Analysis

  • max time kernel
    122s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 17:09

General

  • Target

    7f3757a32d323b8db0c7ea5d265d9ad0.pdf

  • Size

    13KB

  • MD5

    7f3757a32d323b8db0c7ea5d265d9ad0

  • SHA1

    f5b850302fd685fb9672456c37cee59ee37fd20c

  • SHA256

    50fde9c9018cc9e21ee453032d506184ece912310bcf837f3c3d35942f9ce9ec

  • SHA512

    fd942878d64223ceb69c523ffd3456ad116db4f198b6b0de849930558d7c046e547c3397a5b7d078ed14f086213e366fafc396c16be8fccddb8ca3248723f246

  • SSDEEP

    384:6hzaNwAO9GiJlDmlAloSAhmbZ9/mQi/60G7J8vKIs:ahZGirHAhmbZ9OQC6dJiKH

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\7f3757a32d323b8db0c7ea5d265d9ad0.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2004

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2004-0-0x0000000003950000-0x00000000039C6000-memory.dmp

    Filesize

    472KB

  • memory/2004-3-0x0000000000C40000-0x0000000000C41000-memory.dmp

    Filesize

    4KB

  • memory/2004-4-0x0000000000C40000-0x0000000000C41000-memory.dmp

    Filesize

    4KB