Analysis

  • max time kernel
    92s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-10-2022 07:41

General

  • Target

    7ef068170f17272ccf4f3c37f2e0857e07459d5d83d4fd21ad0f7a0eee8463f5.pdf

  • Size

    150KB

  • MD5

    45c1809db3a46cacd688c3bd4d044541

  • SHA1

    2be4b7d4de2987ef55b5879d2dd48d74b209bc11

  • SHA256

    7ef068170f17272ccf4f3c37f2e0857e07459d5d83d4fd21ad0f7a0eee8463f5

  • SHA512

    1486477d6e21509f3025145b977229325300202be633e8e4e927a312982de2f97d4aa4447475a4316c0861a6fcaf1d060c78b9dc8e27dc09513438e14be6ac24

  • SSDEEP

    3072:VPCz2qSHZhluyKkrEoXIUVi0HgF6lZyUL:VM2qSHZiUXhg6XyUL

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\7ef068170f17272ccf4f3c37f2e0857e07459d5d83d4fd21ad0f7a0eee8463f5.pdf"
    1⤵
    • Checks processor information in registry
    • Suspicious use of SetWindowsHookEx
    PID:1848

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads