Analysis

  • max time kernel
    165s
  • max time network
    180s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/01/2024, 18:59

General

  • Target

    41a9270a6c58e819aabd848080b9d89c.pdf

  • Size

    76KB

  • MD5

    41a9270a6c58e819aabd848080b9d89c

  • SHA1

    5aafbc5b124ae9d5cf888e4245b185ad6c962c68

  • SHA256

    745c3932a20787b711746da534321a7d388995aefe097e714098f5b0312f500e

  • SHA512

    c8a9d939046a149ea4e11ae987666112936a82ccbcae316002674ef7ca8b19e484e361c7a243fcf33fec0856dcbb4fcf57699a6098d932015d012119299fa241

  • SSDEEP

    1536:luWcCVry81W2Y0ClJCBYTlBHJTz8y79DutXRvIaNETvC:xcs5W2Y0ClyE59z8rRvIT2

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\41a9270a6c58e819aabd848080b9d89c.pdf"
    1⤵
    • Checks processor information in registry
    • Suspicious use of SetWindowsHookEx
    PID:5116

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads