Analysis
-
max time kernel
117s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 19:13
Behavioral task
behavioral1
Sample
c6a8c2622a8dd2436dc6c99f74700d84.pdf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c6a8c2622a8dd2436dc6c99f74700d84.pdf
Resource
win10v2004-20240226-en
General
-
Target
c6a8c2622a8dd2436dc6c99f74700d84.pdf
-
Size
75KB
-
MD5
c6a8c2622a8dd2436dc6c99f74700d84
-
SHA1
2e962b2c4166831bd93def63ee350d3af92a966f
-
SHA256
1d51286c6940888a7dcc9c52446f02ff07bf2fb11556694220063388d143b575
-
SHA512
c0d8072cef323ca7e382daa5a7267dc48043745b23729c4bcb3905f01eba01b429223b34e20b5950127e98dc6838aa43f2c65d401348ea9bc561af174ff33cb7
-
SSDEEP
1536:UVK8v6qqbtPDqUkvgEXCgIR9STHOr4WOpOwrKWVl7Ff+wX5Z:7RbJTzEXCgIRV1wr1Fl7
Malware Config
Signatures
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1444 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1444 AcroRd32.exe 1444 AcroRd32.exe 1444 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD571e9c451cd1bb602105f8398ab4fa005
SHA11af509a155b384c1cd49dafc2491b41065513c65
SHA256a9053033a35758b208c3431fc0948b43c11e65cdfce91b9f868c0cec2723b33b
SHA512d7204cb36183092d8f1ec66d871ff7a72228e70c5f5162df953f83ecfed594539c47cf2a9e5819e5084715de36c3f2257055c4b13fdcb8cec755a7f68a2daba6