Resubmissions

20-10-2022 20:48

221020-zlsy7sdher 10

20-10-2022 20:45

221020-zjyrnseaf3 1

Analysis

  • max time kernel
    150s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    20-10-2022 20:48

General

  • Target

    Inv20124_wsp2.pdf

  • Size

    46KB

  • MD5

    50c2c03181167537337a975066ea3950

  • SHA1

    b5645661da99efda76e7f281c43d0033f9e3e7c3

  • SHA256

    d3126fc777955b1d0c1994c7120f0843946a459a585c05910fd429a86022c7f1

  • SHA512

    51b6d068664bfbc00fc8933b6be852f9aac8d8cf7c258184d87e808bdfc565233c054a13f9c1093bab5db4ea67f121fe9d9a2478b71409abd94f9f8eb019b6fa

  • SSDEEP

    768:lkcD1gQYmN7EWNAIMEInsBfxlg87V3Cn9HMTH+dqqSY:7DGJeEWe3szC8t8uY

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Inv20124_wsp2.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1448

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1448-54-0x00000000758B1000-0x00000000758B3000-memory.dmp

    Filesize

    8KB