analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

AZZOLINI STEFANOMR 12JAN AZ E-TICKET.pdf

Full analysis: https://app.any.run/tasks/e76795d6-d6ef-4dce-921c-af5f6646e535
Verdict: Malicious activity
Analysis date: January 10, 2019, 16:52:28
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
generated-doc
Indicators:
MIME: application/pdf
File info: PDF document, version 1.4
MD5:

9BEE3C7220F9E9BBE373586E2C58293F

SHA1:

BF70E385C1A45C8E693E0B0A3F8155DD8702D51F

SHA256:

D9CCC00ADFC44D7335C783E266351B3ACC92347FADA88D355381A1A8B69F3696

SSDEEP:

12288:TPutAXBX9lN6mSYTDmcZiEIqDhM8t7c1E/:TPHX9lN6mSYTDC+hrtsY

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Starts Internet Explorer

      • AcroRd32.exe (PID: 3456)
    • Creates files in the program directory

      • AdobeARM.exe (PID: 2268)
    • Executable content was dropped or overwritten

      • AdobeARM.exe (PID: 2268)
  • INFO

    • Creates files in the user directory

      • AcroRd32.exe (PID: 3456)
      • iexplore.exe (PID: 2324)
      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 3908)
      • iexplore.exe (PID: 1832)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2324)
      • iexplore.exe (PID: 1912)
      • iexplore.exe (PID: 1832)
      • iexplore.exe (PID: 2916)
      • iexplore.exe (PID: 1420)
    • Changes internet zones settings

      • iexplore.exe (PID: 3496)
      • iexplore.exe (PID: 3636)
      • iexplore.exe (PID: 2916)
      • iexplore.exe (PID: 3704)
    • Application launched itself

      • iexplore.exe (PID: 3496)
      • RdrCEF.exe (PID: 3424)
      • AcroRd32.exe (PID: 3456)
      • iexplore.exe (PID: 2916)
      • iexplore.exe (PID: 3704)
    • Reads internet explorer settings

      • iexplore.exe (PID: 1912)
      • iexplore.exe (PID: 2324)
      • iexplore.exe (PID: 1832)
      • iexplore.exe (PID: 1420)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 1832)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.pdf | Adobe Portable Document Format (100)

EXIF

XMP

Conformance: A
Part: 1
InstanceID: uuid:13436432-6D38-42C4-8B99-441B63610D7B
DocumentID: uuid:13436432-6D38-42C4-8B99-441B63610D7B
ModifyDate: 2018:12:24 10:37:55+02:00
CreateDate: 2018:12:24 10:37:55+02:00
CreatorTool: Microsoft® Word 2013
Producer: Microsoft® Word 2013
XMPToolkit: 3.1-701

PDF

ModifyDate: 2018:12:24 10:37:55+02:00
CreateDate: 2018:12:24 10:37:55+02:00
Creator: Microsoft® Word 2013
Producer: Microsoft® Word 2013
TaggedPDF: Yes
Language: en-ZA
PageCount: 7
Linearized: No
PDFVersion: 1.4
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
46
Monitored processes
16
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start acrord32.exe acrord32.exe no specs rdrcef.exe no specs rdrcef.exe no specs rdrcef.exe no specs iexplore.exe iexplore.exe iexplore.exe iexplore.exe adobearm.exe reader_sl.exe no specs iexplore.exe iexplore.exe flashutil32_26_0_0_131_activex.exe no specs iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
3456"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\admin\AppData\Local\Temp\AZZOLINI STEFANOMR 12JAN AZ E-TICKET.pdf"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
explorer.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe Acrobat Reader DC
Version:
15.23.20070.215641
2788"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" --type=renderer "C:\Users\admin\AppData\Local\Temp\AZZOLINI STEFANOMR 12JAN AZ E-TICKET.pdf"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeAcroRd32.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe Acrobat Reader DC
Version:
15.23.20070.215641
3424"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16448250C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeAcroRd32.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe RdrCEF
Version:
15.23.20053.211670
3492"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-3d-apis --disable-databases --disable-direct-npapi-requests --disable-file-system --disable-notifications --disable-shared-workers --disable-direct-write --lang=en-US --lang=en-US --log-severity=disable --product-version="ReaderServices/15.23.20053 Chrome/45.0.2454.85" --device-scale-factor=1 --enable-delegated-renderer --num-raster-threads=2 --gpu-rasterization-msaa-sample-count=8 --content-image-texture-target=3553 --video-image-texture-target=3553 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --channel="3424.0.1578923554\1985366828" --allow-no-sandbox-job /prefetch:673131151C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeRdrCEF.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe RdrCEF
Version:
15.23.20053.211670
2712"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-3d-apis --disable-databases --disable-direct-npapi-requests --disable-file-system --disable-notifications --disable-shared-workers --disable-direct-write --lang=en-US --lang=en-US --log-severity=disable --product-version="ReaderServices/15.23.20053 Chrome/45.0.2454.85" --device-scale-factor=1 --enable-delegated-renderer --num-raster-threads=2 --gpu-rasterization-msaa-sample-count=8 --content-image-texture-target=3553 --video-image-texture-target=3553 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --channel="3424.1.1641974296\1368322876" --allow-no-sandbox-job /prefetch:673131151C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeRdrCEF.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe RdrCEF
Version:
15.23.20053.211670
3636"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
AcroRd32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2324"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3636 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3496"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
AcroRd32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
1912"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3496 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2268"C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" /PRODUCT:Reader /VERSION:15.0 /MODE:3C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe
AcroRd32.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe Reader and Acrobat Manager
Version:
1.824.27.2646
Total events
1 765
Read events
1 567
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
16
Text files
209
Unknown types
24

Dropped files

PID
Process
Filename
Type
2788AcroRd32.exeC:\Users\admin\AppData\Local\Temp\acrord32_sbx\A9Rc0tlie_1xn7eug_25g.tmp
MD5:
SHA256:
2788AcroRd32.exeC:\Users\admin\AppData\Local\Temp\acrord32_sbx\A9R4j0aea_1xn7euf_25g.tmp
MD5:
SHA256:
2788AcroRd32.exeC:\Users\admin\AppData\Local\Temp\acrord32_sbx\A9R1uuqiwx_1xn7eue_25g.tmp
MD5:
SHA256:
2788AcroRd32.exeC:\Users\admin\AppData\Local\Temp\acrord32_sbx\A9R44st15_1xn7eud_25g.tmp
MD5:
SHA256:
2788AcroRd32.exeC:\Users\admin\AppData\Local\Temp\acrord32_sbx\A9Rle8sf5_1xn7euh_25g.tmp
MD5:
SHA256:
3636iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\favicon[1].ico
MD5:
SHA256:
3636iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
3636iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF430CCE29B8278CD5.TMP
MD5:
SHA256:
3636iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF2DE98BC46B8367D8.TMP
MD5:
SHA256:
3636iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF8865ECA5CFA9CEAA.TMP
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
85
TCP/UDP connections
51
DNS requests
20
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3456
AcroRd32.exe
GET
304
2.16.186.32:80
http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/277_15_23_20070.zip
unknown
whitelisted
3456
AcroRd32.exe
GET
304
2.16.186.32:80
http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/message.zip
unknown
whitelisted
3456
AcroRd32.exe
GET
304
2.16.186.32:80
http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/281_15_23_20070.zip
unknown
whitelisted
3456
AcroRd32.exe
GET
304
2.16.186.32:80
http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/280_15_23_20070.zip
unknown
whitelisted
1832
iexplore.exe
GET
200
164.151.129.19:80
http://www.dirco.gov.za/images/styles.css
ZA
text
764 b
unknown
1832
iexplore.exe
GET
200
164.151.129.19:80
http://www.dirco.gov.za/
ZA
html
17.4 Kb
unknown
1832
iexplore.exe
GET
404
164.151.129.19:80
http://www.dirco.gov.za/index_files/styles.css
ZA
html
220 b
unknown
1832
iexplore.exe
GET
200
164.151.129.19:80
http://www.dirco.gov.za/countdownn.js
ZA
text
608 b
unknown
1912
iexplore.exe
GET
301
23.38.55.90:80
http://www.carlsonwagonlit.co.za/Carlson%20Wagonlit%20travel%20standard%20terms%20and%20conditions.pdf
NL
html
309 b
whitelisted
1832
iexplore.exe
GET
200
164.151.129.19:80
http://www.dirco.gov.za/images/menu_01.gif
ZA
image
934 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2916
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3496
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2324
iexplore.exe
196.36.96.81:443
secure.carlsonwagonlit.co.za
IS
ZA
unknown
1912
iexplore.exe
23.38.55.90:80
www.carlsonwagonlit.co.za
Akamai International B.V.
NL
whitelisted
2.18.233.74:443
armmf.adobe.com
Akamai International B.V.
whitelisted
3456
AcroRd32.exe
2.18.233.74:443
armmf.adobe.com
Akamai International B.V.
whitelisted
3456
AcroRd32.exe
2.16.186.32:80
acroipm2.adobe.com
Akamai International B.V.
whitelisted
1832
iexplore.exe
164.151.129.19:80
www.dfa.gov.za
SITA-AS
ZA
unknown
3636
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
1912
iexplore.exe
23.38.55.90:443
www.carlsonwagonlit.co.za
Akamai International B.V.
NL
whitelisted

DNS requests

Domain
IP
Reputation
acroipm2.adobe.com
  • 2.16.186.32
  • 2.16.186.33
whitelisted
armmf.adobe.com
  • 2.18.233.74
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
secure.carlsonwagonlit.co.za
  • 196.36.96.81
unknown
www.carlsonwagonlit.co.za
  • 23.38.55.90
unknown
www.carlsonwagonlit.com
  • 23.38.55.90
unknown
ardownload2.adobe.com
  • 2.18.233.74
whitelisted
www.dfa.gov.za
  • 164.151.129.19
unknown
www.dirco.gov.za
  • 164.151.129.19
unknown
www.google-analytics.com
  • 172.217.18.110
whitelisted

Threats

No threats detected
No debug info