Analysis

  • max time kernel
    149s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    30-05-2022 03:01

General

  • Target

    9b0b9873d55319adb3c3f9f548ff4bfc894609ac745ea8f7abc8734801fea5c9.pdf

  • Size

    73KB

  • MD5

    c6d3187c51e400e68728614e92144da1

  • SHA1

    86e80d82c3850a7a3bfb90c23488a7d10f0b92ff

  • SHA256

    9b0b9873d55319adb3c3f9f548ff4bfc894609ac745ea8f7abc8734801fea5c9

  • SHA512

    16f5b275ccf7092dc90de82e852bca9cba01e2a4028df1d6008305c9e596bf8d44ecfa13b98d478d0783a253400b57a8551b323319467dab223c0e1e638dc4ed

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\9b0b9873d55319adb3c3f9f548ff4bfc894609ac745ea8f7abc8734801fea5c9.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1280

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1280-54-0x0000000076181000-0x0000000076183000-memory.dmp
    Filesize

    8KB