IOC Report
Mystery_Check.pdf

loading gif

Files

File Path
Type
Category
Malicious
Mystery_Check.pdf
PDF document, version 1.6, 0 pages
initial sample
malicious
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\d085bbf6-e62e-45d6-9d9a-acb35152fbfc.tmp
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-250115201126Z-194.bmp
PC bitmap, Windows 3.x format, 117 x -152 x 32, cbSize 71190, bits offset 54
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
SQLite 3.x database, last written using SQLite version 3040000, file counter 15, database pages 21, cookie 0x5, schema 4, UTF-8, version-valid-for 15
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2D85F72862B55C4EADD9E66E06947F3D
Certificate, Version=3
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2D85F72862B55C4EADD9E66E06947F3D
data
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\ACROBAT_READER_MASTER_SURFACEID
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Home_View_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_READER_LAUNCH_CARD
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Edit_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Home_LHP_Trial_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_More_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Intent_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Sign_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Upsell_Cards
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\Edit_InApp_Aug2020
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.json
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents
SQLite 3.x database, last written using SQLite version 3040000, file counter 25, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 25
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\UserCache64.bin
data
dropped
C:\Users\user\AppData\Local\Temp\MSIcc1ba.LOG
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2025-01-15 15-11-23-776.log
ASCII text, with very long lines (393)
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
ASCII text, with very long lines (393), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\acroNGLLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\1987b7a1-66f8-43af-9903-c3cecc2c8897.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\5b02d534-1fcf-47c7-86d4-5291330c8a0f.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\5fd023b2-ec60-43d1-a0df-4e0e23ed7696.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\60b45af5-49e0-494f-b617-00cd07c42186.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
dropped
Chrome Cache Entry: 190
RIFF (little-endian) data, Web/P image
downloaded
Chrome Cache Entry: 191
PNG image data, 986 x 555, 8-bit/color RGBA, interlaced
dropped
Chrome Cache Entry: 192
Web Open Font Format (Version 2), TrueType, length 9344, version 1.0
downloaded
Chrome Cache Entry: 193
PNG image data, 986 x 555, 8-bit/color RGBA, interlaced
downloaded
Chrome Cache Entry: 194
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 195
ASCII text, with very long lines (65447)
downloaded
Chrome Cache Entry: 196
ASCII text, with very long lines (1572)
downloaded
Chrome Cache Entry: 197
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 198
Web Open Font Format (Version 2), TrueType, length 17576, version 1.0
downloaded
Chrome Cache Entry: 199
Web Open Font Format (Version 2), TrueType, length 7728, version 1.0
downloaded
Chrome Cache Entry: 200
ASCII text, with very long lines (65371)
downloaded
Chrome Cache Entry: 201
HTML document, Unicode text, UTF-8 text, with very long lines (2164)
downloaded
Chrome Cache Entry: 202
Web Open Font Format (Version 2), TrueType, length 8572, version 1.0
downloaded
Chrome Cache Entry: 203
PNG image data, 240 x 240, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 204
Web Open Font Format (Version 2), TrueType, length 15368, version 1.0
downloaded
Chrome Cache Entry: 205
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 206
PNG image data, 240 x 240, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 207
ASCII text
downloaded
Chrome Cache Entry: 208
Web Open Font Format (Version 2), TrueType, length 18668, version 1.0
downloaded
Chrome Cache Entry: 209
PNG image data, 60 x 60, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 210
Web Open Font Format (Version 2), TrueType, length 11116, version 1.0
downloaded
Chrome Cache Entry: 211
HTML document, ASCII text, with very long lines (407)
downloaded
Chrome Cache Entry: 212
ASCII text, with very long lines (65447)
dropped
Chrome Cache Entry: 213
ASCII text
downloaded
Chrome Cache Entry: 214
PNG image data, 200 x 38, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 215
Unicode text, UTF-8 text, with CRLF line terminators
downloaded
Chrome Cache Entry: 216
PNG image data, 60 x 60, 8-bit/color RGBA, non-interlaced
downloaded
There are 63 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Desktop\Mystery_Check.pdf"
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2144 --field-trial-handle=1568,i,15199389771524615251,12025059695965693712,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "https://2fa.com-token-auth.com/XUW5oQ1AzdmJVOER6bXRVSSt5Q0tBTVozTW1IMWxRR1RyZE1KWUh0S0RtZWptZW1BcXhLSkl5ZGVscTRnZXlrbjl3RTkwcFhEOVB4QVBZM1o3Wk55dXNlVU15bHBldWswNENZSkhkVTQzSkIyWG5LTTZLZ2JYU2xOTkpOUXVIc3I5QldNWVlwcWVYMGNRa0pRaWNXTFdoMStqLy9oZHRGd2k1eXZmL3MwdFFXTFRwb2QwL3E4dkl2aVdRPT0tLUpoUVVHUVhkYloxUzlGbEItLUpvWWVKRUZjUHNFd1p0WXlCblVJcFE9PQ==?cid=2358647351"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2596 --field-trial-handle=1908,i,13338171944133119390,15991037629013602393,262144 /prefetch:8

