Analysis

  • max time kernel
    152s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/01/2024, 19:19

General

  • Target

    41b3a87d83a93a8255fd176b867982b6.pdf

  • Size

    87KB

  • MD5

    41b3a87d83a93a8255fd176b867982b6

  • SHA1

    db60447dafcc816e3b843d1ca1a935566400528c

  • SHA256

    7085d7e5746750ead759a1566325de7b9a52e73dde9ca7481f2a6fac3c6b5cc5

  • SHA512

    bd5e07dc04d6dc41b80cd16741b781a6fdc01a981bd95708595e299e21b67c4b6091f5c152dbd9390b493cbed5589a767da486aad74adc1d3d8770d72685df0f

  • SSDEEP

    1536:5HwK1E1S2+D8E9XNIcTvjNeUmfjwWwpOS9WhURCSENiff:9wKmc99IcvjNe/SMUDEa

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\41b3a87d83a93a8255fd176b867982b6.pdf"
    1⤵
    • Checks processor information in registry
    • Suspicious use of SetWindowsHookEx
    PID:3732

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads