Analysis

  • max time kernel
    153s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    02-05-2022 19:33

General

  • Target

    66e96976119e7ec313795cc586b1c18474425d7294410354486bb0dd171a13af.pdf

  • Size

    58KB

  • MD5

    2f51833f34e1efe5c00e40a9118fa105

  • SHA1

    f2f6fdb56bde4eb53ac20e5ed28665d838d0dbd2

  • SHA256

    66e96976119e7ec313795cc586b1c18474425d7294410354486bb0dd171a13af

  • SHA512

    bfc900accb25a6e7665a71cfb257be8c45523f3a1f31a6cb7c6ab72b115e9ed56a1dedb2c8164bea0ee20ff050a89edf446b69a3c93f24ed68b54474554adde0

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\66e96976119e7ec313795cc586b1c18474425d7294410354486bb0dd171a13af.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1524

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1524-54-0x0000000076851000-0x0000000076853000-memory.dmp
    Filesize

    8KB