Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 01:21
Static task
static1
Behavioral task
behavioral1
Sample
takimoto.sohachi_2114.pdf
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
takimoto.sohachi_2114.pdf
Resource
win10v2004-20231222-en
General
-
Target
takimoto.sohachi_2114.pdf
-
Size
12KB
-
MD5
fa82afaf262044ad3753f86a95e6b64d
-
SHA1
280278ae4baf2bde12cc105848ca51d9815bf881
-
SHA256
d00fbb9b2e3c3464b5de4a361083953d87331c55fddc23497af062a26c5258e5
-
SHA512
7318ecb909e8401484d4e548e44fbcfb24c18e1c6f4f646df5d8e4653ea0a585344adf5374c66b06acd1bc829ee912228f866437321a1f0673fd81cb127d5f22
-
SSDEEP
192:YvHdStwk+SVg1Agvn2QUUu+b90sRvuw3LJdLnixbKawxduiFfVIdpu22gltnzs/:Yv/khVFga+b9T3Hn5dSu7gl5M
Malware Config
Signatures
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2824 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2824 AcroRd32.exe 2824 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD573726822052ff7e12796690a6cff845e
SHA139abd4784d7005bf105f41ec76a10836226ad365
SHA2566c0dba6a16ecc668196bbd8b37ce38bfa31a28ff1f9600ca6c58e85c0ec1f561
SHA5128d8ef2d4b86974866f12f486c2abc6bdc5b518203a2049ddb9e7af2c548300f3fbd18618a623e4cfe794132a224f30c3b156edd744cb561fd275a96581c57666