Windows Analysis Report
Briefkopf YG Business.pdf

Overview

General Information

Sample name: Briefkopf YG Business.pdf
Analysis ID: 1546140
MD5: eb9b257ab180ee2bb68d738473d8f0f3
SHA1: 6c6d4e404698bb700a408677a9232ab1dddb4a66
SHA256: 46e69d437c09af59d573bd1ab4cefcd2c6ffcdab913fb33e50e7d411580f60ed
Infos:

Detection

Score: 3
Range: 0 - 100
Whitelisted: false
Confidence: 80%

Signatures

IP address seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication

Classification

Source: global traffic DNS query: name: x1.i.lencr.org
Source: global traffic TCP traffic: 192.168.2.5:60816 -> 96.7.168.138:443
Source: global traffic TCP traffic: 192.168.2.5:60816 -> 96.7.168.138:443
Source: global traffic TCP traffic: 192.168.2.5:60816 -> 96.7.168.138:443
Source: global traffic TCP traffic: 192.168.2.5:60816 -> 96.7.168.138:443
Source: global traffic TCP traffic: 192.168.2.5:60816 -> 96.7.168.138:443
Source: global traffic TCP traffic: 192.168.2.5:60816 -> 96.7.168.138:443
Source: global traffic TCP traffic: 192.168.2.5:60816 -> 96.7.168.138:443
Source: global traffic TCP traffic: 192.168.2.5:60816 -> 96.7.168.138:443
Source: global traffic TCP traffic: 192.168.2.5:60816 -> 96.7.168.138:443
Source: global traffic TCP traffic: 192.168.2.5:60816 -> 96.7.168.138:443
Source: global traffic TCP traffic: 192.168.2.5:60816 -> 96.7.168.138:443
Source: global traffic TCP traffic: 96.7.168.138:443 -> 192.168.2.5:60816
Source: global traffic TCP traffic: 192.168.2.5:60816 -> 96.7.168.138:443
Source: global traffic TCP traffic: 192.168.2.5:60816 -> 96.7.168.138:443
Source: global traffic TCP traffic: 96.7.168.138:443 -> 192.168.2.5:60816
Source: global traffic TCP traffic: 96.7.168.138:443 -> 192.168.2.5:60816
Source: global traffic TCP traffic: 192.168.2.5:60816 -> 96.7.168.138:443
Source: global traffic TCP traffic: 96.7.168.138:443 -> 192.168.2.5:60816
Source: global traffic TCP traffic: 96.7.168.138:443 -> 192.168.2.5:60816
Source: global traffic TCP traffic: 192.168.2.5:60816 -> 96.7.168.138:443
Source: global traffic TCP traffic: 192.168.2.5:60816 -> 96.7.168.138:443
Source: global traffic TCP traffic: 96.7.168.138:443 -> 192.168.2.5:60816
Source: global traffic TCP traffic: 192.168.2.5:60816 -> 96.7.168.138:443
Source: global traffic TCP traffic: 96.7.168.138:443 -> 192.168.2.5:60816
Source: global traffic TCP traffic: 192.168.2.5:60816 -> 96.7.168.138:443
Source: global traffic TCP traffic: 96.7.168.138:443 -> 192.168.2.5:60816
Source: global traffic TCP traffic: 96.7.168.138:443 -> 192.168.2.5:60816
Source: global traffic TCP traffic: 192.168.2.5:60816 -> 96.7.168.138:443
Source: global traffic TCP traffic: 192.168.2.5:60816 -> 96.7.168.138:443
Source: global traffic TCP traffic: 96.7.168.138:443 -> 192.168.2.5:60816
Source: Joe Sandbox View IP Address: 96.7.168.138 96.7.168.138
Source: Network traffic Suricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.5:49717
Source: Network traffic Suricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.5:60993
Source: global traffic HTTP traffic detected: GET /onboarding/smskillreader.txt HTTP/1.1Host: armmf.adobe.comConnection: keep-aliveAccept-Language: en-US,en;q=0.9User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) ReaderServices/23.6.20320 Chrome/105.0.0.0 Safari/537.36Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brIf-None-Match: "78-5faa31cce96da"If-Modified-Since: Mon, 01 May 2023 15:02:33 GMT
Source: unknown TCP traffic detected without corresponding DNS query: 96.7.168.138
Source: unknown TCP traffic detected without corresponding DNS query: 96.7.168.138
Source: unknown TCP traffic detected without corresponding DNS query: 96.7.168.138
Source: unknown TCP traffic detected without corresponding DNS query: 96.7.168.138
Source: unknown TCP traffic detected without corresponding DNS query: 96.7.168.138
Source: unknown TCP traffic detected without corresponding DNS query: 96.7.168.138
Source: unknown TCP traffic detected without corresponding DNS query: 96.7.168.138
Source: unknown TCP traffic detected without corresponding DNS query: 96.7.168.138
Source: unknown TCP traffic detected without corresponding DNS query: 96.7.168.138
Source: unknown TCP traffic detected without corresponding DNS query: 96.7.168.138
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic HTTP traffic detected: GET /onboarding/smskillreader.txt HTTP/1.1Host: armmf.adobe.comConnection: keep-aliveAccept-Language: en-US,en;q=0.9User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) ReaderServices/23.6.20320 Chrome/105.0.0.0 Safari/537.36Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brIf-None-Match: "78-5faa31cce96da"If-Modified-Since: Mon, 01 May 2023 15:02:33 GMT
Source: global traffic DNS traffic detected: DNS query: x1.i.lencr.org
Source: 77EC63BDA74BD0D0E0426DC8F80085060.2.dr String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: 2D85F72862B55C4EADD9E66E06947F3D0.2.dr String found in binary or memory: http://x1.i.lencr.org/
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 60816
Source: unknown Network traffic detected: HTTP traffic on port 60816 -> 443
Source: classification engine Classification label: clean3.winPDF@14/29@1/1
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe File created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt23.lst.5408 Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe File created: C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-10-31 09-59-01-750.log Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA Jump to behavior
Source: unknown Process created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Desktop\Briefkopf YG Business.pdf"
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe Process created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2108 --field-trial-handle=1640,i,10097200807821530073,9878019752465417983,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe Process created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215 Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2108 --field-trial-handle=1640,i,10097200807821530073,9878019752465417983,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8 Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process created: unknown unknown Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: Briefkopf YG Business.pdf Initial sample: PDF keyword /JS count = 0
Source: Briefkopf YG Business.pdf Initial sample: PDF keyword /JavaScript count = 0
Source: Briefkopf YG Business.pdf Initial sample: PDF keyword /EmbeddedFile count = 0
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs