Analysis
-
max time kernel
150s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 12:47
Behavioral task
behavioral1
Sample
da0f7469664ceb99267b7e37314217494dbd4ca142d67e234f43c6cfa3686054.pdf
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
da0f7469664ceb99267b7e37314217494dbd4ca142d67e234f43c6cfa3686054.pdf
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
da0f7469664ceb99267b7e37314217494dbd4ca142d67e234f43c6cfa3686054.pdf
-
Size
304KB
-
MD5
49c4b1884e95860c331e39e6fdf1a522
-
SHA1
d1de0070816bdcecb4681f1ac6910fec87c5e5bc
-
SHA256
da0f7469664ceb99267b7e37314217494dbd4ca142d67e234f43c6cfa3686054
-
SHA512
1a665a0cf9b2386bab46c6d6f1fd2ff2581ad05e28503a036d053d4d76d82daf89921a5091fe6c8a4447d47bc81a8403b42abb27281e959196262c2ca1afa6c8
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 1948 AcroRd32.exe 1948 AcroRd32.exe 1948 AcroRd32.exe 1948 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1948-54-0x0000000076571000-0x0000000076573000-memory.dmpFilesize
8KB