IOC Report
Salary_Increase_Approval_Open_Enrollment_2024.zip

loading gif

Files

File Path
Type
Category
Malicious
Salary_Increase_Approval_Open_Enrollment_2024.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
initial sample
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\91b13d97-01e4-4603-9b00-727b0850ec36.tmp
JSON data
modified
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
SQLite 3.x database, last written using SQLite version 3040000, file counter 11, database pages 21, cookie 0x5, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2D85F72862B55C4EADD9E66E06947F3D
Certificate, Version=3
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2D85F72862B55C4EADD9E66E06947F3D
data
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt23.lst.6176
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt23.lst (copy)
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.json
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents
SQLite 3.x database, last written using SQLite version 3040000, file counter 23, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 23
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Temp\MSI33a65.LOG
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-10-25 09-30-29-345.log
ASCII text, with very long lines (393)
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
ASCII text, with very long lines (393), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\acroNGLLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\0591babf-1571-4538-94c4-3784dd0de0c5.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\586d6d0c-b793-4cd6-9b18-ca9f1bf41224.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\c83c5a7f-dda1-4359-8adb-8c3526925af5.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\ca515153-bdc4-4b51-b158-7a832f847420.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 160932
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\f03dd8f8-c467-49e8-b5a6-72c7977c49b1.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 25 12:30:31 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 25 12:30:31 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:54:41 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 25 12:30:30 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 25 12:30:31 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 25 12:30:30 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 151
ASCII text, with very long lines (2608)
dropped
Chrome Cache Entry: 152
JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, baseline, precision 8, 868x169, components 3
dropped
Chrome Cache Entry: 153
JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, baseline, precision 8, 868x169, components 3
downloaded
Chrome Cache Entry: 154
GIF image data, version 89a, 868 x 14
downloaded
Chrome Cache Entry: 155
GIF image data, version 89a, 868 x 4
dropped
Chrome Cache Entry: 156
PNG image data, 150 x 150, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 157
GIF image data, version 89a, 868 x 14
dropped
Chrome Cache Entry: 158
HTML document, ASCII text
downloaded
Chrome Cache Entry: 159
PNG image data, 150 x 150, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 160
ASCII text, with very long lines (2608)
downloaded
Chrome Cache Entry: 161
GIF image data, version 89a, 868 x 4
downloaded
Chrome Cache Entry: 162
HTML document, ASCII text
downloaded
There are 39 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\Temp1_Salary_Increase_Approval_Open_Enrollment_2024.zip\Salary_Increase_Approval_Open_Enrollment_202440943.pdf"
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://authrcni.rcn.org.uk/simplesaml/module.php/authrcnssoapi/redirect_login_state.php?spentityid=https%3A//journals.rcni.com/saml/metadata.action&RelayState=https://grandmaraissegwaytours.com/wp-services/404#jun_miyazawa+Iamgold.com
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2288 --field-trial-handle=1588,i,4446440725060870792,4375099241188172724,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2396 --field-trial-handle=2208,i,2063558197444806222,13888880926085695664,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://grandmaraissegwaytours.com/cgi-sys/images/w.png
192.185.113.79
https://grandmaraissegwaytours.com/favicon.ico
192.185.113.79
http://x1.i.lencr.org/
unknown
https://grandmaraissegwaytours.com/cgi-sys/images/404bottom.gif
192.185.113.79
https://grandmaraissegwaytours.com/cgi-sys/images/404top_w.jpg
192.185.113.79
https://grandmaraissegwaytours.com/wp-services/404#
https://grandmaraissegwaytours.com/wp-services/404#jun_miyazawa+Iamgold.com
http://code.jquery.com/jquery-3.3.1.min.js
unknown
https://authrcni.rcn.org.uk/simplesaml/module.php/authrcnssoapi/redirect_login_state.php?spentityid=https%3A//journals.rcni.com/saml/metadata.action&RelayState=https://grandmaraissegwaytours.com/wp-services/404
51.11.42.226
https://grandmaraissegwaytours.com/cgi-sys/images/404mid.gif
192.185.113.79
http://gmpg.org/xfn/11
unknown
https://grandmaraissegwaytours.com/wp-services/404
192.185.113.79
There are 2 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
grandmaraissegwaytours.com
192.185.113.79
www.google.com
142.250.185.196
agw-dl-gateway-01.rcn.org.uk
51.11.42.226
x1.i.lencr.org
unknown
authrcni.rcn.org.uk
unknown

IPs

IP
Domain
Country
Malicious
51.11.42.226
agw-dl-gateway-01.rcn.org.uk
United Kingdom
192.168.2.17
unknown
unknown
239.255.255.250
unknown
Reserved
142.250.185.196
www.google.com
United States
192.168.2.15
unknown
unknown
192.185.113.79
grandmaraissegwaytours.com
United States
96.7.168.138
unknown
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
199F74A0000
heap
page read and write
199F7670000
heap
page read and write
199F7755000
heap
page read and write
65F7DEE000
stack
page read and write
199F90D0000
heap
page read and write
199F7750000
heap
page read and write
65F7D6F000
stack
page read and write
65F7CEC000
stack
page read and write
199F7690000
heap
page read and write
65F807E000
stack
page read and write
199F7490000
heap
page read and write
199F74A8000
heap
page read and write
There are 2 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://grandmaraissegwaytours.com/wp-services/404#jun_miyazawa+Iamgold.com
https://grandmaraissegwaytours.com/wp-services/404#