Analysis
-
max time kernel
122s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 04:26
Static task
static1
Behavioral task
behavioral1
Sample
takimoto.sohachi_2114.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
takimoto.sohachi_2114.pdf
Resource
win10v2004-20231222-en
General
-
Target
takimoto.sohachi_2114.pdf
-
Size
12KB
-
MD5
fa82afaf262044ad3753f86a95e6b64d
-
SHA1
280278ae4baf2bde12cc105848ca51d9815bf881
-
SHA256
d00fbb9b2e3c3464b5de4a361083953d87331c55fddc23497af062a26c5258e5
-
SHA512
7318ecb909e8401484d4e548e44fbcfb24c18e1c6f4f646df5d8e4653ea0a585344adf5374c66b06acd1bc829ee912228f866437321a1f0673fd81cb127d5f22
-
SSDEEP
192:YvHdStwk+SVg1Agvn2QUUu+b90sRvuw3LJdLnixbKawxduiFfVIdpu22gltnzs/:Yv/khVFga+b9T3Hn5dSu7gl5M
Malware Config
Signatures
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2524 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2524 AcroRd32.exe 2524 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5cef0b1abe44005f3e4f6606badc97f47
SHA1e98e69933651f411e677f187580eec57144b342e
SHA256c581741842184d9e9f626c6193dd21e54a1557af27fc59391bd5e3096fc51561
SHA51270097b04a0199e8ec51bad887a099cb9be24fde5aa234012d0d5510293b1bc2abe1d7464454df2297b60c4c90a7b797c8d9fbf29a1f0c2d2f76cbbbd5da977e8