Windows
Analysis Report
Request for corporate Gifts.pdf
Overview
General Information
Detection
Score: | 0 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
- System is w10x64native
- AcroRd32.exe (PID: 5540 cmdline:
"C:\Progra m Files (x 86)\Adobe\ Acrobat Re ader DC\Re ader\AcroR d32.exe" " C:\Users\u ser\Deskto p\Request for corpor ate Gifts. pdf" MD5: 6791EAE6124B58F201B32F1F6C3EC1B0)
- cleanup
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | String found in binary or memory: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Initial sample: | ||
Source: | Initial sample: |
Source: | Initial sample: |
Source: | Initial sample: |
Source: | Initial sample: |
Source: | Process information set: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | 1 Process Injection | 1 Masquerading | OS Credential Dumping | 1 Process Discovery | Remote Services | Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Process Injection | LSASS Memory | 1 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | unknown |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1541325 |
Start date and time: | 2024-10-24 17:33:22 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 21s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowspdfcookbook.jbs |
Analysis system description: | Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 128, Firefox 91, Adobe Reader DC 21, Java 8 Update 301 |
Number of analysed new started processes analysed: | 3 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Request for corporate Gifts.pdf |
Detection: | CLEAN |
Classification: | clean0.winPDF@2/6@0/0 |
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe
- Excluded IPs from analysis (whitelisted): 23.55.235.163, 23.55.235.178, 23.55.235.184, 23.55.235.170, 23.55.235.171, 23.55.235.176, 23.55.235.179, 23.55.235.169, 23.55.235.177, 23.54.127.40, 23.54.127.37, 23.55.235.233, 23.55.235.248, 23.54.161.99, 23.54.161.82, 23.55.235.242, 23.55.235.243, 23.55.235.168, 23.54.161.90
- Excluded domains from analysis (whitelisted): acroipm2.adobe.com.edgesuite.net, a122.dscd.akamai.net, acroipm2.adobe.com, dns.msftncsi.com
- VT rate limit hit for: Request for corporate Gifts.pdf
Input | Output |
---|---|
URL: PDF document Model: claude-3-haiku-20240307 | ```json { "contains_trigger_text": true, "trigger_text": "Please complete the following and return by email, mail, fax or in person to: serviceOakville@oakville.ca, Town of Oakville, 1225 Trafalgar Road, Oakville, ON L6J 5A6", "prominent_button_name": "unknown", "text_input_field_labels": [ "Date of request", "Name of organization", "Type of organization", "Participants of event", "The corporate gifts will be used for", "Item(s) being requested:", "How did you hear about our corporate gift program?", "Contact name", "Telephone #", "Address" ], "pdf_icon_visible": false, "has_visible_captcha": false, "has_urgent_text": false, "has_visible_qrcode": false } |
URL: PDF document Model: claude-3-haiku-20240307 | ```json { "brands": [ "Oakville" ] } |
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-241024153534Z-164.bmp
Download File
Process: | C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 111014 |
Entropy (8bit): | 2.087211027281178 |
Encrypted: | false |
SSDEEP: | 1536:VNfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffW:VN6Dh |
MD5: | B9688661BF8AD142AB9A7BCEC39DCA7B |
SHA1: | 3A505E2A133B27A047B0570CC85F34F04873D9CD |
SHA-256: | 695C09807C27006DA97DD53B19CD48808C2035BE80CCA909F96544FB4B447639 |
SHA-512: | 17D48C6D8BF66C49726DF50DB532C454CA01C7BFE6CE248CF4B206DD784B9CFAF696D6BE38F659B4E20ECEC4228F1178720B79412F9C60DF5F1CC13D6C7A3588 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 69632 |
Entropy (8bit): | 4.361275209567427 |
Encrypted: | false |
SSDEEP: | 384:eeETh6tEL38/GGN5ptmGQen3xx2ZszKhivC5vxwRv0ZsLRGV:7clGpBgZs/l0ZsLU |
MD5: | 5310A96DFA22AFA7BB8F54A2B0E9B8C8 |
SHA1: | 9AC230DC6E722DF8D5E0844291DE5B918E8A8798 |
SHA-256: | 4B1EA64D3D752F3216E796560BDD47D7CDCCD090F8F8A8B6F95F43280DE0DA30 |
SHA-512: | 330FFD6D1D27FF24B66CF1C1466917A05308CEBA4E3A10CEB84415A985626CDCCA4970810C7E09EC35A9D5912DED89868164AE2339828505C406256F5DB89ECF |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8720 |
