Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    24/02/2024, 08:03

General

  • Target

    a15c29d68d515654878eec0920625445.pdf

  • Size

    86KB

  • MD5

    a15c29d68d515654878eec0920625445

  • SHA1

    29271d4c73306be9665b90cad62c7394f78df9f0

  • SHA256

    332ea0e1fba7b5d8794fe91f516ec6fb6cec98a7eacd39000ca5784b038b7560

  • SHA512

    acf912acb4f6f11e224069fe8071cdbb5ca9dd850154ce04e893f680a33760290713f2bfb7307577ae68e1a75456aa2d6065b6025931fdf0892c45dbde06c667

  • SSDEEP

    384:B3vNi7q9XlCLkCKwoCsU51od0kNCRxCjwIMI7wI4CrSeqblZf5CCWNvCKMvl62ba:XH

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\a15c29d68d515654878eec0920625445.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2064

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2064-0-0x00000000041E0000-0x0000000004256000-memory.dmp

          Filesize

          472KB

        • memory/2064-3-0x0000000002130000-0x0000000002131000-memory.dmp

          Filesize

          4KB

        • memory/2064-4-0x0000000002130000-0x0000000002131000-memory.dmp

          Filesize

          4KB