Analysis
-
max time kernel
153s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 04:06
Behavioral task
behavioral1
Sample
3fba2e745fcac38d519c4a446b7336ef9aada91c0f3324b0eccc16caaf7a0788.pdf
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
3fba2e745fcac38d519c4a446b7336ef9aada91c0f3324b0eccc16caaf7a0788.pdf
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
3fba2e745fcac38d519c4a446b7336ef9aada91c0f3324b0eccc16caaf7a0788.pdf
-
Size
12KB
-
MD5
f281dc2b49a5691dc71281fc30d79fee
-
SHA1
fd2b94cdd657b4af1676afb406d45644cb36af06
-
SHA256
3fba2e745fcac38d519c4a446b7336ef9aada91c0f3324b0eccc16caaf7a0788
-
SHA512
6348949bb610ef4568b652975747095ceafbb22508d7740d89d8d0fedb269760da690571298f5d998bc49daed5f836bb05b44018334e30e0db8bf2e01ffb8ea6
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 1692 AcroRd32.exe 1692 AcroRd32.exe 1692 AcroRd32.exe 1692 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1692-54-0x00000000763E1000-0x00000000763E3000-memory.dmpFilesize
8KB