Analysis

  • max time kernel
    150s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    02-05-2022 19:14

General

  • Target

    bfd10ef9187aa2d33204c3cfcb499520eef1aad188531bbc0552bcf9ed889a6f.pdf

  • Size

    40KB

  • MD5

    050680bcb6487e6ad6f2af46d4def35c

  • SHA1

    bf40b271ed9f6bd8dd8a4caddfa3940e9c243ba8

  • SHA256

    bfd10ef9187aa2d33204c3cfcb499520eef1aad188531bbc0552bcf9ed889a6f

  • SHA512

    0d50389ffa1a105839692b786210f9726abcfac8db841d1885fb03c36acca2e9c16a94d76a1a83aea5e2c5b52339e07cf2c47ec1188f38a6cf975ee0533a2235

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\bfd10ef9187aa2d33204c3cfcb499520eef1aad188531bbc0552bcf9ed889a6f.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1564

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1564-54-0x0000000075CD1000-0x0000000075CD3000-memory.dmp
    Filesize

    8KB