Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2024 17:22

General

  • Target

    7514d0d0af15f64f8267b2a8fba89f7a.pdf

  • Size

    110KB

  • MD5

    7514d0d0af15f64f8267b2a8fba89f7a

  • SHA1

    21663bdf3b7963f5a03a5fcc3622926494e8231b

  • SHA256

    12fa24859402e438781cdc0a6553e8586798663374a811aaf896356239041d91

  • SHA512

    f67470c2a6693e79137f88b679c2750336c653c151e8cce5dfc13ca7ae1191f19ac976e6b1b39fce8b5e530cf7d94f6341b9ed788f96b6b837ff8b3bc8cf36ad

  • SSDEEP

    768:DN8WZSVsV1YPveYmYGbLB/vbQNK775BoQ4mijVJipEhiD6T+bIxp0sO9PGVigGZw:4

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\7514d0d0af15f64f8267b2a8fba89f7a.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2040

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2040-0-0x0000000003D30000-0x0000000003DA6000-memory.dmp

    Filesize

    472KB

  • memory/2040-3-0x00000000021F0000-0x00000000021F1000-memory.dmp

    Filesize

    4KB

  • memory/2040-4-0x00000000021F0000-0x00000000021F1000-memory.dmp

    Filesize

    4KB