Analysis

  • max time kernel
    150s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-09-2022 13:58

General

  • Target

    attachment20220906-13341-t5x2q5.pdf

  • Size

    29KB

  • MD5

    5b390ebd772dc4bde198b92aaa0ea616

  • SHA1

    e6a1068e6e19afc9417c49bcb8e58213f5d8ad5d

  • SHA256

    6d3591e7b5d9b99baf5be21982837da5c31601389d807f12db98c3884803ac38

  • SHA512

    bb610b91fa4e6f0258a921fe953e17afd8e2e19ef38d1d3eceb6c8949ac3a150151bab90c651c94e113a849ac756b7f1e6bc3eb3f89c162b5cfa7d65f6c619d0

  • SSDEEP

    768:Z1EWgJB8mhNW0r2VMbrSNgQ/e2ZkwW1hqWVwFosabo:Z2fB8mPWwbuNOYkwW/q0bo

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\attachment20220906-13341-t5x2q5.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1492

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1492-54-0x0000000076121000-0x0000000076123000-memory.dmp

    Filesize

    8KB