Analysis
-
max time kernel
150s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
02-05-2022 20:50
Behavioral task
behavioral1
Sample
02ec0386447b7ff116597ecc0e5e5ac88f5e9926433680b797a3b251fec786d3.pdf
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
02ec0386447b7ff116597ecc0e5e5ac88f5e9926433680b797a3b251fec786d3.pdf
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
02ec0386447b7ff116597ecc0e5e5ac88f5e9926433680b797a3b251fec786d3.pdf
-
Size
38KB
-
MD5
93ebe107fc63b92561d1fc7f600201bc
-
SHA1
ce0e45b18d12663ff01e73d40b77e29c276fda63
-
SHA256
02ec0386447b7ff116597ecc0e5e5ac88f5e9926433680b797a3b251fec786d3
-
SHA512
afa8f4d7a792d470a63fe6a3393c948ba2400c7dcfbe160e2eda6c211f17d5e25c812b7d97941e08ca4239502b0d6666ffa93f92b402e8bb5965969a184764ae
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 1012 AcroRd32.exe 1012 AcroRd32.exe 1012 AcroRd32.exe 1012 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1012-54-0x0000000076851000-0x0000000076853000-memory.dmpFilesize
8KB