Analysis

  • max time kernel
    150s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    31-05-2022 02:12

General

  • Target

    30b7bbb419960d60a09526d33446c67ea9fde385b802f8f09f36d917c3566a34.pdf

  • Size

    24KB

  • MD5

    74e4607185d128c5e9173f1b503645ca

  • SHA1

    d276a725f260f06bad2296ef89722f7e260c35ca

  • SHA256

    30b7bbb419960d60a09526d33446c67ea9fde385b802f8f09f36d917c3566a34

  • SHA512

    6fd0261644f0d76fac3bf9397b914acaad4b82d9de892a10b7042ae3b52a96ead49d8153998a3e5f6b108ea1213e6ce4a2f9ca6f331b27111c7fa33a2da58259

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\30b7bbb419960d60a09526d33446c67ea9fde385b802f8f09f36d917c3566a34.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:324

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/324-54-0x0000000075451000-0x0000000075453000-memory.dmp
    Filesize

    8KB