Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
22-10-2023 23:49
Static task
static1
Behavioral task
behavioral1
Sample
Job Offer.pdf
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
Job Offer.pdf
Resource
win10v2004-20230915-en
General
-
Target
Job Offer.pdf
-
Size
144KB
-
MD5
a4c2592cb5f9a5afaa06b7e0734ad194
-
SHA1
d18e1e7a48ff1a5040a3bd31c5b4ac23898e8d09
-
SHA256
dda2e186954542f55a95b8fa814c373010bfd8bcbfa14e5581dec56de74ae1f4
-
SHA512
20a97b03d07f2ffb5b56af2ef26a4d81db8045290db0805bf2ec93bfb446d0e11d1afceadd8c2e334b5045942901e36eb5c4e797ef69485b8749004e1d4726d2
-
SSDEEP
3072:yxhGOnl9HtbjgwVvVqbL1pecO7WYPaYV4a:yPB/pmjebP2a
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3048 AcroRd32.exe 3048 AcroRd32.exe 3048 AcroRd32.exe 3048 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD536d438a1df7ce2189e3cbfae71a54f0b
SHA1e0a93c594904fbe72021146f480ca2fd2bd0463f
SHA25666e422e3e62475fb6cdd25cc990444a1df28670741b25c09dc656cca45d574b1
SHA512bb595a152fab3df4e3c45550af7b776416d9c2bcb299c708e2b427c70a4f1e2a8541eaf4e9343aa5e8bdea9d193894f08af0cd1f345f907ad858ee7622983d8f