Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    28/01/2024, 05:27

General

  • Target

    7c43b22af58330f05576dfc7e7735b08.pdf

  • Size

    111KB

  • MD5

    7c43b22af58330f05576dfc7e7735b08

  • SHA1

    23b534eab6bfda97a49c2f9a762feb5f37d04907

  • SHA256

    34495378693aecd53068f423af402b745d43e4a186be85e546fec235ec016b8c

  • SHA512

    da6827bd995b3641757f11bc6ef93f8728469fe743e657b52361260d14b617ecd04c3435ab7c1785cfb0f3e6840d894102a15d4c679e5deb3a1dda517a44a56d

  • SSDEEP

    768:D6ZWZSVsV1YPveYmYGbLB/vbQNK775BoQ4mijVJipEhiD6T+bIxp0sO9PGVigGZw:I

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\7c43b22af58330f05576dfc7e7735b08.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1732

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1732-0-0x0000000002CD0000-0x0000000002D46000-memory.dmp

          Filesize

          472KB

        • memory/1732-3-0x00000000010F0000-0x00000000010F1000-memory.dmp

          Filesize

          4KB

        • memory/1732-4-0x00000000010F0000-0x00000000010F1000-memory.dmp

          Filesize

          4KB