Analysis

  • max time kernel
    122s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    07/01/2024, 22:43

General

  • Target

    49f72fe21d75135495441f547a348492.pdf

  • Size

    12KB

  • MD5

    49f72fe21d75135495441f547a348492

  • SHA1

    ab381b4327a1bfc338ab06fec93afbaf9752def9

  • SHA256

    4df7b513d50654f9a8c4e456e2b4723cd830778bd7b5aeb304a085b1de21ea6e

  • SHA512

    55f4772bf326afa2a5831cb8fa5bcf238e8dc1d176d457742b902bace6a3d9824d3c76338985d1ae0fbc0f79f4bb101904d07c0a5fcd16122d656a2d163cf0fd

  • SSDEEP

    192:DLEMMLEtysyat6XLqIvxECYJJvIvxECYJJdJxeBCdsoYZ8pRPFOF++:DLEMMLEtysydXI9vwBCdsoE8pRPFOF++

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\49f72fe21d75135495441f547a348492.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2024

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2024-0-0x0000000003F30000-0x0000000003FA6000-memory.dmp

          Filesize

          472KB

        • memory/2024-3-0x0000000002640000-0x0000000002641000-memory.dmp

          Filesize

          4KB

        • memory/2024-4-0x0000000002640000-0x0000000002641000-memory.dmp

          Filesize

          4KB