Analysis
-
max time kernel
171s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
02-05-2022 19:30
Behavioral task
behavioral1
Sample
75ce9f12c118596f9bc6a6f837a1a9391a337a7ffa3b840a3cc4510f8ce93d54.pdf
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
75ce9f12c118596f9bc6a6f837a1a9391a337a7ffa3b840a3cc4510f8ce93d54.pdf
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
75ce9f12c118596f9bc6a6f837a1a9391a337a7ffa3b840a3cc4510f8ce93d54.pdf
-
Size
49KB
-
MD5
aef4429eb38857063829ad1f9e753276
-
SHA1
cb41103ab77cddb44857c33a3f3224edbf9c0cb0
-
SHA256
75ce9f12c118596f9bc6a6f837a1a9391a337a7ffa3b840a3cc4510f8ce93d54
-
SHA512
5609501bf893793b5fb9bd1b8702d67c35ecfdcf0ec59e4b40ca1ef6c91b5e52a250f18f4a9b91f584b17aed8ab817996810496094578a46960c69af49071b25
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 1672 AcroRd32.exe 1672 AcroRd32.exe 1672 AcroRd32.exe 1672 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1672-54-0x0000000075AE1000-0x0000000075AE3000-memory.dmpFilesize
8KB