IOC Report
https://mandrillapp.com/track/click/30927070/cas.campaignagent.com.au?p=eyJzIjoiVlRwOUJ4TFJObEtnaWdoeEEyTDA0NlV5b19jIiwidiI6MSwicCI6IntcInVcIjozMDkyNzA3MCxcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL2Nhcy5jYW1wYWlnbmFnZW50LmNvbS5hdVxcXC9zdGF0ZW1lbnRcXFwvQ1BOLTkzMTU0MzdcXFwvcGRmXFxcL2ZhNzE4MTk5LTIxNDAt

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\783b1488-b0e5-43cc-8bc0-b5af4df9d8b9.tmp
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\7d45c0a7-e938-4c15-9e60-6701ecacc148.tmp
JSON data
modified
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State~RF59e974.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-241030175345Z-231.bmp
PC bitmap, Windows 3.x format, 107 x -152 x 32, cbSize 65110, bits offset 54
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
SQLite 3.x database, last written using SQLite version 3040000, file counter 15, database pages 21, cookie 0x5, schema 4, UTF-8, version-valid-for 15
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2D85F72862B55C4EADD9E66E06947F3D
Certificate, Version=3
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2D85F72862B55C4EADD9E66E06947F3D
data
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.json
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents
SQLite 3.x database, last written using SQLite version 3040000, file counter 25, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 25
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Temp\MSI9b14d.LOG
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-10-30 13-53-41-267.log
ASCII text, with very long lines (393)
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
ASCII text, with very long lines (393), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\acroNGLLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\2fe53555-8a45-4f78-b6d6-689a03bf606d.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\6f55c010-f5cf-4b5e-a2e6-5c17383aa54a.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\9f3380ea-ed8e-45aa-8e22-48161520a3d5.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\e2deb9e2-0889-4729-8e01-2929455f4fce.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
dropped
C:\Users\user\Downloads\51558a0d-89ab-4137-9733-8e51da9b3353.tmp
PDF document, version 1.4, 1 pages
dropped
C:\Users\user\Downloads\91b42b73-2bc2-4eef-962d-58e9192c94a6.tmp
PDF document, version 1.4, 1 pages
dropped
C:\Users\user\Downloads\CampaignStatementCPN-9315437ByCampaignAgent.pdf (copy)
PDF document, version 1.4, 1 pages
dropped
C:\Users\user\Downloads\CampaignStatementCPN-9315437ByCampaignAgent.pdf.crdownload
PDF document, version 1.4, 1 pages
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 --field-trial-handle=1688,i,18115914345492491375,6791516678454002641,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://mandrillapp.com/track/click/30927070/cas.campaignagent.com.au?p=eyJzIjoiVlRwOUJ4TFJObEtnaWdoeEEyTDA0NlV5b19jIiwidiI6MSwicCI6IntcInVcIjozMDkyNzA3MCxcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL2Nhcy5jYW1wYWlnbmFnZW50LmNvbS5hdVxcXC9zdGF0ZW1lbnRcXFwvQ1BOLTkzMTU0MzdcXFwvcGRmXFxcL2ZhNzE4MTk5LTIxNDAtNDY0MS04MDg2LWIyMTcwMDQzOTVhMT9zLXRva2VuPVdneGpZbiUyQmZKRE5qUnZNbklrVXYyc1NlcUFXWkdBUDdoUWU0VVBzYXN5cyUzRFwiLFwiaWRcIjpcImY1ZTkwOTBjYTI4YjQxZjU5ZjVlNmFmZjcyZmQ1MzgwXCIsXCJ1cmxfaWRzXCI6W1wiODZjNDc4ZDA5ZDAxNjZiM2ZlM2FlZjM5Y2EyNjU5Y2JkNmY2NzZmN1wiXX0ifQ"
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\CampaignStatementCPN-9315437ByCampaignAgent.pdf"
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2100 --field-trial-handle=1620,i,10596925692712065524,11621686264154264479,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8

