Analysis
-
max time kernel
150s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 04:06
Behavioral task
behavioral1
Sample
cbca735ff0b10739b840becb3737c38085bc07c645d7614d56fdb716987e2fe3.pdf
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
cbca735ff0b10739b840becb3737c38085bc07c645d7614d56fdb716987e2fe3.pdf
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
cbca735ff0b10739b840becb3737c38085bc07c645d7614d56fdb716987e2fe3.pdf
-
Size
10KB
-
MD5
f67aed895a5ce40f0d6f7e1f743f969b
-
SHA1
1eef182afe0b06e7ae9f1e88a68b104d7270d639
-
SHA256
cbca735ff0b10739b840becb3737c38085bc07c645d7614d56fdb716987e2fe3
-
SHA512
2cc70f749203b04494912b153cd16ee32a36f6d0aca617978fed32202448f2716f79901a3e7df42b4e5d164f6ff96037498887c9d55e65d07444356fd97acbb4
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 1952 AcroRd32.exe 1952 AcroRd32.exe 1952 AcroRd32.exe 1952 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1952-54-0x0000000075801000-0x0000000075803000-memory.dmpFilesize
8KB