Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08/05/2024, 23:12

General

  • Target

    91e3d3036e345b52e9eb70c40e20a220_NEIKI.pdf

  • Size

    126KB

  • MD5

    91e3d3036e345b52e9eb70c40e20a220

  • SHA1

    486669b5355dfdde99da8796a2e50874d3756f26

  • SHA256

    421cfb4c04a5aa5b2047e1993f854fd60e84d983bb92620d33e9b5a83e5f194a

  • SHA512

    456c89cf645901d3e5eb692c0cd9dd83acc0353a8012e2d4a8447dc4664009a86fea1162516abfa10de0a6a11265dc139ac5674ea379ab845fa0572bdff0f312

  • SSDEEP

    3072:mbqCQj3n0Dw92ahjnvBmH7mHjZmflQ+o7BQpDE/xy:mbxQj3nQ9KjnvB+mUflno7CDqy

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\91e3d3036e345b52e9eb70c40e20a220_NEIKI.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:1712

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    8c522976e9b68eca8877a300a5482c3f

    SHA1

    af4fac8272eab4a516d61dd0187175a803db8519

    SHA256

    b9f1423eac3ab59397349b3a08b6735a64da9da8d2f824bca1020f3e35a3e0f4

    SHA512

    86fd1b10986f005d468e61436e8c9fc3962dd3709e3615bc82473e2a0b228c0587d9af644c9325174e0661d65cb4e4b30a3aba3a1893566cf8ec22b12ef20270