Analysis

  • max time kernel
    151s
  • max time network
    58s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    02-05-2022 19:14

General

  • Target

    bee6481c9b25e486e95712267677f0d56f3bd3a70b597f9da74b2fe67f9fbc4e.pdf

  • Size

    52KB

  • MD5

    4fb84d336bbf14b3a9613be495ba65be

  • SHA1

    b33bb24dbd617605c8713a9459bcee5b2eae2f33

  • SHA256

    bee6481c9b25e486e95712267677f0d56f3bd3a70b597f9da74b2fe67f9fbc4e

  • SHA512

    526c54a4ffadf6e187a53c89d3f97cb944b1f81836c4326a4779c4675a2a56c93e41677f6dd82cd18ec5bfbc468c00e68f6199a178e221a3b821f6c1795ada18

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\bee6481c9b25e486e95712267677f0d56f3bd3a70b597f9da74b2fe67f9fbc4e.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1944

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1944-54-0x00000000765C1000-0x00000000765C3000-memory.dmp
    Filesize

    8KB