Analysis

  • max time kernel
    25s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    20/07/2023, 07:13

General

  • Target

    Phishing incident - 19-07-2023.pdf

  • Size

    325KB

  • MD5

    2233d936e21597141f5c3e4560ed09f6

  • SHA1

    248efed725ebca53f716d80647c1ddad14300464

  • SHA256

    f2fe5b16f3fdddc41f36d884dc5e6bc0498b5aba90c67ea80459ab86217b5b00

  • SHA512

    42eb93d50ac2fe0e2473dfe053879ef98af6051ea5415bedc06741cb0e06a81e62143f6b4b01d7e4a832551cefb82982d18804bbc28f7c270bf3039bf1810f2c

  • SSDEEP

    6144:ls8Lq9zX+HTO7IVMZUYv82PjHmdmFqwXADcnfBs4HpHcoLl1eVAW:ls8Lq1X+HTmaY4dEqkA4nfjL2

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Phishing incident - 19-07-2023.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:760

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

          Filesize

          3KB

          MD5

          5775653b48d72cc0cdfb443ab004333e

          SHA1

          7e347e0dd74710b205f9df918ece3a3b62bba8b6

          SHA256

          8bec587402912611f680478c6ae505d52bb69612e1c1478a0ce487a98cfb3400

          SHA512

          7c05652048e536d6ce042c0c0020021e2a5ef1eeb6ea5a5475fbffcb6420eb073520fce54b712b155d252567862bf6b5435287c652ad6e66836db010505d23b6