IOC Report
FIR-069114.pdf

loading gif

Files

File Path
Type
Category
Malicious
FIR-069114.pdf
PDF document, version 1.4, 1 pages
initial sample
malicious
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\ec9cc983-991e-484a-8e68-8b77ff28b51e.tmp
JSON data
modified
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-241008114832Z-158.bmp
PC bitmap, Windows 3.x format, 107 x -152 x 32, cbSize 65110, bits offset 54
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2D85F72862B55C4EADD9E66E06947F3D
Certificate, Version=3
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2D85F72862B55C4EADD9E66E06947F3D
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\IconCacheAcro65536.dat
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.json
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents
SQLite 3.x database, last written using SQLite version 3040000, file counter 19, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 19
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Temp\MSI154ab.LOG
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-10-08 07-48-30-490.log
ASCII text, with very long lines (393)
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
ASCII text, with very long lines (393), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\acroNGLLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\198b73b3-a592-4c3e-b2dd-767ed0cedded.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\58c1cf09-42cd-461c-8737-c26415801d11.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\9dbc992d-fe27-4afb-a8f0-1d6b81b16193.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\ad1ab08a-68a8-4b35-8151-34893b18fe1d.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 8 10:48:55 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 8 10:48:55 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 8 10:48:55 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 8 10:48:55 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 8 10:48:55 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 190
ASCII text, with very long lines (65447)
downloaded
Chrome Cache Entry: 191
XML 1.0 document, ASCII text
downloaded
Chrome Cache Entry: 192
ASCII text, with very long lines (65447)
dropped
Chrome Cache Entry: 193
ASCII text, with very long lines (47261)
dropped
Chrome Cache Entry: 194
HTML document, Unicode text, UTF-8 text, with very long lines (3395), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 195
ASCII text, with very long lines (47992), with no line terminators
dropped
Chrome Cache Entry: 196
ASCII text, with very long lines (47261)
downloaded
Chrome Cache Entry: 197
HTML document, ASCII text, with very long lines (491), with CRLF line terminators
dropped
Chrome Cache Entry: 198
ASCII text, with very long lines (47992), with no line terminators
downloaded
There are 31 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Desktop\FIR-069114.pdf"
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2100 --field-trial-handle=1636,i,14502371201210557477,18297061268439937656,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "https://ui83ir9eoifdeoi.s3.ap-northeast-2.amazonaws.com/Y8683YUIEF9URORUH9S0IPT40EGG8YTI43RGJ0EPEFWORE8IUGRJEMMPR.html#Jalastair.campbell@charlestaylor.com"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1996,i,14496368495748628264,14070614855839226263,262144 /prefetch:8

URLs

Name
IP
Malicious
https://ui83ir9eoifdeoi.s3.ap-northeast-2.amazonaws.com/Y8683YUIEF9URORUH9S0IPT40EGG8YTI43RGJ0EPEFWORE8IUGRJEMMPR.html#Jalastair.campbell@charlestaylor.com
malicious
http://x1.i.lencr.org/
unknown
https://challenges.cloudflare.com/turnstile/v0/g/ec4b873d446c/api.js
104.18.94.41
https://cdn.jsdelivr.net/npm/bootstrap
unknown
https://code.jquery.com/jquery-3.6.0.min.js
151.101.2.137
https://ui83ir9eoifdeoi.s3.ap-northeast-2.amazonaws.com/,
3.5.184.28
https://viberbrowser.ru//
104.21.18.218
https://viberbrowser.ru/#electric-vehicles
unknown
https://challenges.cloudflare.com/turnstile/v0/api.js
104.18.94.41
https://ui83ir9eoifdeoi.s3.ap-northeast-2.amazonaws.com/favicon.ico
3.5.184.28
https://viberbrowser.ru/#
unknown
https://viberbrowser.ru/#contact
unknown
https://viberbrowser.ru/#modern-supercars
unknown
https://ui83ir9eoifdeoi.s3.ap-northeast-2.amazonaws.com/Y8683YUIEF9URORUH9S0IPT40EGG8YTI43RGJ0EPEFWO
unknown
https://viberbrowser.ru/#privacy
unknown
https://viberbrowser.ru/#classic-cars
unknown
https://viberbrowser.ru/#faq
unknown
https://viberbrowser.ru///8404.php
104.21.18.218
https://viberbrowser.ru/#learn-more
unknown
https://cdnjs.cloudflare.com/ajax/libs/font-awesome/6.5.0/css/all.min.css
unknown
https://viberbrowser.ru/#terms
unknown
https://viberbrowser.ru/#services
unknown
https://ui83ir9eoifdeoi.s3.ap-northeast-2.amazonaws.com/Y8683YUIEF9URORUH9S0IPT40EGG8YTI43RGJ0EPEFWORE8IUGRJEMMPR.html
3.5.184.28
https://cdnjs.cloudflare.com/ajax/libs/crypto-js/4.0.0/crypto-js.min.js
104.17.25.14
https://viberbrowser.ru/#about
unknown
There are 15 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
code.jquery.com
151.101.2.137
viberbrowser.ru
104.21.18.218
cdnjs.cloudflare.com
104.17.25.14
challenges.cloudflare.com
104.18.94.41
www.google.com
142.250.186.68
s3-r-w.ap-northeast-2.amazonaws.com
3.5.184.28
x1.i.lencr.org
unknown
ui83ir9eoifdeoi.s3.ap-northeast-2.amazonaws.com
unknown

IPs

IP
Domain
Country
Malicious
104.21.18.218
viberbrowser.ru
United States
142.250.186.68
www.google.com
United States
104.118.8.172
unknown
United States
104.18.94.41
challenges.cloudflare.com
United States
3.5.184.28
s3-r-w.ap-northeast-2.amazonaws.com
United States
192.168.2.5
unknown
unknown
151.101.2.137
code.jquery.com
United States
239.255.255.250
unknown
Reserved
172.67.183.101
unknown
United States
151.101.194.137
unknown
United States
104.17.25.14
cdnjs.cloudflare.com
United States
There are 1 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
aFS
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tDIText
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tFileName
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tFileSource
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sFileAncestors
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sDI
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sDate
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
uFileSize
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
uPageCount
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sAssetId
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
bisSharedFile
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
aFS
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
tDIText
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
tFileName
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sFileAncestors
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sDI
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sDate
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
uFileSize
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
uPageCount
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
bisSharedFile
There are 10 hidden registries, click here to show them.

DOM / HTML

URL
Malicious
https://ui83ir9eoifdeoi.s3.ap-northeast-2.amazonaws.com/Y8683YUIEF9URORUH9S0IPT40EGG8YTI43RGJ0EPEFWORE8IUGRJEMMPR.html#Jalastair.campbell@charlestaylor.com
malicious
https://ui83ir9eoifdeoi.s3.ap-northeast-2.amazonaws.com/Y8683YUIEF9URORUH9S0IPT40EGG8YTI43RGJ0EPEFWORE8IUGRJEMMPR.html#Jalastair.campbell@charlestaylor.com