IOC Report
Benefit Enrollment -eGz8VNb.pdf

loading gif

Files

File Path
Type
Category
Malicious
Benefit Enrollment -eGz8VNb.pdf
PDF document, version 1.4, 1 pages
initial sample
malicious
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\1baa8844-8fc6-42dc-ac17-41654746234b.tmp
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State~RF68d1dc.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\d721b304-5d63-45a3-bb67-b11e6ededf88.tmp
JSON data
modified
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-241119181038Z-228.bmp
PC bitmap, Windows 3.x format, 107 x -152 x 32, cbSize 65110, bits offset 54
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
SQLite 3.x database, last written using SQLite version 3040000, file counter 15, database pages 21, cookie 0x5, schema 4, UTF-8, version-valid-for 15
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2D85F72862B55C4EADD9E66E06947F3D
Certificate, Version=3
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2D85F72862B55C4EADD9E66E06947F3D
data
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\ACROBAT_READER_MASTER_SURFACEID
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Home_View_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_READER_LAUNCH_CARD
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Edit_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Home_LHP_Trial_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_More_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Intent_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Sign_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Upsell_Cards
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\Edit_InApp_Aug2020
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.json
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents
SQLite 3.x database, last written using SQLite version 3040000, file counter 25, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 25
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\UserCache64.bin
data
dropped
C:\Users\user\AppData\Local\Temp\MSI89e78.LOG
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-11-19 13-10-34-314.log
ASCII text, with very long lines (393)
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
ASCII text, with very long lines (393), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\acroNGLLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\0f4fa326-389e-44f6-a702-d3fa71e5c621.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\6755b427-5b51-4869-a857-c486c9b7286a.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\71629ce6-62d3-4993-b0cf-dcfbe47df9f0.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\a70f60fb-2512-4cf0-b69d-e0c76be9bfe9.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
dropped
Chrome Cache Entry: 180
ASCII text, with very long lines (47671)
dropped
Chrome Cache Entry: 181
HTML document, ASCII text, with very long lines (1899)
dropped
Chrome Cache Entry: 182
HTML document, ASCII text, with very long lines (1899)
downloaded
Chrome Cache Entry: 183
HTML document, ASCII text, with very long lines (1928)
dropped
Chrome Cache Entry: 184
PNG image data, 83 x 70, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 185
ASCII text, with very long lines (47671)
downloaded
Chrome Cache Entry: 186
PNG image data, 83 x 70, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 187
PNG image data, 3 x 14, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 188
PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 189
JSON data
downloaded
Chrome Cache Entry: 190
PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 191
PNG image data, 3 x 14, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 192
HTML document, ASCII text, with very long lines (1899)
downloaded
There are 51 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Desktop\Benefit Enrollment -eGz8VNb.pdf"
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2104 --field-trial-handle=1732,i,7714648761877247160,7961968314336223601,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://a2e99d6c.eab6dee9caec6702bc512ed3.workers.dev/?qrc=eric.walker@hess.com
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 --field-trial-handle=1984,i,8502380922731674951,2464648522013259795,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://a2e99d6c.eab6dee9caec6702bc512ed3.workers.dev/?qrc=eric.walker@hess.com
malicious
https://a2e99d6c.eab6dee9caec6702bc512ed3.workers.dev/favicon.ico
188.114.97.3
malicious
https://iuutytryrtserttytuiyiuoyutyrtyrtsdtyfyuguiguyftyfyugiouyuty.sbs/?ovsgbqtp&qrc=eric.walker
unknown
http://x1.i.lencr.org/
unknown
https://www.adobe.co
unknown
https://challenges.cloudflare.com/turnstile/v0/b/22755d9a86c9/api.js
104.18.95.41
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/cmg/1
104.18.95.41
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/flow/ov1/2061854957:1732038667:nRZWDvScghp2dUc660fuxckeN6uS0GjWC3MCimVS8fc/8e522bb609808ce9/B5MBcCYRfg8rjASyIcgMJrpzRPanI0s3KUfllIxQjGg-1732039970-1.1.1.1-a0ydCZmK9F7UohFUliIxDOL4wjyhFCdyh4alJ4WsNC9qwrBwMnoJGbWakyNgptD9
104.18.95.41
