Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 16:00
Behavioral task
behavioral1
Sample
KUA1a.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
KUA1a.pdf
Resource
win10v2004-20240709-en
General
-
Target
KUA1a.pdf
-
Size
189KB
-
MD5
2c8e814def48bca110fc710bdf162099
-
SHA1
5e6794405a7a30b65085d3059ada43b9c1603e9a
-
SHA256
76d790d4341a1b90372cfb14b3d5b635b5be8b960739182e5ed46b652f0bafc4
-
SHA512
614518247ab405a1ab0ac1b1f72dc536d1529ba623d932e794900a6de2ca911c4ce4602593d51f037d10b50dec263d552f7332380e1d75c7fc6cdfbbcd916dfe
-
SSDEEP
3072:S4S3H4JyxGOvaMaaxAV2SF2cKo7pouprRdOPVpBg+0JQxa3VKSmkWsmKJDMTL5m1:S4EHmyxiiAV3F2cKrsqa3VKSpRMf5mhH
Malware Config
Signatures
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2728 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2728 AcroRd32.exe 2728 AcroRd32.exe 2728 AcroRd32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5db89077d47cff5dc9be003f04d2c96af
SHA14fcb5ff883796411aa19f66a1543f9f01e47cb5b
SHA256a949b14203d953d42f5b532ab05201d673eebdb07148571087d0a296e6f9924a
SHA512d97a3638fc7ddc8eb2ac2a3de8aa1d0d44895c992ea16a027649f67557503866b860fc5c2e20d73054e45ab9089ddaac6c925c17dba88f86ecac587988e5212b