Analysis
-
max time kernel
81s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
26-05-2022 23:12
Behavioral task
behavioral1
Sample
open-uri20220525-152-1t4bt3.pdf
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
open-uri20220525-152-1t4bt3.pdf
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
open-uri20220525-152-1t4bt3.pdf
-
Size
857KB
-
MD5
dfa76131981da40224e852813e47fe97
-
SHA1
ae8cdbe17bd0612475ec66a320550c032b156c6e
-
SHA256
3f60ea5df4e72c16865f6b95cd903118e5a6ed042f7e0e597402aab073a2ba9e
-
SHA512
1c295539cf2bf3e39a7a1a6a30ec8b3df4769056818d458415df0b2e2a7af9bca1e5b1413f2694417d9fd2706b0f703e727641cecdb0a88ea6cb6e85a2e25a30
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 1092 AcroRd32.exe 1092 AcroRd32.exe 1092 AcroRd32.exe 1092 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1092-54-0x0000000075F61000-0x0000000075F63000-memory.dmpFilesize
8KB