URLs

Name
IP
Malicious
https://secured-login.net/assets/application-3ab7c63a41a8761925d45817a71fb79e0ef7208b59de505ac640c8a2a183ec19.js
34.193.6.123
https://2fa.com-token-auth.com/Xa2xGbk9xNlJ6aXYwWC9hc3JsM2ExZFUrTUczVmpKM3JpOUxML3NjZUFtZThIMTRPMUlO
unknown
http://x1.i.lencr.org/
unknown
https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.7/css/bootstrap.min.css
104.17.24.14
https://secured-login.net/packs/js/vendor-69f70dd3792dc7287ac8.js
34.193.6.123
https://secured-login.net/assets/landing-watermark-8487e36eef1bec74f06631f19fea0aa171c208e2976373cda5bd0a4b9e230903.css
34.193.6.123
https://local21news.com/resources/media/66957295-71c0-4507-9d79-f81211d0fcce-large16x9_blurredcheque.png
108.138.7.72
https://secured-login.net/assets/sei-flag-90af55d793544fe1893f26677661a4252761afbe811fab0eced85c67bc82f984.png
34.193.6.123
https://2fa.com-token-auth.com/XK0IrQUd5MStubVlIaU9uSm9yT003MjZ4M0xKMWxZYllPNW9zOUNyUks2SktRTDY5M29z
unknown
https://2fa.com-token-auth.com/XTGNadUJqbTVmQ0tPcC9iT1l5WWp2bFkrdVdyUkhnamlaN1dPckEzL2Z3V1dNRzhWZ2Qw
unknown
https://secured-login.net/assets/sei-styles-1837e0b6e1baaf1af90438028a176241b70a365a8a09ff4bf668cf3bf9e3c759.css
34.193.6.123
https://secured-login.net/favicon.ico
34.193.6.123
https://secured-login.net/pages/5b6e2d87961b/XUW5oQ1AzdmJVOER6bXRVSSt5Q0tBTVozTW1IMWxRR1RyZE1KWUh0S0
unknown
https://2fa.com-token-auth.com/XUW5oQ1AzdmJVOER6bXRVSSt5Q0tBTVozTW1IMWxRR1RyZE1KWUh0S0RtZWptZW1BcXhLSkl5ZGVscTRnZXlrbjl3RTkwcFhEOVB4QVBZM1o3Wk55dXNlVU15bHBldWswNENZSkhkVTQzSkIyWG5LTTZLZ2JYU2xOTkpOUXVIc3I5QldNWVlwcWVYMGNRa0pRaWNXTFdoMStqLy9oZHRGd2k1eXZmL3MwdFFXTFRwb2QwL3E4dkl2aVdRPT0tLUpoUVVHUVhkYloxUzlGbEItLUpvWWVKRUZjUHNFd1p0WXlCblVJcFE9PQ==?cid=2358647351
18.209.183.54
https://secured-login.net/assets/application-237cb5c4f318687625f8ccf2f42de3fc20238bfe267384653491a6bba8c8f6f5.js
34.193.6.123
https://s3.amazonaws.com/helpimg/landing_pages/css/dd.css
52.216.237.229
https://cdn2.hubspot.net/hubfs/241394/html_file/files/img/KB4-logo.png
104.18.90.62
https://i.imgur.com/QRF01zv.png
199.232.196.193
https://local21news.com/resources/media/66957295-71c0-4507-9d79-f81211d0fcce-large16x9_blurredcheque
unknown
https://secured-login.net/assets/landing-watermark-16f13e16a7ef02fb6f94250aa1931ded83dbee5d9fad278e33dd5792d085194f.css
34.193.6.123
https://secured-login.net/pages/5b6e2d87961b/XUW5oQ1AzdmJVOER6bXRVSSt5Q0tBTVozTW1IMWxRR1RyZE1KWUh0S0RtZWptZW1BcXhLSkl5ZGVscTRnZXlrbjl3RTkwcFhEOVB4QVBZM1o3Wk55dXNlVU15bHBldWswNENZSkhkVTQzSkIyWG5LTTZLZ2JYU2xOTkpOUXVIc3I5QldNWVlwcWVYMGNRa0pRaWNXTFdoMStqLy9oZHRGd2k1eXZmL3MwdFFXTFRwb2QwL3E4dkl2aVdRPT0tLUpoUVVHUVhkYloxUzlGbEItLUpvWWVKRUZjUHNFd1p0WXlCblVJcFE9PQ==
http://getbootstrap.com)
unknown
https://github.com/twbs/bootstrap/blob/master/LICENSE)
unknown
https://2fa.com-token-auth.com/XUW5oQ1AzdmJVOER6bXRVSSt5Q0tBTVozTW1IMWxRR1RyZE1KWUh0S0RtZWptZW1BcXhL
unknown
http://preview.training.knowbe4.com/XdCt3bFlxamE1ZFYrZVF6TlpxdVNCK3JlQURvb3d0VTBmVDVFemdrWjZiTGhBc09
unknown
