Analysis

  • max time kernel
    149s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    06-08-2022 05:54

General

  • Target

    attachment20220806-25572-iyxibf.pdf

  • Size

    14KB

  • MD5

    dafd80ae261beb6b4663488455bcdcb0

  • SHA1

    6b093146d8e5a411ec643ec68b7bf6789d7f8c92

  • SHA256

    8c24a7e1465b461afccec7776e6eab96de7ba3690817fb46dc7e4c8e22b3648c

  • SHA512

    ab8c5320e34fe30f0f70cdc90681dd288fc756ae17d3596b8f9a38297b5e6758e2e4a9681306dbf0f30813a3a40e8de231be1ff6c56bbdbb30d48e10a2c9ea7c

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\attachment20220806-25572-iyxibf.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1932

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1932-54-0x0000000076281000-0x0000000076283000-memory.dmp
    Filesize

    8KB