Analysis
-
max time kernel
151s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
27-05-2022 21:54
Behavioral task
behavioral1
Sample
6eaef99693d70c3102dd5a420f8216dfc3402e3e15f728eb4cc8acea95b005d2.pdf
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
6eaef99693d70c3102dd5a420f8216dfc3402e3e15f728eb4cc8acea95b005d2.pdf
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
6eaef99693d70c3102dd5a420f8216dfc3402e3e15f728eb4cc8acea95b005d2.pdf
-
Size
44KB
-
MD5
e71914cf16c0623bcabbc141d3c9ea3e
-
SHA1
85e7cc89846926985329c63858ff60d15fe48d72
-
SHA256
6eaef99693d70c3102dd5a420f8216dfc3402e3e15f728eb4cc8acea95b005d2
-
SHA512
abd34fd7065d8ed62dc96da1f61f0155ab97ce0e87311e2dbe6a360efd390ede5e6049a3600cb62d14f743c680ea420ccb8ca775c871dcf4537d80c1b8a89643
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 1700 AcroRd32.exe 1700 AcroRd32.exe 1700 AcroRd32.exe 1700 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1700-54-0x0000000075841000-0x0000000075843000-memory.dmpFilesize
8KB