Analysis

  • max time kernel
    139s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-02-2024 09:55

General

  • Target

    invoice-1580727057.pdf

  • Size

    51KB

  • MD5

    017f1b614cf522820ffb9c97b218dd87

  • SHA1

    7e031b1513aa65874e9b609d339b084a39036d8f

  • SHA256

    5bffcb16eb8db5cd7a1edbf324c3fe7a66713b3949c30e072a95fcb735995f31

  • SHA512

    e4a0d7ec0ab5b71369de8ed8325ae8387130b85b931699bfa77aecca4bbe24c3df1fed6b89650d127961ae9210f4f84bb499d44e6ece21bb2b72737caa442f9e

  • SSDEEP

    192:q0TIMXkdEMVRAsEsBjXcLmgbvdxRA5f4FYdVz4NINsW6qrctagCYmmu3paI6a/4e:5JadVPLBjX4bd07z1iW7rZTXxVr4ODGc

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of SetWindowsHookEx 6 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\invoice-1580727057.pdf"
    1⤵
    • Checks processor information in registry
    • Suspicious use of SetWindowsHookEx
    PID:3732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads