Analysis
-
max time kernel
151s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
02-05-2022 19:26
Behavioral task
behavioral1
Sample
8db361cdbd50aa5219381807f35f6fb49729fe2d409d4f2c8f0f3a41342263cc.pdf
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
8db361cdbd50aa5219381807f35f6fb49729fe2d409d4f2c8f0f3a41342263cc.pdf
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
8db361cdbd50aa5219381807f35f6fb49729fe2d409d4f2c8f0f3a41342263cc.pdf
-
Size
44KB
-
MD5
20e41fcaa6b586dd3d14b1fee899241c
-
SHA1
e69c95fda69e15bb3347472219b58b6cddd6fb17
-
SHA256
8db361cdbd50aa5219381807f35f6fb49729fe2d409d4f2c8f0f3a41342263cc
-
SHA512
c6a9c7c1c6d1bd7f987f3209b874756d7ce623683a51988fc4b440de3bfe915d2eb1042ca14d75d614ac00784693e584ff72b0be07530591328d5b688087a49b
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 1580 AcroRd32.exe 1580 AcroRd32.exe 1580 AcroRd32.exe 1580 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1580-54-0x00000000752A1000-0x00000000752A3000-memory.dmpFilesize
8KB