Analysis

  • max time kernel
    43s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    04-05-2022 20:16

General

  • Target

    Free_Resources\Florida2001\FL_TestProtocols\PDFs\Testing Application Standard No 107-95.pdf

  • Size

    220KB

  • MD5

    e96b43c9007570b85e703457db6ec1bb

  • SHA1

    4bf11b9c59067f600694e04a3475766bfcf17608

  • SHA256

    9900d824a8b5c5c434d6d6e8060d8341d2440fcff8dc5c356e67e164b3f939ee

  • SHA512

    98bc83ff0d6eab2281decd62daaf81cf01085634aa629d3fe490e1c7188b88820f56f2e09b523b79d2423d87df3d052e9402b3d14760edc6f4bfe1ebb8e76cb7

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Free_Resources\Florida2001\FL_TestProtocols\PDFs\Testing Application Standard No 107-95.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1644

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1644-54-0x00000000769D1000-0x00000000769D3000-memory.dmp

    Filesize

    8KB

  • memory/1644-55-0x0000000002200000-0x0000000002276000-memory.dmp

    Filesize

    472KB