URLs

Name
IP
Malicious
https://mandrillapp.com/track/click/30927070/cas.campaignagent.com.au?p=eyJzIjoiVlRwOUJ4TFJObEtnaWdoeEEyTDA0NlV5b19jIiwidiI6MSwicCI6IntcInVcIjozMDkyNzA3MCxcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL2Nhcy5jYW1wYWlnbmFnZW50LmNvbS5hdVxcXC9zdGF0ZW1lbnRcXFwvQ1BOLTkzMTU0MzdcXFwvcGRmXFxcL2ZhNzE4MTk5LTIxNDAtNDY0MS04MDg2LWIyMTcwMDQzOTVhMT9zLXRva2VuPVdneGpZbiUyQmZKRE5qUnZNbklrVXYyc1NlcUFXWkdBUDdoUWU0VVBzYXN5cyUzRFwiLFwiaWRcIjpcImY1ZTkwOTBjYTI4YjQxZjU5ZjVlNmFmZjcyZmQ1MzgwXCIsXCJ1cmxfaWRzXCI6W1wiODZjNDc4ZDA5ZDAxNjZiM2ZlM2FlZjM5Y2EyNjU5Y2JkNmY2NzZmN1wiXX0ifQ
https://cas.campaignagent.com.au/statement/CPN-9315437/pdf/fa718199-2140-4641-8086-b217004395a1?s-token=WgxjYn%2BfJDNjRvMnIkUv2sSeqAWZGAP7hQe4UPsasys%3D
13.211.59.59
http://x1.i.lencr.org/
unknown
https://www.adobe.co
unknown
https://chrome.cloudflare-dns.com/dns-query
172.64.41.3
https://mandrillapp.com/track/click/30927070/cas.campaignagent.com.au?p=eyJzIjoiVlRwOUJ4TFJObEtnaWdoeEEyTDA0NlV5b19jIiwidiI6MSwicCI6IntcInVcIjozMDkyNzA3MCxcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL2Nhcy5jYW1wYWlnbmFnZW50LmNvbS5hdVxcXC9zdGF0ZW1lbnRcXFwvQ1BOLTkzMTU0MzdcXFwvcGRmXFxcL2ZhNzE4MTk5LTIxNDAtNDY0MS04MDg2LWIyMTcwMDQzOTVhMT9zLXRva2VuPVdneGpZbiUyQmZKRE5qUnZNbklrVXYyc1NlcUFXWkdBUDdoUWU0VVBzYXN5cyUzRFwiLFwiaWRcIjpcImY1ZTkwOTBjYTI4YjQxZjU5ZjVlNmFmZjcyZmQ1MzgwXCIsXCJ1cmxfaWRzXCI6W1wiODZjNDc4ZDA5ZDAxNjZiM2ZlM2FlZjM5Y2EyNjU5Y2JkNmY2NzZmN1wiXX0ifQ
76.223.125.47
file:///C:/Users/user/Downloads/CampaignStatementCPN-9315437ByCampaignAgent.pdf

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.214.172
chrome.cloudflare-dns.com
172.64.41.3
mandrillapp.com
76.223.125.47
www.google.com
142.250.185.132
monolith-production-alb-1020186593.ap-southeast-2.elb.amazonaws.com
13.211.59.59
x1.i.lencr.org
unknown
cas.campaignagent.com.au
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.7
unknown
unknown
13.211.59.59
monolith-production-alb-1020186593.ap-southeast-2.elb.amazonaws.com
United States
142.250.185.132
www.google.com
United States
239.255.255.250
unknown
Reserved
76.223.125.47
mandrillapp.com
United States
96.7.168.138
unknown
United States
172.64.41.3
chrome.cloudflare-dns.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
aFS
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tDIText
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tFileName
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tFileSource
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sFileAncestors
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sDI
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sDate
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
uFileSize
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
uPageCount
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sAssetId
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
bisSharedFile
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
aFS
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
tDIText
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
tFileName
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sDI
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sDate
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
uFileSize
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
uPageCount
There are 8 hidden registries, click here to show them.

DOM / HTML

URL
Malicious
file:///C:/Users/user/Downloads/CampaignStatementCPN-9315437ByCampaignAgent.pdf
file:///C:/Users/user/Downloads/CampaignStatementCPN-9315437ByCampaignAgent.pdf