https://secured-login.net/assets/modernizr-654222debe8018b12f1993ceddff30dc163a7d5008d79869c399d6d167321f97.js
34.193.6.123
There are 16 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
cdn2.hubspot.net
104.18.90.62
bg.microsoft.map.fastly.net
199.232.210.172
s3.amazonaws.com
52.216.237.229
local21news.com
108.138.7.72
cdnjs.cloudflare.com
104.17.24.14
www.google.com
142.250.181.228
secured-login.net
34.193.6.123
landing.training.knowbe4.com
18.209.183.54
ipv4.imgur.map.fastly.net
199.232.196.193
2fa.com-token-auth.com
unknown
x1.i.lencr.org
unknown
i.imgur.com
unknown
There are 2 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
192.168.2.16
unknown
unknown
192.168.2.4
unknown
unknown
199.232.196.193
ipv4.imgur.map.fastly.net
United States
104.18.90.62
cdn2.hubspot.net
United States
52.216.237.229
s3.amazonaws.com
United States
18.209.183.54
landing.training.knowbe4.com
United States
34.235.36.251
unknown
United States
104.17.24.14
cdnjs.cloudflare.com
United States
199.232.192.193
unknown
United States
104.18.91.62
unknown
United States
239.255.255.250
unknown
Reserved
142.250.181.228
www.google.com
United States
34.193.6.123
secured-login.net
United States
108.138.7.72
local21news.com
United States
There are 4 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
aFS
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tDIText
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tFileName
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
tFileSource
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sFileAncestors
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sDI
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sDate
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
uFileSize
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
uPageCount
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
sAssetId
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c1
bisSharedFile
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
aFS
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
tDIText
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
tFileName
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sFileAncestors
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sDI
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
sDate
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
uFileSize
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
uPageCount
HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral\cRecentFiles\c2
bisSharedFile
There are 10 hidden registries, click here to show them.

DOM / HTML

URL
Malicious
https://secured-login.net/pages/5b6e2d87961b/XUW5oQ1AzdmJVOER6bXRVSSt5Q0tBTVozTW1IMWxRR1RyZE1KWUh0S0RtZWptZW1BcXhLSkl5ZGVscTRnZXlrbjl3RTkwcFhEOVB4QVBZM1o3Wk55dXNlVU15bHBldWswNENZSkhkVTQzSkIyWG5LTTZLZ2JYU2xOTkpOUXVIc3I5QldNWVlwcWVYMGNRa0pRaWNXTFdoMStqLy9oZHRGd2k1eXZmL3MwdFFXTFRwb2QwL3E4dkl2aVdRPT0tLUpoUVVHUVhkYloxUzlGbEItLUpvWWVKRUZjUHNFd1p0WXlCblVJcFE9PQ==
malicious