-memory.dmpFilesize
8KB