Analysis

  • max time kernel
    150s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-05-2022 12:47

General

  • Target

    da0f7469664ceb99267b7e37314217494dbd4ca142d67e234f43c6cfa3686054.pdf

  • Size

    304KB

  • MD5

    49c4b1884e95860c331e39e6fdf1a522

  • SHA1

    d1de0070816bdcecb4681f1ac6910fec87c5e5bc

  • SHA256

    da0f7469664ceb99267b7e37314217494dbd4ca142d67e234f43c6cfa3686054

  • SHA512

    1a665a0cf9b2386bab46c6d6f1fd2ff2581ad05e28503a036d053d4d76d82daf89921a5091fe6c8a4447d47bc81a8403b42abb27281e959196262c2ca1afa6c8

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\da0f7469664ceb99267b7e37314217494dbd4ca142d67e234f43c6cfa3686054.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1948

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1948-54-0x0000000076571000-0x0000000076573000-memory.dmp
    Filesize

    8KB