Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08/05/2024, 20:12

General

  • Target

    375d73676fc4229ceb6df863ecf6ddd0_NEIKI.pdf

  • Size

    137KB

  • MD5

    375d73676fc4229ceb6df863ecf6ddd0

  • SHA1

    1b7abe60c707a1eba5fa94515073c9d7465d588d

  • SHA256

    2f9f107e00cae2f52096bb6046ed7be9e7aadcd10db6b184d1024742a034165b

  • SHA512

    2c86fe79c80613f7caf5be1b7fcaa356e806fad4035790342f7b320bcb3c1b60e557ac6307359861f95db86d6125daeaacf5b64a06c3debef1b8e7f2766859ce

  • SSDEEP

    3072:/g/J6ai56CLq0bahjnvBmH7mJjZmfRkQ+oTe0HixC2vx/AFqk:o/J6aXsKjnvB+mif+noTe0h

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\375d73676fc4229ceb6df863ecf6ddd0_NEIKI.pdf"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2876

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    9b8edba2396d6828188e44cbee036b2e

    SHA1

    ef28b290723be75314321bfaf494e0774170a365

    SHA256

    6f7c6f3985f0a22816307d3209081eb88094d5ceb450fa7b98fe727797078804

    SHA512

    6e8d76dd8fc44c2a368b102c0afbd925ae66cf6dbe8e7c0dc8867b22ef1a1f6fb3471a3a6045d276a294dcf01a8638e6e825a7b8f5f1aab78d4b9978ff945f29