Analysis

  • max time kernel
    150s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    05-05-2022 20:55

General

  • Target

    OneLegalOrder_17895443/POS.pdf

  • Size

    110KB

  • MD5

    edaf80405ac230757bb6f397ebd9ab67

  • SHA1

    5ccb362d286768c747c950a9f35eae300b31b3b5

  • SHA256

    f9614ff64630c39bef920f10be814086f434fb0f90e814088c37b1f32bbb8515

  • SHA512

    3844b2e5c29cfb16038c7fbd68b32237fb45dfedfb9bc76e428a9780c618867d5d7afc7ff193a92fc1f4ce252943c4d6f690c77af3c44289895b38ba5c8adb5b

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\OneLegalOrder_17895443\POS.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:1564

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1564-54-0x0000000075CD1000-0x0000000075CD3000-memory.dmp
    Filesize

    8KB