Analysis

  • max time kernel
    154s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-01-2024 10:46

General

  • Target

    48c2ca7360be63d22c45f3d24966936c.pdf

  • Size

    35KB

  • MD5

    48c2ca7360be63d22c45f3d24966936c

  • SHA1

    ac7c4557e1f095e8683cecc8ae6cf96e4f8c300d

  • SHA256

    0b81c1a1bbaffbfe040c9829d91e76ba11c1cd3a00012b42652580445fbe0f50

  • SHA512

    bc1f7aa23e33de52097a9192c97f40241598b9fc082c95ef50fd0134e788665d49ea31841219563b5d47c6d8809a903b87b0b6b09953065f7704d5a41847e5d5

  • SSDEEP

    768:ATWlOWvrkN3SuTTqiUoX6/TkA7b55aDSBMsj:A6lOBTpATl5a2BMsj

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\48c2ca7360be63d22c45f3d24966936c.pdf"
    1⤵
    • Checks processor information in registry
    • Suspicious use of SetWindowsHookEx
    PID:3576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads