Analysis
-
max time kernel
66s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
02-10-2023 16:34
Behavioral task
behavioral1
Sample
RFQ.pdf
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
RFQ.pdf
Resource
win10v2004-20230915-en
General
-
Target
RFQ.pdf
-
Size
614KB
-
MD5
d9e0a5777a26cc5f3b8d1bc1ec93db50
-
SHA1
daf0317f404d27a7673ca3644b776972960baa96
-
SHA256
acb0b70ebb77bc1c7ed24cc6bf2e4365b68eb53da978c441aa1a82f34177d3b4
-
SHA512
9a033900060b568fbc01254a1efd9988f4b0b4542b41516d3e9aad1758abfe8f3d4ee347c39eaadab39874f32c06c03a045cc93e7df56c71aaa4a0c32d163d56
-
SSDEEP
12288:YczUZZDtuDQvHmhSzMED6i6kDsanz6bO0lCI7F9D6GQk:ADDt2hS723ancDf7r1
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2244 AcroRd32.exe 2244 AcroRd32.exe 2244 AcroRd32.exe 2244 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD505fc57422b188fed53b281787b563488
SHA1e08efdf38994ac063a918381e2f39af1787db135
SHA256a1d7840340c408b5b828a93b9e8f30ddfe1c05220b1f0e5835cf7f88c02ab5fe
SHA512820a8ffb1c3171176ef985e7ae6d699b787e56c68cdf3cbdb4172248fd90ef8fbb17179ca1e97c189e17c72fe618edab37ce3597c64d9ff3e9998f03a8f540cd