Analysis
-
max time kernel
151s -
max time network
58s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
02-05-2022 19:14
Behavioral task
behavioral1
Sample
bee6481c9b25e486e95712267677f0d56f3bd3a70b597f9da74b2fe67f9fbc4e.pdf
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
bee6481c9b25e486e95712267677f0d56f3bd3a70b597f9da74b2fe67f9fbc4e.pdf
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
bee6481c9b25e486e95712267677f0d56f3bd3a70b597f9da74b2fe67f9fbc4e.pdf
-
Size
52KB
-
MD5
4fb84d336bbf14b3a9613be495ba65be
-
SHA1
b33bb24dbd617605c8713a9459bcee5b2eae2f33
-
SHA256
bee6481c9b25e486e95712267677f0d56f3bd3a70b597f9da74b2fe67f9fbc4e
-
SHA512
526c54a4ffadf6e187a53c89d3f97cb944b1f81836c4326a4779c4675a2a56c93e41677f6dd82cd18ec5bfbc468c00e68f6199a178e221a3b821f6c1795ada18
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 1944 AcroRd32.exe 1944 AcroRd32.exe 1944 AcroRd32.exe 1944 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1944-54-0x00000000765C1000-0x00000000765C3000-memory.dmpFilesize
8KB