Analysis

  • max time kernel
    164s
  • max time network
    176s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-01-2024 18:46

General

  • Target

    442b312187434e68f070fe4948a76190.pdf

  • Size

    79KB

  • MD5

    442b312187434e68f070fe4948a76190

  • SHA1

    4e90d671b7c01ad87f1108a8a94e36f87e4441de

  • SHA256

    f1d6adc91b68865054da90b992cb4587c952ad63c412b43b4a0d167d4772d2eb

  • SHA512

    06b65035e6e243b0cd988968389ed41723c43fd81fbb6e6bd14a88fdb05ac37745b2927fb39747ab307b297f97ee4e2529e6b1d61f201e564641133d9bc0eac1

  • SSDEEP

    1536:Uu/qeKBusbgqCwKccuQMnb1p0iVvf3X7RcTAST6A/BchGUnt/3AS:/qeKB1bgqC6nvX3X9cn//BchGUnRh

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\442b312187434e68f070fe4948a76190.pdf"
    1⤵
    • Checks processor information in registry
    • Suspicious use of SetWindowsHookEx
    PID:3760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads