Analysis

  • max time kernel
    150s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    16-09-2022 02:17

General

  • Target

    __492331700 (7).pdf

  • Size

    109KB

  • MD5

    2ffba9f02d6acaf23528bfbae6932415

  • SHA1

    baa5f252af7055dc066139f61aaae6df82140ebc

  • SHA256

    b7c5c3323caae18b091c6bc3c140726a1707e58f4e1b799c6003eb15dd1b2508

  • SHA512

    0a761a732fead7cb3ad385cbb7f1710171244b2cc33854aadb05e2bdccfc4d732b8d4b7b7ed5873b3ce05cac83b4af86adfcbfa53e8841d40131ea84c762bbd8

  • SSDEEP

    1536:TlEOjqR37xM63MN0UtNsWEzTbFCEt4M0iUP4YTVndIpLpV/5qFhBJunqTtzq1FKO:TXqC6Y0WqbFCEuig4wYdpV/5qFjT8KO

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\__492331700 (7).pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1644

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1644-54-0x0000000075A11000-0x0000000075A13000-memory.dmp

    Filesize

    8KB