File name:

GB 36893-2018.pdf

Full analysis: https://app.any.run/tasks/449f3698-a329-4057-9933-a5451bd229c8
Verdict: Malicious activity
Analysis date: April 09, 2021, 20:18:55
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/pdf
File info: PDF document, version 1.7
MD5:

ED4374C9F9A525619ADA0DA2F3B710E8

SHA1:

75E03BD2E49D9ED0D984FB1BABA23861524A6405

SHA256:

0D01D3AD00E22940316158C9B12DBAEA930902E8F6801E18161D726C89E2FB81

SSDEEP:

12288:U1IOADVdTvKO11GgK0IQDDhComGgcIeWIthBhFxnOBIFXNHlnsGTr/:QALT0Qh9gcIerFxOKXNhTr/

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • FileOpenManager32.exe (PID: 1320)
      • FileOpenBroker32.exe (PID: 1476)
  • SUSPICIOUS

    • Starts Microsoft Installer

      • iexplore.exe (PID: 1684)
    • Starts Internet Explorer

      • AcroRd32.exe (PID: 1692)
    • Executed as Windows Service

      • vssvc.exe (PID: 1484)
      • FileOpenManager32.exe (PID: 1320)
    • Creates files in the program directory

      • AdobeARM.exe (PID: 2888)
    • Drops a file with a compile date too recent

      • msiexec.exe (PID: 2672)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 2672)
    • Drops a file that was compiled in debug mode

      • msiexec.exe (PID: 2672)
    • Changes the autorun value in the registry

      • msiexec.exe (PID: 2672)
    • Creates or modifies windows services

      • FileOpenManager32.exe (PID: 1320)
    • Creates files in the user directory

      • msiexec.exe (PID: 2672)
    • Creates a directory in Program Files

      • msiexec.exe (PID: 2672)
  • INFO

    • Application launched itself

      • AcroRd32.exe (PID: 1692)
      • RdrCEF.exe (PID: 1884)
      • iexplore.exe (PID: 1684)
      • msiexec.exe (PID: 2672)
    • Creates files in the user directory

      • iexplore.exe (PID: 3380)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3380)
    • Changes internet zones settings

      • iexplore.exe (PID: 1684)
    • Reads settings of System Certificates

      • AcroRd32.exe (PID: 1692)
      • iexplore.exe (PID: 3380)
      • iexplore.exe (PID: 1684)
      • AdobeARM.exe (PID: 2888)
    • Reads the hosts file

      • RdrCEF.exe (PID: 1884)
    • Changes IE settings (feature browser emulation)

      • AcroRd32.exe (PID: 1692)
    • Changes settings of System certificates

      • iexplore.exe (PID: 1684)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 1684)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 1684)
    • Low-level read access rights to disk partition

      • vssvc.exe (PID: 1484)
    • Dropped object may contain Bitcoin addresses

      • msiexec.exe (PID: 2672)
    • Creates files in the program directory

      • msiexec.exe (PID: 2672)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 2672)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.pdf | Adobe Portable Document Format (100)

EXIF

PDF

Encryption: FOPN_foweb V2
Linearized: No
PDFVersion: 1.7
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
50
Monitored processes
14
Malicious processes
1
Suspicious processes
2

