Analysis

  • max time kernel
    150s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    19-05-2022 03:00

General

  • Target

    6887cad2972d2711938a3a63f7006d659da9e6759c006ae0f47a5c3590f7500c.pdf

  • Size

    25KB

  • MD5

    284eff3b9b78fe18cc47f8e7ec62d977

  • SHA1

    fc86c18ad69cf4f5ff86f9fe152a0550bc378a23

  • SHA256

    6887cad2972d2711938a3a63f7006d659da9e6759c006ae0f47a5c3590f7500c

  • SHA512

    b598fd9af3310497120586f5b5bb15a49360a1ad8be140c1a18f810566075e9ae5602b811a7c2ad1027241c1d51bf9e91fd8903594789d0d055718556db14fbe

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\6887cad2972d2711938a3a63f7006d659da9e6759c006ae0f47a5c3590f7500c.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1660

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1660-54-0x0000000075CE1000-0x0000000075CE3000-memory.dmp
    Filesize

    8KB