Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 02:54

General

  • Target

    0c40e8e2636d54ad0c598d595871f0e6.pdf

  • Size

    13KB

  • MD5

    0c40e8e2636d54ad0c598d595871f0e6

  • SHA1

    602da9e31d09c159ac21457a4c8089f912631b6f

  • SHA256

    47ac785b984960ba07c1981bd58ce30fb8ccf9f1cf3357c7936ae0ee50b4f009

  • SHA512

    2e7fca9af178d4b633e1ca457ff7035fb80414a8ccf1fd0b618c60ffc7f93ea2c3f834b98ed94253db696af6569ea062c4a238ce7fc5ad5c3391db256339d929

  • SSDEEP

    384:6hzaNwAO9GiJlDmlAloSAhmbZ9/lQi/60G7J8vKIs:ahZGirHAhmbZ9tQC6dJiKH

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\0c40e8e2636d54ad0c598d595871f0e6.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2100

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2100-0-0x0000000003AB0000-0x0000000003B26000-memory.dmp

          Filesize

          472KB

        • memory/2100-4-0x0000000000CF0000-0x0000000000CF1000-memory.dmp

          Filesize

          4KB

        • memory/2100-3-0x0000000000CF0000-0x0000000000CF1000-memory.dmp

          Filesize

          4KB