Analysis

  • max time kernel
    108s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-05-2024 23:26

General

  • Target

    986b41449413edf30ce8c094f545c650_NEIKI.pdf

  • Size

    170KB

  • MD5

    986b41449413edf30ce8c094f545c650

  • SHA1

    3c56095f73ad054820ab9a95ac1585064fa8dedf

  • SHA256

    5da7d36235e67bb774cc36ba80a4a59e0633381b8f65575e94d0f3e78f35ce96

  • SHA512

    c1bfbcac0bf45e9894e8d51cc3c2fd5032ec563cf2caf4ca8b06a439e75f0d149c7a274ecf6e5ed96720efcedfb9a2d2323771e0d6060974f8c14c455f9cbf7d

  • SSDEEP

    3072:oKz5EOueV9Ix5/v3WzyICOWayIoFT8JnocU:oc5EOu0yv3WzYOu2oN

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\986b41449413edf30ce8c094f545c650_NEIKI.pdf"
    1⤵
    • Checks processor information in registry
    • Suspicious use of SetWindowsHookEx
    PID:3080
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1720 --field-trial-handle=2284,i,9807419199535700662,2319175108930815708,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:544

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads