Analysis
-
max time kernel
150s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
02-05-2022 19:14
Behavioral task
behavioral1
Sample
bfd10ef9187aa2d33204c3cfcb499520eef1aad188531bbc0552bcf9ed889a6f.pdf
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
bfd10ef9187aa2d33204c3cfcb499520eef1aad188531bbc0552bcf9ed889a6f.pdf
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
bfd10ef9187aa2d33204c3cfcb499520eef1aad188531bbc0552bcf9ed889a6f.pdf
-
Size
40KB
-
MD5
050680bcb6487e6ad6f2af46d4def35c
-
SHA1
bf40b271ed9f6bd8dd8a4caddfa3940e9c243ba8
-
SHA256
bfd10ef9187aa2d33204c3cfcb499520eef1aad188531bbc0552bcf9ed889a6f
-
SHA512
0d50389ffa1a105839692b786210f9726abcfac8db841d1885fb03c36acca2e9c16a94d76a1a83aea5e2c5b52339e07cf2c47ec1188f38a6cf975ee0533a2235
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 1564 AcroRd32.exe 1564 AcroRd32.exe 1564 AcroRd32.exe 1564 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1564-54-0x0000000075CD1000-0x0000000075CD3000-memory.dmpFilesize
8KB