Behavior graph

Click at the process to see the details
start drop and start acrord32.exe acrord32.exe no specs iexplore.exe iexplore.exe rdrcef.exe no specs adobearm.exe no specs reader_sl.exe no specs rdrcef.exe no specs msiexec.exe no specs msiexec.exe vssvc.exe no specs msiexec.exe no specs fileopenmanager32.exe no specs fileopenbroker32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1320"C:\Program Files\FileOpen\Services\FileOpenManager32.exe"C:\Program Files\FileOpen\Services\FileOpenManager32.exeservices.exe
User:
SYSTEM
Company:
FileOpen Systems Inc.
Integrity Level:
SYSTEM
Description:
FileOpen Client - Manager Service
Exit code:
0
Version:
21.03.31.02
Modules
Images
c:\program files\fileopen\services\fileopenmanager32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1476"C:\Program Files\FileOpen\Services\FileOpenBroker32.exe"C:\Program Files\FileOpen\Services\FileOpenBroker32.exemsiexec.exe
User:
admin
Company:
FileOpen Systems Inc.
Integrity Level:
MEDIUM
Description:
FileOpen Client - Broker
Exit code:
0
Version:
21.03.31.02
Modules
Images
c:\program files\fileopen\services\fileopenbroker32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\wininet.dll
c:\windows\system32\api-ms-win-downlevel-user32-l1-1-0.dll
1484C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\vssvc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1684"C:\Program Files\Internet Explorer\iexplore.exe" http://cgi1.adobe.com/special/acrobat/pluginfinder/pluginfinder.cgi?type=Filter&name=FOPN_foweb&os=Win&vers=15.0&C:\Program Files\Internet Explorer\iexplore.exe
AcroRd32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
1692"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\admin\AppData\Local\Temp\GB 36893-2018.pdf"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
explorer.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe Acrobat Reader DC
Exit code:
0
Version:
15.23.20070.215641
Modules
Images
c:\program files\adobe\acrobat reader dc\reader\acrord32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1732"C:\Program Files\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe" C:\Program Files\Adobe\Acrobat Reader DC\Reader\Reader_sl.exeAdobeARM.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe Acrobat SpeedLauncher
Exit code:
0
Version:
15.23.20053.211670
Modules
Images
c:\program files\adobe\acrobat reader dc\reader\reader_sl.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1884"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16448250C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeAcroRd32.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe RdrCEF
Exit code:
0
Version:
15.23.20053.211670
Modules
Images
c:\program files\adobe\acrobat reader dc\reader\acrocef\rdrcef.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2416"C:\Windows\System32\msiexec.exe" /i "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\FileOpenInstaller.msi" C:\Windows\System32\msiexec.exeiexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2536"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-3d-apis --disable-databases --disable-direct-npapi-requests --disable-file-system --disable-notifications --disable-shared-workers --disable-direct-write --lang=en-US --lang=en-US --log-severity=disable --product-version="ReaderServices/15.23.20053 Chrome/45.0.2454.85" --device-scale-factor=1 --enable-delegated-renderer --num-raster-threads=2 --gpu-rasterization-msaa-sample-count=8 --content-image-texture-target=3553 --video-image-texture-target=3553 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --channel="1884.0.195018946\1891313637" --allow-no-sandbox-job /prefetch:673131151C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeRdrCEF.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe RdrCEF
Exit code:
0
Version:
15.23.20053.211670
Modules
Images
c:\program files\adobe\acrobat reader dc\reader\acrocef\rdrcef.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2604C:\Windows\system32\MsiExec.exe -Embedding C9DCCF2427E95698C8A13CA72927F5C1C:\Windows\system32\MsiExec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
2 164
Read events
1 727
Write events
418
Delete events
19

Modification events

(PID) Process:(3080) AcroRd32.exeKey:HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\ExitSection
Operation:writeName:bLastExitNormal
Value:
0
(PID) Process:(1692) AcroRd32.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
Operation:writeName:{17FE9752-0B5A-4665-84CD-569794602F5C} {7F9185B0-CB92-43C5-80A9-92277A4F7B54} 0xFFFF
Value:
0100000000000000250D9E987D2DD701
(PID) Process:(1684) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
2861588635
(PID) Process:(1684) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30879101
(PID) Process:(1684) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1684) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1684) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(1684) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(1684) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(1684) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
46000000A5000000010000000000000000000000000000000000000000000000C0E333BBEAB1D301000000000000000000000000020000001700000000000000FE800000000000007D6CB050D9C573F70B000000000000006D00330032005C004D00530049004D004700330032002E0064006C000100000004AA400014AA4000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000C0A8016400000000000000000000000000000000000000000800000000000000805D3F00983740000008000002000000000000600000002060040000B8A94000020000008802000060040000B8A9400004000000F8010000B284000088B64000B84B400043003A000000000000000000000000000000000000000000
Executable files
7
Suspicious files
26
Text files
59
Unknown types
28

