Analysis

  • max time kernel
    120s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 18:33

General

  • Target

    0091f6394cbe6eef138439d15e99e439.pdf

  • Size

    110KB

  • MD5

    0091f6394cbe6eef138439d15e99e439

  • SHA1

    ccb6ddf28b4105413b64772eed4096b346c5eff9

  • SHA256

    e9e096c454d9b549286ffa1f37507a405f671ba07c2e6ba585b3d0b18a1c3ebb

  • SHA512

    83aa6e941581384b6b8d846e54358bda8e0c1c9298c5354bdb42447fb927ab8b747d938bfd7daa94bc63c166fff5a2afad2381eda6489d21dde62cb18d94b988

  • SSDEEP

    768:DsFWZSVsV1YPveYmYGbLB/vbQNK775BoQ4mijVJipEhiD6T+bIxp0sO9PGVigGZw:s

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\0091f6394cbe6eef138439d15e99e439.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2300

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2300-0-0x0000000002F40000-0x0000000002FB6000-memory.dmp

    Filesize

    472KB

  • memory/2300-3-0x00000000013A0000-0x00000000013A1000-memory.dmp

    Filesize

    4KB

  • memory/2300-4-0x00000000013A0000-0x00000000013A1000-memory.dmp

    Filesize

    4KB