Analysis
-
max time kernel
171s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12-05-2022 16:47
Behavioral task
behavioral1
Sample
vunateduremar.pdf
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
vunateduremar.pdf
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
vunateduremar.pdf
-
Size
74KB
-
MD5
72950325644838b18c5d4e86d4dbda1d
-
SHA1
190443eaa2ea924fadda7a57646d57f5337d42b0
-
SHA256
b2a6385c3f4b161aeaa731ea60d419bf75a0ff098dd397ecd6f0c2c1431a691c
-
SHA512
d05d313d8a6acf694b5f82474ceb9fb53b73883c6f3da5ab64a14f38e81bfddad64cbdd8f3b6853a838a044c61933aff73a153add288077024d524fba315bfe5
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 4236 AcroRd32.exe 4236 AcroRd32.exe