Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    15/01/2024, 05:16

General

  • Target

    5c3ac1a1efedeb9c67182487bd3cb400.pdf

  • Size

    13KB

  • MD5

    5c3ac1a1efedeb9c67182487bd3cb400

  • SHA1

    c1511abccaec22722a75fdb13b6e6c57642ea95e

  • SHA256

    6d145aa4314b6ac82fd796086076719d2670cb73632a0f65239ef2d4ff9c0cb9

  • SHA512

    b1240fa9e3277dddc97ac723a231edd2eecc2ceb02cd0555fc53468568e475bebf838e8fef6c2bce20bdb40ca5538eed7f702d2fc2753200fc6220c2d6c4015c

  • SSDEEP

    384:6hzaNwAO9GiJlDmlAloSAhmbZ9/HQi/60G7J8vKIs:ahZGirHAhmbZ9PQC6dJiKH

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\5c3ac1a1efedeb9c67182487bd3cb400.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1652

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1652-0-0x0000000000F40000-0x0000000000FB6000-memory.dmp

    Filesize

    472KB

  • memory/1652-3-0x0000000000CC0000-0x0000000000CC1000-memory.dmp

    Filesize

    4KB

  • memory/1652-4-0x0000000000CC0000-0x0000000000CC1000-memory.dmp

    Filesize

    4KB