Analysis
-
max time kernel
152s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 03:27
Behavioral task
behavioral1
Sample
b3554d232ff9e04aa799c4150fc19557f1bc267659bb508577dc7902174306d3.pdf
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
b3554d232ff9e04aa799c4150fc19557f1bc267659bb508577dc7902174306d3.pdf
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
b3554d232ff9e04aa799c4150fc19557f1bc267659bb508577dc7902174306d3.pdf
-
Size
620KB
-
MD5
50141ba493f7487fbd73983d3cc0c7bc
-
SHA1
2ec64bd3f308cab4c3f5afebded8a7aa6e0a45a0
-
SHA256
b3554d232ff9e04aa799c4150fc19557f1bc267659bb508577dc7902174306d3
-
SHA512
1b6096310d148d56ee45193c578aa14ff29bc6ae1cbd271b11cac39b709eb3d0c0e42b6d21955cc2ded4b64889d50b8a08248dd558b09ea083596c979931ca2d
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 1524 AcroRd32.exe 1524 AcroRd32.exe 1524 AcroRd32.exe 1524 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1524-54-0x0000000076851000-0x0000000076853000-memory.dmpFilesize
8KB