Analysis
-
max time kernel
151s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-05-2022 04:30
Behavioral task
behavioral1
Sample
vunateduremar.pdf
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
vunateduremar.pdf
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
vunateduremar.pdf
-
Size
74KB
-
MD5
72950325644838b18c5d4e86d4dbda1d
-
SHA1
190443eaa2ea924fadda7a57646d57f5337d42b0
-
SHA256
b2a6385c3f4b161aeaa731ea60d419bf75a0ff098dd397ecd6f0c2c1431a691c
-
SHA512
d05d313d8a6acf694b5f82474ceb9fb53b73883c6f3da5ab64a14f38e81bfddad64cbdd8f3b6853a838a044c61933aff73a153add288077024d524fba315bfe5
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 1240 AcroRd32.exe 1240 AcroRd32.exe 1240 AcroRd32.exe 1240 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1240-54-0x00000000753E1000-0x00000000753E3000-memory.dmpFilesize
8KB