Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
11-06-2024 18:15
Behavioral task
behavioral1
Sample
Rechnung Nr. 2072 Elisabeth Feuz.pdf
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
Rechnung Nr. 2072 Elisabeth Feuz.pdf
Resource
win10v2004-20240426-en
General
-
Target
Rechnung Nr. 2072 Elisabeth Feuz.pdf
-
Size
189KB
-
MD5
3d958fe4be49866ab1b2e5276ba4ee8a
-
SHA1
a602d5fbc2526030b70a6528b9439b6192f9406c
-
SHA256
7c49263cf573abeb0319a1a638410f63af0be7016c143eff3bbd3d06340f7562
-
SHA512
6322126d08191c48b73a9918609ebd86c41b21b8c7c6445ed627162d3525c6167e9b7099ec34e22c9f1938afb504029cccb62dbd7aa1cffec3f4c98cd1f57967
-
SSDEEP
3072:zaMx/08tZ763bJYxuW20ICl1zfT09rw7raUYAtFqNbRKNtFwmOjP51STIsUgLtbY:1O8tZaYxuW20x1jT090fztFDzkDSEsUN
Malware Config
Signatures
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1732 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1732 AcroRd32.exe 1732 AcroRd32.exe 1732 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e12a9c8a62bae17b2163cbac5797f161
SHA10ec4d2cba0bd638bbdb0291f2aa4e8413dd212ee
SHA2567b52fe44de2f50cda2224c484f4b09d6c70fbed4e9f87b2a75678fe80bb91a38
SHA512e3c243153ce9c2125a1aae3c1326ecbbdd474232b8f522e3220580189c3eb86f7d43798d138fba2c8978260183ad1d8e27943d423f86cafb181fbbd91f5c5f71