Analysis
-
max time kernel
106s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13/06/2023, 18:47
Behavioral task
behavioral1
Sample
Underwriting Conditional Approva6.pdf
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Underwriting Conditional Approva6.pdf
Resource
win10v2004-20230220-en
General
-
Target
Underwriting Conditional Approva6.pdf
-
Size
469KB
-
MD5
ea2de7a287b3432f0cbfb247838ccb22
-
SHA1
d2f40d383036bb22e43f55ac684e870fe048816b
-
SHA256
ee0b13251953bed3f9823ec4a8a9dc3372d1bc06e5cebbe180eef6e22c669bc0
-
SHA512
337c481909b9f52320309396e2bf99584adff6f6f5b7850e47449a12fd4a980be32bdce582e4a4c807e70bfb3e72f7c525aabcd01b1e70588f92a6a2f0aab484
-
SSDEEP
12288:SXCIfLoN6brZqmKYNRZxJNmW4muwEMw3QBHkhND:aCIfPOY3ZJmW4jMwgBEhND
Malware Config
Signatures
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1108 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1108 AcroRd32.exe 1108 AcroRd32.exe 1108 AcroRd32.exe 1108 AcroRd32.exe 1108 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD57d52bdf2bb3db0ca1e8a9353420a55a4
SHA115ffcd4e013a04c8fc924099a710bdf31762e5a7
SHA256e95112401ebea6e62a89718ec61ee3d896eafd95ae5debe4a743fae094439fb9
SHA512ab266fbaeda0c72ebc8539ecb93abdfcb7fc03b91513fadc396a0b572c3af4b4e96e970202a4dd5a6e63cec8ce4887b6e76f1fcc35f96411e7f67818dd620a06