Analysis

  • max time kernel
    152s
  • max time network
    43s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-09-2022 13:16

General

  • Target

    attachment20220906-7985-cv0kwj.pdf

  • Size

    4.5MB

  • MD5

    1c2a3e547c38e4c41adb8017919add49

  • SHA1

    e075b8d62b9f31ff7b9083bc5bfaab47534382f6

  • SHA256

    305fe9713d948af415d69dc10266be69a01ad917535eeaa97622c335864e563f

  • SHA512

    804c6557682d4b05c69d3734ba93a85cfe31b70660beb3bc0cd4c4355ba78ac0e6a1ff29c96c80001b60743ab80f8bb3b59454f7b9022beb53737e4f5cd60079

  • SSDEEP

    98304:QQ/zTEk5P/igwB+N1zBzOKZhe58kUdqkri4/i05+NxCc4dw5WjhIjZE6dZzK/vNA:B/zT95/GoNZhe58kUdqkri4/i05+NxCy

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\attachment20220906-7985-cv0kwj.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:784

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/784-54-0x0000000075FC1000-0x0000000075FC3000-memory.dmp

    Filesize

    8KB