Analysis
-
max time kernel
1610s -
max time network
1614s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
06-07-2023 09:12
Behavioral task
behavioral1
Sample
Product List - API.pdf
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
Product List - API.pdf
Resource
win10v2004-20230703-en
General
-
Target
Product List - API.pdf
-
Size
197KB
-
MD5
73f8a97c4fdedb78d84fe5d55671d1c2
-
SHA1
e481192c960f440476ea50b60e0780e9fcdbf10c
-
SHA256
307cc8300c7229ff820eeb056548a638057de62728f41bcc2c4f103210880bb9
-
SHA512
9e171ff241bca55627ba725b69ac86e29b250fb098172542e51834e70d1ccbf450b8324a6badff253236671ae4a20e949b1b6c6167e1abddfe70e880348f0aa7
-
SSDEEP
3072:+KjwGtwyNOVAQoVSnwgIZm8SBS+WIx9WUpThF+AddMCRIit:7wUoVC8w3m1ME9WUVxEit
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 612 AcroRd32.exe 612 AcroRd32.exe 612 AcroRd32.exe 612 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f21cb495cc5504bdac7bf0edb9c5f120
SHA18dd3703771a3e2d62112a01ed5b5eb18438db57c
SHA25603670f3df4a7124c3f547a61af8d6bcdff0ad76a272431b68936e6b8ddf8009b
SHA5121dba821d0ab02e79a3e3f1c272380c6cb82613676212b01e5318aea31f2af2d761ed26a477aa95abbb0196e94ccf23fce23676928ba32fdb08fe136cc68efbed