Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08-05-2024 19:17

General

  • Target

    19ef4a0e256189160791a92d3d71ccd0_NEIKI.pdf

  • Size

    1.1MB

  • MD5

    19ef4a0e256189160791a92d3d71ccd0

  • SHA1

    e39b22a05f1f4fb5aaccda9f9ca65ef600dc86f6

  • SHA256

    75dc31c6b1c6b08f8119d298ba754b389f6e0901ef041f9a8895309e4a9e73b0

  • SHA512

    dfb84a80d74b62e3d238737f72dff0394a444122fff121beead00e8fc8c455c60f15cee5207df80834beb388e03d14ac70358017914bc2bd43d3f6deda81cc0e

  • SSDEEP

    24576:YMmcHiyP0/NRpWd19aeDyYOQuIfDLVS9RBZH/LeLDwHbv3vR3:YMLVP6u/10Q1ZStZHDeQzvR3

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\19ef4a0e256189160791a92d3d71ccd0_NEIKI.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2008

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    5bc7867695eedd5138c687a2f244b960

    SHA1

    2484350db67dcb385be87a7e9c95e4c687fd5bb3

    SHA256

    f653c7b17d471d31ba0b6498bf3000029fb3f54403306fc79e23ada12f9f1688

    SHA512

    8e3ea8b25c1d8c2936c319d41990355b2324104647c803fb4fe950ce050fe9a1d34d1abd420f43813af637b99a5537d5bfd7236455020df6613cac152e8c2f17