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/flow/ov1/2089445859:1732038507:ttJ0GF6P0Hkzdi09vftPkaFkFLOUxsm04FosCv6RpSo/8e52289cfa4e7c8e/cKZOaGqI61zSkk5zEiRvEns2NTxtGhWSM45GnK_VKcs-1732039843-1.1.1.1-J44skPmXSsLrIxyeeXb.bhtLNNfhFKgyDTM9U_wNL24R2n_KjByscRN9B8u0XEjA
104.18.95.41
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/i/8e52289cfa4e7c8e/1732039845489/QM4S8em3jZX8Gp8
104.18.95.41
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/orchestrate/chl_api/v1?ray=8e522bb609808ce9&lang=auto
104.18.95.41
https://iuutytryrtserttytuiyiuoyutyrtyrtsdtyfyuguiguyftyfyugiouy.icu/mail/?login_hint=eric.walker%40hess.com
185.161.251.123
https://iuutytryrtserttytuiyiuoyutyrtyrtsdtyfyuguiguyftyfyugiouyuty.sbs/?ovsgbqtp=894d730250e47a6b81a79bf1afef63cdc08ef88956cdf4d51fe024f6b842b064938879244aeaf87f96cb8e11fbec56f9e4953e1eba15ff0f6d75c820060227e4&qrc=eric.walker%40hess.com
185.161.251.123
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/i/8e522bb609808ce9/1732039972172/gNDM1rOvY1-nGCH
104.18.95.41
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/orchestrate/chl_api/v1?ray=8e52289cfa4e7c8e&lang=auto
104.18.95.41
https://iuutytryrtserttytuiyiuoyutyrtyrtsdtyfyuguiguyftyfyugiouy.icu/?dataXX0=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1cmwiOiJodHRwczovL2l1dXR5dHJ5cnRzZXJ0dHl0dWl5aXVveXV0eXJ0eXJ0c2R0eWZ5dWd1aWd1eWZ0eWZ5dWdpb3V5LmljdS8iLCJkb21haW4iOiJpdXV0eXRyeXJ0c2VydHR5dHVpeWl1b3l1dHlydHlydHNkdHlmeXVndWlndXlmdHlmeXVnaW91eS5pY3UiLCJrZXkiOiJjaHZDTjNJNVFmUmkiLCJxcmMiOiJlcmljLndhbGtlckBoZXNzLmNvbSIsImlhdCI6MTczMjAzOTk4OCwiZXhwIjoxNzMyMDQwMTA4fQ.LbT8NfCanuyVBzJKI0UT2dhh1PYOQTKsJjVyrt2NFxc
185.161.251.123
https://iuutytryrtserttytuiyiuoyutyrtyrtsdtyfyuguiguyftyfyugiouyuty.sbs/?ovsgbqtp
unknown
https://iuutytryrtserttytuiyiuoyutyrtyrtsdtyfyuguiguyftyfyugiouy.icu/?dataXX0=eyJhbGciOiJIUzI1NiIsIn
unknown
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/pat/8e52289cfa4e7c8e/1732039845495/b3f3b5bf9d448f5b2d64f518aff043aa6347c1f90136e4cb8d7d5b7d7276719f/GdvQt1dcqyebZGE
104.18.95.41
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/pat/8e522bb609808ce9/1732039972177/899f201dfbf52fd2e2849d45316c4b7674b09fe94e97964bb48d23a25b8623c3/VXamP5cK4pJPv_9
104.18.95.41
https://challenges.cloudflare.com/turnstile/v0/api.js?onload=onloadTurnstileCallback
104.18.95.41
https://iuutytryrtserttytuiyiuoyutyrtyrtsdtyfyuguiguyftyfyugiouyuty.sbs/?ovsgbqtp&qrc=eric.walker@hess.com
185.161.251.123
https://iuutytryrtserttytuiyiuoyutyrtyrtsdtyfyuguiguyftyfyugiouy.icu/?qrc=eric.walker%40hess.com
185.161.251.123
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/3mdhf/0x4AAAAAAA0DCVK2ZhZ9Susl/auto/fbE/normal/auto/
104.18.95.41
There are 14 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
a2e99d6c.eab6dee9caec6702bc512ed3.workers.dev
188.114.97.3
malicious
iuutytryrtserttytuiyiuoyutyrtyrtsdtyfyuguiguyftyfyugiouy.icu
185.161.251.123
bg.microsoft.map.fastly.net
199.232.214.172
iuutytryrtserttytuiyiuoyutyrtyrtsdtyfyuguiguyftyfyugiouyuty.sbs
185.161.251.123
challenges.cloudflare.com
104.18.95.41
www.google.com
142.250.185.196
x1.i.lencr.org
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.7
unknown
unknown
malicious
188.114.97.3
a2e99d6c.eab6dee9caec6702bc512ed3.workers.dev
European Union
malicious
185.161.251.123
iuutytryrtserttytuiyiuoyutyrtyrtsdtyfyuguiguyftyfyugiouy.icu
United Kingdom
104.18.95.41
challenges.cloudflare.com
United States
239.255.255.250
unknown
Reserved
54.144.73.197
unknown
United States
142.250.185.196
www.google.com
United States
23.203.104.175
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
aFS
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tDIText
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tFileName
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tFileSource
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sFileAncestors
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sDI
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sDate
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
uFileSize
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
uPageCount
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sAssetId
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
bisSharedFile
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
aFS
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
tDIText
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
tFileName
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sFileAncestors
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sDI
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sDate
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
uFileSize
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
uPageCount
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
bisSharedFile
There are 10 hidden registries, click here to show them.

DOM / HTML

URL
Malicious
https://a2e99d6c.eab6dee9caec6702bc512ed3.workers.dev/?qrc=eric.walker@hess.com
https://a2e99d6c.eab6dee9caec6702bc512ed3.workers.dev/?qrc=eric.walker@hess.com
https://a2e99d6c.eab6dee9caec6702bc512ed3.workers.dev/?qrc=eric.walker@hess.com