Analysis

  • max time kernel
    1s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 23:37

General

  • Target

    43b092c374d97c565c86757d8ec05acf.pdf

  • Size

    22KB

  • MD5

    43b092c374d97c565c86757d8ec05acf

  • SHA1

    a40da889d6a661508a0eea0c0f49aa4650f89a0b

  • SHA256

    9564b0d705648ab06eb2992119e561b0a0fb1aecc41c95f281a946774d6f0c21

  • SHA512

    edc4dd9c02bb29b16c91e0fa182a46e7eedcdb451aa20c658a03fafd4347b61d79b73c5da6905349fff08ad64f6293d7eb71072acc583119c77dc1158eec14ba

  • SSDEEP

    384:vd7oNcSlnMBFkNEZuwVrza9wAO9GiUQi/pftPLxVeeQ23b:ljnZfx7ZGiUQCZlIYb

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\43b092c374d97c565c86757d8ec05acf.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2512

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2512-0-0x00000000040B0000-0x0000000004126000-memory.dmp

          Filesize

          472KB

        • memory/2512-4-0x0000000000CD0000-0x0000000000CD1000-memory.dmp

          Filesize

          4KB

        • memory/2512-3-0x0000000000CD0000-0x0000000000CD1000-memory.dmp

          Filesize

          4KB