Windows Analysis Report
maliciouspdf.pdf

Overview

General Information

Sample name: maliciouspdf.pdf
Analysis ID: 1501488
MD5: fea26c05a0e34c85dcace36d02ecac9f
SHA1: 8160f922fdb287274a5962ed49d9e62b7d1b24d8
SHA256: f161a489dd4aa6e48c77717deae162f52b917da5550fde450d1bfb3e154a3dfc
Infos:

Detection

Score: 60
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
IP address seen in connection with other malware
PDF has an OpenAction (likely to launch a dropper script)
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication

Classification

AV Detection

barindex
Source: maliciouspdf.pdf Avira: detected
Source: maliciouspdf.pdf ReversingLabs: Detection: 73%
Source: maliciouspdf.pdf Joe Sandbox ML: detected
Source: global traffic DNS query: name: 18.31.95.13.in-addr.arpa
Source: global traffic TCP traffic: 192.168.2.7:49717 -> 23.56.162.185:443
Source: global traffic TCP traffic: 192.168.2.7:49717 -> 23.56.162.185:443
Source: global traffic TCP traffic: 192.168.2.7:49717 -> 23.56.162.185:443
Source: global traffic TCP traffic: 192.168.2.7:49717 -> 23.56.162.185:443
Source: global traffic TCP traffic: 192.168.2.7:49717 -> 23.56.162.185:443
Source: global traffic TCP traffic: 192.168.2.7:49717 -> 23.56.162.185:443
Source: global traffic TCP traffic: 192.168.2.7:49717 -> 23.56.162.185:443
Source: global traffic TCP traffic: 192.168.2.7:49717 -> 23.56.162.185:443
Source: global traffic TCP traffic: 192.168.2.7:49717 -> 23.56.162.185:443
Source: global traffic TCP traffic: 192.168.2.7:49717 -> 23.56.162.185:443
Source: global traffic TCP traffic: 192.168.2.7:49717 -> 23.56.162.185:443
Source: global traffic TCP traffic: 192.168.2.7:49717 -> 23.56.162.185:443
Source: global traffic TCP traffic: 23.56.162.185:443 -> 192.168.2.7:49717
Source: global traffic TCP traffic: 192.168.2.7:49717 -> 23.56.162.185:443
Source: global traffic TCP traffic: 192.168.2.7:49717 -> 23.56.162.185:443
Source: global traffic TCP traffic: 23.56.162.185:443 -> 192.168.2.7:49717
Source: global traffic TCP traffic: 23.56.162.185:443 -> 192.168.2.7:49717
Source: global traffic TCP traffic: 192.168.2.7:49717 -> 23.56.162.185:443
Source: global traffic TCP traffic: 23.56.162.185:443 -> 192.168.2.7:49717
Source: global traffic TCP traffic: 23.56.162.185:443 -> 192.168.2.7:49717
Source: global traffic TCP traffic: 192.168.2.7:49717 -> 23.56.162.185:443
Source: global traffic TCP traffic: 192.168.2.7:49717 -> 23.56.162.185:443
Source: global traffic TCP traffic: 23.56.162.185:443 -> 192.168.2.7:49717
Source: global traffic TCP traffic: 192.168.2.7:49717 -> 23.56.162.185:443
Source: global traffic TCP traffic: 23.56.162.185:443 -> 192.168.2.7:49717
Source: global traffic TCP traffic: 192.168.2.7:49717 -> 23.56.162.185:443
Source: global traffic TCP traffic: 23.56.162.185:443 -> 192.168.2.7:49717
Source: global traffic TCP traffic: 192.168.2.7:49717 -> 23.56.162.185:443
Source: global traffic TCP traffic: 23.56.162.185:443 -> 192.168.2.7:49717
Source: global traffic TCP traffic: 23.56.162.185:443 -> 192.168.2.7:49717
Source: global traffic TCP traffic: 192.168.2.7:49717 -> 23.56.162.185:443
Source: global traffic TCP traffic: 192.168.2.7:49717 -> 23.56.162.185:443
Source: global traffic TCP traffic: 23.56.162.185:443 -> 192.168.2.7:49717
Source: Joe Sandbox View IP Address: 23.56.162.185 23.56.162.185
Source: global traffic HTTP traffic detected: GET /onboarding/smskillreader.txt HTTP/1.1Host: armmf.adobe.comConnection: keep-aliveAccept-Language: en-US,en;q=0.9User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) ReaderServices/23.6.20320 Chrome/105.0.0.0 Safari/537.36Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brIf-None-Match: "78-5faa31cce96da"If-Modified-Since: Mon, 01 May 2023 15:02:33 GMT
Source: unknown TCP traffic detected without corresponding DNS query: 23.56.162.185
Source: unknown TCP traffic detected without corresponding DNS query: 23.56.162.185
Source: unknown TCP traffic detected without corresponding DNS query: 23.56.162.185
Source: unknown TCP traffic detected without corresponding DNS query: 23.56.162.185
Source: unknown TCP traffic detected without corresponding DNS query: 23.56.162.185
Source: unknown TCP traffic detected without corresponding DNS query: 23.56.162.185
Source: unknown TCP traffic detected without corresponding DNS query: 23.56.162.185
Source: unknown TCP traffic detected without corresponding DNS query: 23.56.162.185
Source: unknown TCP traffic detected without corresponding DNS query: 23.56.162.185
Source: unknown TCP traffic detected without corresponding DNS query: 23.56.162.185
Source: unknown TCP traffic detected without corresponding DNS query: 23.56.162.185
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic HTTP traffic detected: GET /onboarding/smskillreader.txt HTTP/1.1Host: armmf.adobe.comConnection: keep-aliveAccept-Language: en-US,en;q=0.9User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) ReaderServices/23.6.20320 Chrome/105.0.0.0 Safari/537.36Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brIf-None-Match: "78-5faa31cce96da"If-Modified-Since: Mon, 01 May 2023 15:02:33 GMT
Source: global traffic DNS traffic detected: DNS query: 18.31.95.13.in-addr.arpa
Source: E0F5C59F9FA661F6F4C50B87FEF3A15A0.2.dr String found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c
Source: 77EC63BDA74BD0D0E0426DC8F80085060.2.dr String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: ReaderMessages.0.dr String found in binary or memory: https://www.adobe.co
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49717
Source: unknown Network traffic detected: HTTP traffic on port 49717 -> 443
Source: classification engine Classification label: mal60.winPDF@14/48@1/1
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe File created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt23.lst.5420 Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe File created: C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-08-29 18-37-32-677.log Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA Jump to behavior
Source: maliciouspdf.pdf ReversingLabs: Detection: 73%
Source: unknown Process created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Desktop\maliciouspdf.pdf"
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe Process created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2260 --field-trial-handle=1744,i,11800254572130627882,10832229251146507829,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe Process created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215 Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2260 --field-trial-handle=1744,i,11800254572130627882,10832229251146507829,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8 Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process created: unknown unknown Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: maliciouspdf.pdf Initial sample: PDF keyword /EmbeddedFile count = 0
Source: maliciouspdf.pdf Initial sample: PDF keyword /OpenAction
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs