Analysis

  • max time kernel
    122s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 00:21

General

  • Target

    45ff0f4753930ba2d31338615bae29d6.pdf

  • Size

    9KB

  • MD5

    45ff0f4753930ba2d31338615bae29d6

  • SHA1

    1f5e972c895f77f038a851fed08b93757e420604

  • SHA256

    05dade3369f97439f453274cf784f4a1b38e8062d8014d460dc76973a045e6fd

  • SHA512

    61b363ef8a87fb13ed56a323c4bdb507a2eb0aa62452da8f90b22b6d36db2d52e9c0dd465d166cdb5f0e29a8aa4328d3cbe31a607644720c88368cf7907e5fd9

  • SSDEEP

    192:F3hzajYywAO9G+/vqvQNi/60un/TsE090SaeLNWFUnUd5jqjE:dhzazwAO9GiUQi/60G7sEw0qWFUnUdJv

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\45ff0f4753930ba2d31338615bae29d6.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1104

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1104-0-0x0000000002B90000-0x0000000002C06000-memory.dmp

    Filesize

    472KB

  • memory/1104-4-0x00000000007B0000-0x00000000007B1000-memory.dmp

    Filesize

    4KB

  • memory/1104-3-0x00000000007B0000-0x00000000007B1000-memory.dmp

    Filesize

    4KB