Analysis

  • max time kernel
    150s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-09-2022 14:40

General

  • Target

    attachment20220906-18997-1391d42.pdf

  • Size

    14KB

  • MD5

    dafd80ae261beb6b4663488455bcdcb0

  • SHA1

    6b093146d8e5a411ec643ec68b7bf6789d7f8c92

  • SHA256

    8c24a7e1465b461afccec7776e6eab96de7ba3690817fb46dc7e4c8e22b3648c

  • SHA512

    ab8c5320e34fe30f0f70cdc90681dd288fc756ae17d3596b8f9a38297b5e6758e2e4a9681306dbf0f30813a3a40e8de231be1ff6c56bbdbb30d48e10a2c9ea7c

  • SSDEEP

    384:iG04CKohG+cC47nr14L49dLeeR9Lvun5j:F04CKQF/Uri6jun5j

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\attachment20220906-18997-1391d42.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1648

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1648-54-0x0000000075811000-0x0000000075813000-memory.dmp

    Filesize

    8KB