Analysis

  • max time kernel
    153s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 04:06

General

  • Target

    3fba2e745fcac38d519c4a446b7336ef9aada91c0f3324b0eccc16caaf7a0788.pdf

  • Size

    12KB

  • MD5

    f281dc2b49a5691dc71281fc30d79fee

  • SHA1

    fd2b94cdd657b4af1676afb406d45644cb36af06

  • SHA256

    3fba2e745fcac38d519c4a446b7336ef9aada91c0f3324b0eccc16caaf7a0788

  • SHA512

    6348949bb610ef4568b652975747095ceafbb22508d7740d89d8d0fedb269760da690571298f5d998bc49daed5f836bb05b44018334e30e0db8bf2e01ffb8ea6

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\3fba2e745fcac38d519c4a446b7336ef9aada91c0f3324b0eccc16caaf7a0788.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1692

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1692-54-0x00000000763E1000-0x00000000763E3000-memory.dmp
    Filesize

    8KB