Analysis

  • max time kernel
    152s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-05-2022 03:27

General

  • Target

    b3554d232ff9e04aa799c4150fc19557f1bc267659bb508577dc7902174306d3.pdf

  • Size

    620KB

  • MD5

    50141ba493f7487fbd73983d3cc0c7bc

  • SHA1

    2ec64bd3f308cab4c3f5afebded8a7aa6e0a45a0

  • SHA256

    b3554d232ff9e04aa799c4150fc19557f1bc267659bb508577dc7902174306d3

  • SHA512

    1b6096310d148d56ee45193c578aa14ff29bc6ae1cbd271b11cac39b709eb3d0c0e42b6d21955cc2ded4b64889d50b8a08248dd558b09ea083596c979931ca2d

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\b3554d232ff9e04aa799c4150fc19557f1bc267659bb508577dc7902174306d3.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1524

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1524-54-0x0000000076851000-0x0000000076853000-memory.dmp
    Filesize

    8KB