Analysis

  • max time kernel
    10s
  • max time network
    13s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-10-2022 07:21

General

  • Target

    0aa554e58704d5b912f4cc84e709b8b5021abb7d2fa9b783ce97c967cf966ddc.pdf

  • Size

    31KB

  • MD5

    40d1935b8e61ff7c35e2079895ebce2a

  • SHA1

    3ca13afd963c9f0dc48aab2bfb88b2e9a8a04499

  • SHA256

    0aa554e58704d5b912f4cc84e709b8b5021abb7d2fa9b783ce97c967cf966ddc

  • SHA512

    0e91d0eaa2368a6143c6149bd4ee8b1cf8a7dcb36f54a22059212d025da4201d3399b626876e56c145c982f4f49b3a77ee52cdb785ade321c2adbd307c9700a5

  • SSDEEP

    768:eZXFpwRaWGqZEnyX6E3IldBm7Ye50umIrv4X++SSE4JaW9V1BpqfkFn:KkRade50XI/+aIaWEf2

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\0aa554e58704d5b912f4cc84e709b8b5021abb7d2fa9b783ce97c967cf966ddc.pdf"
    1⤵
    • Checks processor information in registry
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1140

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads