Analysis
-
max time kernel
148s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
30-05-2022 16:22
Behavioral task
behavioral1
Sample
u_slpc_call_log (24).pdf
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
u_slpc_call_log (24).pdf
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
u_slpc_call_log (24).pdf
-
Size
15KB
-
MD5
5e700a7bd049e70e1bba006926f7136c
-
SHA1
320efe5d0636cf4862ac6854b9ce0ca4b99f2cc7
-
SHA256
70e29bddad37f28f16e2160cb00f73adba0c13a0e5d2d7d2dbc52b16a6ef3d21
-
SHA512
f87fd8972edb52d0c4304dba26fb03cf47472ab3718d67fe571b619a9a64b9e911dd1ea63409da31815f47b3f33e0f4f2d8cfc40ecdb2d679c8ce1d1629a5a78
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 748 AcroRd32.exe 748 AcroRd32.exe 748 AcroRd32.exe 748 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/748-54-0x0000000076811000-0x0000000076813000-memory.dmpFilesize
8KB