Analysis
-
max time kernel
35s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
03/08/2023, 07:30
Behavioral task
behavioral1
Sample
Material.pdf
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Material.pdf
Resource
win10v2004-20230703-en
General
-
Target
Material.pdf
-
Size
350KB
-
MD5
72c812cf21909a48eb9cceb9e04b865d
-
SHA1
2dc265f23be4cf7cda328bdf5826601cf4f4bf43
-
SHA256
39fb927c32221134a423760c5d1f58bca4cbbcc87c891c79e390a22b63608eb4
-
SHA512
dd246487f348dbba52c7dfaae3f943b0324414c182e0de862db7d23e82ab5362c21b8733cf84af466529c631938fc544d96d78c51ea4330877993e9da7e5cbd3
-
SSDEEP
6144:zB1De0g/RC7lTqMAwraJOZMtXEHJGPSgwsTx/xE99jvQrZqZDxlK0oZ9TK2A6CO8:6+lq1wWAZMtUHJGPksFJYtdlK5TXuWM
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2040 AcroRd32.exe 2040 AcroRd32.exe 2040 AcroRd32.exe 2040 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD570c1b5cdf53137d3173b305957f7d5ca
SHA18b18c90e4b67749b0d102698cfdecfa53894a85f
SHA2562728bfbecf0f32748c35cdc4411ba3cbac5ca0ba4c2ca22dfd0f5d249e2b6277
SHA512a079f8eacf8bec6fa9f4f7773db1fada584dcbfc6535e0a35bfc49a83428af666e6fc3523358dba28b6dbe1d564de4686664d8399d1c15daf5943870d991f475