Entropy (8bit): | 3.4861651418915374 |
Encrypted: | false |
SSDEEP: | 48:7MxOiol1xCol1sol1Q2iolVXiolsol1Nol1Aiol1fOiol1fEMol1C8ol1D5iolaB:7rXpXFQPBun9IVXEBodRBk7 |
MD5: | 42A0EE73EC17C08B99A4E5CCCD9BDB41 |
SHA1: | 2B3BBC66C31B1C9EB1AFD402DCCA7BC45ADEC6CD |
SHA-256: | 05EA647903F34C839856E1BA8A31593F63B84CA4270A39C003E26F43BF196392 |
SHA-512: | C5ACC1F7918EA4EAD6F5D28E8B26205EF793EDA06633F1EACEF8C8ADFE644D667A2A6ABAE6319B7E36DBF3AAF649C70C2609C97AF345B5D2B8B424F447338C50 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4 |
Entropy (8bit): | 0.8112781244591328 |
Encrypted: | false |
SSDEEP: | 3:e:e |
MD5: | DC84B0D741E5BEAE8070013ADDCC8C28 |
SHA1: | 802F4A6A20CBF157AAF6C4E07E4301578D5936A2 |
SHA-256: | 81FF65EFC4487853BDB4625559E69AB44F19E0F5EFBD6D5B2AF5E3AB267C8E06 |
SHA-512: | 65D5F2A173A43ED2089E3934EB48EA02DD9CCE160D539A47D33A616F29554DBD7AF5D62672DA1637E0466333A78AAA023CBD95846A50AC994947DC888AB6AB71 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 945 |
Entropy (8bit): | 5.065419592949336 |
Encrypted: | false |
SSDEEP: | 12:YFqxBoC22502+Otv22E3CyMCV+t8oxwZKg2Ak36SK/0igly8jkE5ksoJSnONs:YFuF2NO2LSZCgq+/URAjzROG |
MD5: | 59F84FA0D43B74D809AE1C3F3D667847 |
SHA1: | 3F636009EF1CA5A1A0A2CA893901348BE4AF56ED |
SHA-256: | 93FEE19EECD387BAA64D6DED33E04DA7FA90512050675F5C12A4C241B1FB67FF |
SHA-512: | 7632D7E3643EA7279DAD2166C585CAD4ED93F774EE71ADF6B783E8B915BFE8F6BD6E924D815F46E2AF77381D9CD9B5D15DA97A537817D10F252C6ADCFC987A17 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 40393 |
Entropy (8bit): | 5.518083145564749 |
Encrypted: | false |
SSDEEP: | 384:K7X4oyVFMqHBC6Q2DvrDYvm8eZnstUA+UdJYNg7y:KT4oyVFMwBDQorDYvm8O9A5jYyu |
MD5: | 3A34DE985FFF9FD75C994DC83DC3550D |
SHA1: | FBE00658F00794C56758EA41A38043068B7524CF |
SHA-256: | 8419630FEB9FFCB9EB0FD36CA855C964BE1AEA01C34EC24E1DE36F8AF6006DB0 |
SHA-512: | 33C7A856AF0D7470EEA54C8DDE1A78DCCEB1BE69EAAEE8D1C69A16237C1BDE92AEE3EED2D76A13A3B0FD8A5DECF9B0ED622393994608BF6497564AF7999A2767 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.971789418677254 |
TrID: |
|
File name: | Request for corporate Gifts.pdf |
File size: | 254'829 bytes |
MD5: | f1609805b3682c3a139a3425e3ac561b |
SHA1: | 2a4f73342591567e62e7d4523e83e3210b5ebf68 |
SHA256: | 7431804982501ebd1d190f322c85cf022db6bcd47fd94ee807171763164f08b5 |
SHA512: | 2a104207426b6f81e7da985305f861433c92ea72827796cd05b88160eb1f047fb27ab1cc977d9d0d3eb736497b35eb221072732af96c93c2a4c9964392abdfe7 |
SSDEEP: | 6144:hURyq8s0z9yP1VkYd3VP/xlVcYHjzOA4/sz:3sN1aIdTVcYHjzOtk |
TLSH: | C74402666762F622803B863D12511E3AD0ED3383396D2659794E8F7FE721C33D093A93 |
File Content Preview: | %PDF-1.7.%......7 0 obj.<</Linearized 1/L 254829/O 9/E 251000/N 1/T 254538/H [ 621 215]>>.endobj. ..51 0 obj.<</DecodeParms<</Columns 5/Predictor 12>>/Filter/FlateDecode/ID[<4ED95DFF50A871E191F3E6425F96FC36><758DB5A24247E5488017FD2956202B6 |
Icon Hash: | 62cc8caeb29e8ae0 |
General | |
---|---|
Header: | %PDF-1.7 |
Total Entropy: | 7.971789 |
Total Bytes: | 254829 |
Stream Entropy: | 7.980582 |
Stream Bytes: | 245602 |
Entropy outside Streams: | 5.322037 |
Bytes outside Streams: | 9227 |
Number of EOF found: | 2 |
Bytes after EOF: |
Name | Count |
---|---|
obj | 50 |
endobj | 50 |
stream | 47 |
endstream | 47 |
xref | 0 |
trailer | 0 |
startxref | 2 |
/Page | 1 |
/Encrypt | 0 |
/ObjStm | 3 |
/URI | 0 |
/JS | 0 |
/JavaScript | 0 |
/AA | 0 |
/OpenAction | 0 |
/AcroForm | 0 |
/JBIG2Decode | 0 |
/RichMedia | 0 |
/Launch | 0 |
/EmbeddedFile | 0 |
Image Streams |
---|
ID | DHASH | MD5 | Preview |
---|---|---|---|
48 | 0101010101010101 | 8a202b5c9a57a136c09563412f57488f | |
49 | 0000000000000000 | a4faf2bb222bf3529b419083b36e1671 | |
50 | c0606890c8987060 | 67c1c71b6f879ae39b7a5f798063ff12 |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 11:35:29 |
Start date: | 24/10/2024 |
Path: | C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x6e0000 |
File size: | 3'014'368 bytes |
MD5 hash: | 6791EAE6124B58F201B32F1F6C3EC1B0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |