Analysis
-
max time kernel
92s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
05-02-2024 13:08
Behavioral task
behavioral1
Sample
invoice-1580727057.pdf
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
invoice-1580727057.pdf
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
invoice-1580727057.pdf
-
Size
51KB
-
MD5
575135774e0f5c10340184ac92650c66
-
SHA1
b57ed98331215a7396e27da43a92346c7c129800
-
SHA256
d99bc106e73e04fd321a874d7b08e7ec8c5c45561141aa4da96f4c51108e9b39
-
SHA512
c8ab2b71f0aee308d28e1ad88bbd0e1207350d95d1350a22853dadddd4b464208bbc3c8e19c9e140d7fc966041d5d9f5ae9d74f6aa8b00e11eda132be9112256
-
SSDEEP
192:Y03I1XAOlOlOlOlOlOlOlOlOlBD4XiuUXzf+YxIXNlkfExgM/1iXM3PYcZRRRRRH:ru1MMMMMMMMTd54lkfEx5wcZraewNMc+
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
AcroRd32.exepid process 3336 AcroRd32.exe 3336 AcroRd32.exe 3336 AcroRd32.exe 3336 AcroRd32.exe 3336 AcroRd32.exe 3336 AcroRd32.exe