Analysis
-
max time kernel
150s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
19-05-2022 03:00
Behavioral task
behavioral1
Sample
6887cad2972d2711938a3a63f7006d659da9e6759c006ae0f47a5c3590f7500c.pdf
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
6887cad2972d2711938a3a63f7006d659da9e6759c006ae0f47a5c3590f7500c.pdf
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
6887cad2972d2711938a3a63f7006d659da9e6759c006ae0f47a5c3590f7500c.pdf
-
Size
25KB
-
MD5
284eff3b9b78fe18cc47f8e7ec62d977
-
SHA1
fc86c18ad69cf4f5ff86f9fe152a0550bc378a23
-
SHA256
6887cad2972d2711938a3a63f7006d659da9e6759c006ae0f47a5c3590f7500c
-
SHA512
b598fd9af3310497120586f5b5bb15a49360a1ad8be140c1a18f810566075e9ae5602b811a7c2ad1027241c1d51bf9e91fd8903594789d0d055718556db14fbe
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 1660 AcroRd32.exe 1660 AcroRd32.exe 1660 AcroRd32.exe 1660 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1660-54-0x0000000075CE1000-0x0000000075CE3000-memory.dmpFilesize
8KB