Analysis

  • max time kernel
    150s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-10-2022 20:46

General

  • Target

    Jimaj2.pdf

  • Size

    1.5MB

  • MD5

    3fa0bf5352afbfbd313b4c2723833ecb

  • SHA1

    04ef63028fb6d24321f7e8624e1795a2e8d13186

  • SHA256

    84a519d77440a73b352e0561422fd769f66cc7157a455e185293485d5c324abf

  • SHA512

    050e19d41447a006f12e1c54b80760d5f9a40e1422bba06944b8b8cb77fe606d9bd620957b9b61216ddd3d8b379420615c7f2b6a09c8040c347db0e1bd319800

  • SSDEEP

    24576:y/tIjk2vZv4Hy/z9UkcKEAIzl4RBy0cgpfwrp7JHhk05t6djuYF1UP:yGAICSL9/a4mhgpfwrp7JH20mjl1UP

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Jimaj2.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:968

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/968-54-0x0000000076831000-0x0000000076833000-memory.dmp

    Filesize

    8KB