Analysis

  • max time kernel
    171s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    02-05-2022 19:30

General

  • Target

    75ce9f12c118596f9bc6a6f837a1a9391a337a7ffa3b840a3cc4510f8ce93d54.pdf

  • Size

    49KB

  • MD5

    aef4429eb38857063829ad1f9e753276

  • SHA1

    cb41103ab77cddb44857c33a3f3224edbf9c0cb0

  • SHA256

    75ce9f12c118596f9bc6a6f837a1a9391a337a7ffa3b840a3cc4510f8ce93d54

  • SHA512

    5609501bf893793b5fb9bd1b8702d67c35ecfdcf0ec59e4b40ca1ef6c91b5e52a250f18f4a9b91f584b17aed8ab817996810496094578a46960c69af49071b25

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\75ce9f12c118596f9bc6a6f837a1a9391a337a7ffa3b840a3cc4510f8ce93d54.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1672

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1672-54-0x0000000075AE1000-0x0000000075AE3000-memory.dmp
    Filesize

    8KB