Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08/05/2024, 22:48

General

  • Target

    8597d06eb69207c62832e983e87ec320_NEIKI.pdf

  • Size

    60KB

  • MD5

    8597d06eb69207c62832e983e87ec320

  • SHA1

    e373118f8c9330f9c0cd4da29df5f28ac01e0322

  • SHA256

    dacafd840873e95ecc022d8ec644a217b9c465c0b2079c3ea61e1bbfaf9700b2

  • SHA512

    2f5bc5c6a90fd00efaf3317e62dd3dc156ccfc9ceabc7c9bf3c711a0eccacadaf7700779fc84f00c42c02d3b9a5dfecc1a4c8186b61a4f9a5c0ce75297fce0d3

  • SSDEEP

    1536:tObBCcz+RWBgIzw2TKuLaff1X7MW0iO8pi0FpnfI:EbBC8wGgIzw2T5afJqqiqA

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\8597d06eb69207c62832e983e87ec320_NEIKI.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2936

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    fd33555eb37fc1413e9c2f4004fb754c

    SHA1

    421318ed236da1654d9729e116e1184d86c9c208

    SHA256

    c7d33836909c483ded3badce6c6203f43c69c03e767eee04b9dc7f3f7b27919f

    SHA512

    a251066c7cdae3831fb12ad606ebe5a81e7d08757170e3f27bff3a139c829ed8fe84a056374cbddd279cc99ad80cf2ad26b6a8178c89cd380b71ceca8675311c