Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 23:53

General

  • Target

    447f90b450772bd6a2fb610f3675be2a.pdf

  • Size

    73KB

  • MD5

    447f90b450772bd6a2fb610f3675be2a

  • SHA1

    7a22357fb2ee33932319c037870cdb3c1e3d353c

  • SHA256

    5cdc06c28b02787366e3fc7507f84807d9d40f96c1d84c69b28d1128850a4bc9

  • SHA512

    e3902eae3d194522b01045869f4fdbb6ccc584ac11b093b8c7474a2c7400290006beec60065ab7a33b490e4892a5872be63318522b4f4fa34b691e5c72ca986a

  • SSDEEP

    192:WysN0AFyapTflEYOaWgJSGjYIAM9NP4F+:WysN1iYOaVJFcM9NP4F+

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\447f90b450772bd6a2fb610f3675be2a.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1676

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1676-0-0x0000000002FB0000-0x0000000003026000-memory.dmp

          Filesize

          472KB

        • memory/1676-3-0x00000000020B0000-0x00000000020B1000-memory.dmp

          Filesize

          4KB

        • memory/1676-4-0x00000000020B0000-0x00000000020B1000-memory.dmp

          Filesize

          4KB