Analysis
-
max time kernel
33s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-02-2024 19:31
Static task
static1
Behavioral task
behavioral1
Sample
PKKNBSGD4P2EO9.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
PKKNBSGD4P2EO9.pdf
Resource
win10v2004-20231215-en
General
-
Target
PKKNBSGD4P2EO9.pdf
-
Size
67KB
-
MD5
29f1e55582ec00ba8ed5f8250fc1aa6a
-
SHA1
0de3531c0621bcd4ab2772c11c926d960b41dcc1
-
SHA256
2a9e8f006b7470dc6ccc4ae37d42f5ceb38127b3a89c4758aac3d412df5fccc0
-
SHA512
59546490c1a2389497cedd848f20a15ef5ce13fc06279232e7b2f7ef4dcd9dcb08f7b6bd02eb6df0df2678850d7bcadd8fea82dd45b5184314f74bda90f86753
-
SSDEEP
1536:JIOBLBW/E1CiitkE4o9P3pVZ81/2M0fDE9L+LL49OJ3hBeVz:qMBFCJn9P3pVNMU4x8LN3feVz
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
AcroRd32.exepid process 1940 AcroRd32.exe 1940 AcroRd32.exe 1940 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ffffa6af5515168fb09763ffbf848cfc
SHA19abba5cf6ea759e35d8376b4995ba08777796262
SHA2565764a40eb19d3f5794b5103edcda0b3c9da5a3c1ebda194dc76cf4d0fd44791e
SHA5124af90c418723cd99d4a8b431e6a7283e5c944ca8def553c24490393512f3b3774746dd4f50ea9b3fe1f6192d81014d523e7af1426be8d056fb9281945195da4c