Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24-01-2024 22:32

General

  • Target

    73059f23b49c027f6e92ff365d626a08.pdf

  • Size

    13KB

  • MD5

    73059f23b49c027f6e92ff365d626a08

  • SHA1

    63dd5ea5bdc416b8a2880ad1454eaa1e2f0d9efa

  • SHA256

    50da95705e391906305a93f950641d30cbfdcc8dcc71b771a09b1a8ff0a5fbcd

  • SHA512

    c8e7dd145e7434f0a499e6e1941051e5d599de5a711b976363e52d9239d7ea925d2ea7440c2a5c48d29be73644b338c608c672f8a6ce211160f67065007fd0e4

  • SSDEEP

    384:OhzaNwAO9GiCHZLJ0ZhrrY1Qi/60G7wuj:ehZGiMJ0DrEQC6dwy

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\73059f23b49c027f6e92ff365d626a08.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2912

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2912-0-0x0000000003C50000-0x0000000003CC6000-memory.dmp

    Filesize

    472KB

  • memory/2912-3-0x0000000000AB0000-0x0000000000AB1000-memory.dmp

    Filesize

    4KB

  • memory/2912-4-0x0000000000AB0000-0x0000000000AB1000-memory.dmp

    Filesize

    4KB