Analysis

  • max time kernel
    152s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    13-05-2022 17:41

General

  • Target

    718314e03bb2ab6d1c4445a147fb0ac9ffdd497623cf0586ee648bc8b876389e.pdf

  • Size

    36.8MB

  • MD5

    ba326a1c4c3cecffae3ad3535b7bc161

  • SHA1

    f339f7536bd0cadb7fb88a2d3ed31de9e7103273

  • SHA256

    718314e03bb2ab6d1c4445a147fb0ac9ffdd497623cf0586ee648bc8b876389e

  • SHA512

    cb516cda2da547ed2ff3d78691ce84b05db622c17b0012cbc209d501397e86a1f047a55b6187fdcd8e7ca4d7263f85ad2f677395019161fafa445df35caf7f4b

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\718314e03bb2ab6d1c4445a147fb0ac9ffdd497623cf0586ee648bc8b876389e.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1308

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1308-54-0x0000000075261000-0x0000000075263000-memory.dmp
    Filesize

    8KB