Dropped files

PID
Process
Filename
Type
3080AcroRd32.exeC:\Users\admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
MD5:
SHA256:
3380iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab9A.tmp
MD5:
SHA256:
3380iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar9B.tmp
MD5:
SHA256:
3380iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\64YVC3D1.txt
MD5:
SHA256:
3080AcroRd32.exeC:\Users\admin\AppData\Local\Adobe\Acrobat\DC\Cache\AdobeFnt16.lst.3080
MD5:
SHA256:
3080AcroRd32.exeC:\Users\admin\AppData\Local\Adobe\Acrobat\DC\AdobeFnt16.lst.3080
MD5:
SHA256:
3380iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_D975BBA8033175C8D112023D8A7A8AD6der
MD5:
SHA256:
3080AcroRd32.exeC:\Users\admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessagessqlite
MD5:
SHA256:
3380iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_D975BBA8033175C8D112023D8A7A8AD6binary
MD5:
SHA256:
1692AcroRd32.exeC:\Users\admin\AppData\Local\Adobe\Acrobat\DC\Cache\AcroFnt15.lstps
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
18
TCP/UDP connections
39
DNS requests
24
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3380
iexplore.exe
GET
301
199.60.103.2:80
http://www.fileopen.com/getplugin.asp?type=Filter&name=FOPN_foweb
CA
suspicious
3380
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAH9o%2BtuynXIiEOLckvPvJE%3D
US
der
471 b
whitelisted
3380
iexplore.exe
GET
301
64.106.211.88:80
http://plugin.fileopen.com/?type=Filter&name=FOPN_foweb
US
html
183 b
suspicious
3380
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAH9o%2BtuynXIiEOLckvPvJE%3D
US
der
471 b
whitelisted
3380
iexplore.exe
GET
200
2.22.118.163:80
http://crl.identrust.com/DSTROOTCAX3CRL.crl
GB
der
1.16 Kb
whitelisted
3380
iexplore.exe
GET
200
172.217.23.35:80
http://ocsp.pki.goog/gsr2/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTgXIsxbvr2lBkPpoIEVRE6gHlCnAQUm%2BIHV2ccHsBqBt5ZtJot39wZhi4CDQHjtJqhjYqpgSVpULg%3D
US
der
468 b
whitelisted
1692
AcroRd32.exe
GET
304
2.18.213.185:80
http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/281_15_23_20070.zip
unknown
whitelisted
3380
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D
US
der
1.47 Kb
whitelisted
3380
iexplore.exe
GET
200
172.217.23.35:80
http://ocsp.pki.goog/gts1o1core/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEBvy7wrBJoLFAwAAAADLz1Y%3D
US
der
471 b
whitelisted
1692
AcroRd32.exe
GET
200
2.18.213.185:80
http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/message.zip
unknown
compressed
9.54 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3380
iexplore.exe
2.22.118.137:443
www.adobe.com
Akamai International B.V.
GB
unknown
3380
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
23.35.228.137:443
armmf.adobe.com
Zayo Bandwidth Inc
US
suspicious
199.60.103.2:80
www.fileopen.com
CA
suspicious
3380
iexplore.exe
172.217.22.195:80
ocsp.pki.goog
Google Inc.
US
whitelisted
3380
iexplore.exe
172.217.23.35:80
ocsp.pki.goog
Google Inc.
US
whitelisted
172.217.22.206:443
www.google-analytics.com
Google Inc.
US
whitelisted
1692
AcroRd32.exe
23.35.228.137:443
armmf.adobe.com
Zayo Bandwidth Inc
US
suspicious
193.104.215.58:80
cgi1.adobe.com
Level 3 Communications, Inc.
malicious
1684
iexplore.exe
64.106.211.88:443
plugin.fileopen.com
DataPipe, Inc.
US
unknown

DNS requests

Domain
IP
Reputation
cgi1.adobe.com
  • 193.104.215.58
whitelisted
www.adobe.com
  • 2.22.118.137
  • 2.22.118.105
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
armmf.adobe.com
  • 23.35.228.137
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
www.fileopen.com
  • 199.60.103.2
  • 199.60.103.254
suspicious
plugin.fileopen.com
  • 64.106.211.88
suspicious
crl.identrust.com
  • 2.22.118.163
  • 2.22.118.168
whitelisted
www.googletagmanager.com
  • 172.217.22.200
whitelisted

Threats

No threats detected
No debug info