Analysis
-
max time kernel
5s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-09-2022 13:57
Behavioral task
behavioral1
Sample
Splunk Candidate Handbook.pdf
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
Splunk Candidate Handbook.pdf
Resource
win10v2004-20220812-en
6 signatures
150 seconds
General
-
Target
Splunk Candidate Handbook.pdf
-
Size
362KB
-
MD5
572d3fbfbdc5c1b764e9db1e31508f66
-
SHA1
61e3e4407b4738e75aec0aee57a53bfda11286ac
-
SHA256
9400298956be3649dac2c0534a94e5fe51af352bf3ae1cedb4ac56cb63337039
-
SHA512
8f1d3ba80f57b0fb43a80f87bc70b9885bb23a5d8dc79074a6ffe85f6a56e8421083defe99d8890ecd0b86447079ff15afcf832db6665122ef9e0f09ecf91aea
-
SSDEEP
6144:qRCekboBXGQzUTRQ/X7Ils98ncT5grfznu:qIek8BX/zU0My8KCLu
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 1832 AcroRd32.exe 1832 AcroRd32.exe 1832 AcroRd32.exe 1832 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1832-54-0x0000000076401000-0x0000000076403000-memory.dmpFilesize
8KB