Analysis

  • max time kernel
    150s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    05-05-2022 20:55

General

  • Target

    OneLegalOrder_17895443/MPA.pdf

  • Size

    170KB

  • MD5

    576222ae105a3ca13246415b441fa715

  • SHA1

    803284516ab80a3c7a4339359281ea113c92c2d8

  • SHA256

    9658b5fda794f38b043268f127ffc8d48ccf7d85cc3c0cf869173b01533a30b3

  • SHA512

    f52556edff06bcd97a5405d833c67b8a1f77acad4fb934c1d08003cc2dc287ac8c05bf3ef0b1a38ba6690bf8167f287e3815da2b56b67ad081909309ddccf9da

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\OneLegalOrder_17895443\MPA.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2044

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2044-54-0x0000000075441000-0x0000000075443000-memory.dmp
    Filesize

    8KB