Analysis

  • max time kernel
    205s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    30-05-2022 05:04

General

  • Target

    7e12a133e04315fd416fb9c2c06d6dac7df5bba405f34151b0ce1a7ce452500d.pdf

  • Size

    166KB

  • MD5

    d0c9713f383d455e2bade568312ef250

  • SHA1

    26b2c3ebe022665958ed91bcd5959390efd994e6

  • SHA256

    7e12a133e04315fd416fb9c2c06d6dac7df5bba405f34151b0ce1a7ce452500d

  • SHA512

    1f27025328afebe31619c5a9a2464c95bc1181ea8677341a43d3095106fff0d3e0cfbd57e012608f98641f71cb3acb1f383d568eed772de1bb34536ef020e8a2

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\7e12a133e04315fd416fb9c2c06d6dac7df5bba405f34151b0ce1a7ce452500d.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1636

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1636-54-0x0000000076171000-0x0000000076173000-memory.dmp
    Filesize

    8KB