Analysis

  • max time kernel
    163s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/12/2023, 20:12

General

  • Target

    02afacc6363c52d6d30b64b54d83f213.pdf

  • Size

    85KB

  • MD5

    02afacc6363c52d6d30b64b54d83f213

  • SHA1

    1e61d315b85bd85f576cac26c6f0ab0826f72487

  • SHA256

    7e18b085aaff24f99a7ee489b1083767703da1c76c2b017036cfc7090b10d249

  • SHA512

    1b35ce7e1f3e749c5a1bcd0f2f80a76c7ab9b79434278158aba2409887e434b1bdcae04096ba3d97f5c9d8533f93185a26bdfa65191157aa8299d7900c8621cf

  • SSDEEP

    1536:/Th2S3XkREqh6yVEKA4RKHE5lMZh2Wx8oDfzb7oWx7qutpeFW8pO+Kbe:7Ln5KfdlEAu8mbb7h7qq4U+f

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\02afacc6363c52d6d30b64b54d83f213.pdf"
    1⤵
    • Checks processor information in registry
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:4292

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads