Windows Analysis Report
Paradigm-corp_Remittance_Advice_Monday, June 9, 2025 at 07_36_45 PM.pdf

General Information

Sample name: Paradigm-corp_Remittance_Advice_Monday, June 9, 2025 at 07_36_45 PM.pdf
Analysis ID: 1711283
Has dependencies: false
MD5: 19948161a10913f4de48ceaeebb3155e
SHA1: 17a5affb9a83eed4f119bee171db0d78976ae4a4
SHA256: 0076be57d1efb411b083484b92bed90f05767cb3cf43c028019590699b8b8818
Infos:

Detection

Score: 3
Range: 0 - 100
Confidence: 80%

Signatures

IP address seen in connection with other malware
PDF is encrypted
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication

Classification

Source: global traffic DNS query: name: x1.i.lencr.org
Source: global traffic TCP traffic: 192.168.2.16:49712 -> 23.39.37.95:80
Source: global traffic TCP traffic: 192.168.2.16:49713 -> 23.200.196.138:443
Source: global traffic TCP traffic: 192.168.2.16:49713 -> 23.200.196.138:443
Source: global traffic TCP traffic: 192.168.2.16:49713 -> 23.200.196.138:443
Source: global traffic TCP traffic: 192.168.2.16:49713 -> 23.200.196.138:443
Source: global traffic TCP traffic: 192.168.2.16:49713 -> 23.200.196.138:443
Source: global traffic TCP traffic: 192.168.2.16:49713 -> 23.200.196.138:443
Source: global traffic TCP traffic: 192.168.2.16:49713 -> 23.200.196.138:443
Source: global traffic TCP traffic: 192.168.2.16:49713 -> 23.200.196.138:443
Source: global traffic TCP traffic: 192.168.2.16:49713 -> 23.200.196.138:443
Source: global traffic TCP traffic: 192.168.2.16:49713 -> 23.200.196.138:443
Source: global traffic TCP traffic: 192.168.2.16:49713 -> 23.200.196.138:443
Source: global traffic TCP traffic: 192.168.2.16:49713 -> 23.200.196.138:443
Source: global traffic TCP traffic: 192.168.2.16:49713 -> 23.200.196.138:443
Source: global traffic TCP traffic: 192.168.2.16:49713 -> 23.200.196.138:443
Source: global traffic TCP traffic: 192.168.2.16:49713 -> 23.200.196.138:443
Source: global traffic TCP traffic: 192.168.2.16:49713 -> 23.200.196.138:443
Source: global traffic TCP traffic: 192.168.2.16:49712 -> 23.39.37.95:80
Source: global traffic TCP traffic: 23.39.37.95:80 -> 192.168.2.16:49712
Source: global traffic TCP traffic: 192.168.2.16:49712 -> 23.39.37.95:80
Source: global traffic TCP traffic: 192.168.2.16:49712 -> 23.39.37.95:80
Source: global traffic TCP traffic: 23.39.37.95:80 -> 192.168.2.16:49712
Source: global traffic TCP traffic: 23.39.37.95:80 -> 192.168.2.16:49712
Source: global traffic TCP traffic: 23.39.37.95:80 -> 192.168.2.16:49712
Source: global traffic TCP traffic: 192.168.2.16:49712 -> 23.39.37.95:80
Source: global traffic TCP traffic: 192.168.2.16:49713 -> 23.200.196.138:443
Source: global traffic TCP traffic: 23.200.196.138:443 -> 192.168.2.16:49713
Source: global traffic TCP traffic: 192.168.2.16:49713 -> 23.200.196.138:443
Source: global traffic TCP traffic: 192.168.2.16:49713 -> 23.200.196.138:443
Source: global traffic TCP traffic: 23.200.196.138:443 -> 192.168.2.16:49713
Source: global traffic TCP traffic: 23.200.196.138:443 -> 192.168.2.16:49713
Source: global traffic TCP traffic: 192.168.2.16:49713 -> 23.200.196.138:443
Source: global traffic TCP traffic: 192.168.2.16:49713 -> 23.200.196.138:443
Source: global traffic TCP traffic: 23.200.196.138:443 -> 192.168.2.16:49713
Source: global traffic TCP traffic: 192.168.2.16:49713 -> 23.200.196.138:443
Source: global traffic TCP traffic: 23.200.196.138:443 -> 192.168.2.16:49713
Source: global traffic TCP traffic: 192.168.2.16:49713 -> 23.200.196.138:443
Source: global traffic TCP traffic: 23.200.196.138:443 -> 192.168.2.16:49713
Source: global traffic TCP traffic: 23.200.196.138:443 -> 192.168.2.16:49713
Source: global traffic TCP traffic: 23.200.196.138:443 -> 192.168.2.16:49713
Source: global traffic TCP traffic: 192.168.2.16:49713 -> 23.200.196.138:443
Source: global traffic TCP traffic: 192.168.2.16:49713 -> 23.200.196.138:443
Source: global traffic TCP traffic: 23.200.196.138:443 -> 192.168.2.16:49713
Source: global traffic TCP traffic: 192.168.2.16:49713 -> 23.200.196.138:443
Source: global traffic TCP traffic: 23.200.196.138:443 -> 192.168.2.16:49713
Source: global traffic TCP traffic: 23.200.196.138:443 -> 192.168.2.16:49713
Source: global traffic TCP traffic: 192.168.2.16:49713 -> 23.200.196.138:443
Source: global traffic TCP traffic: 23.200.196.138:443 -> 192.168.2.16:49713
Source: global traffic TCP traffic: 192.168.2.16:49713 -> 23.200.196.138:443
Source: global traffic TCP traffic: 192.168.2.16:49713 -> 23.200.196.138:443
Source: global traffic TCP traffic: 23.200.196.138:443 -> 192.168.2.16:49713
Source: global traffic TCP traffic: 192.168.2.16:49712 -> 23.39.37.95:80
Source: global traffic TCP traffic: 23.39.37.95:80 -> 192.168.2.16:49712
Source: global traffic TCP traffic: 192.168.2.16:49712 -> 23.39.37.95:80
Source: global traffic TCP traffic: 192.168.2.16:49713 -> 23.200.196.138:443
Source: global traffic TCP traffic: 23.200.196.138:443 -> 192.168.2.16:49713
Source: global traffic TCP traffic: 192.168.2.16:49713 -> 23.200.196.138:443
Source: global traffic TCP traffic: 23.200.196.138:443 -> 192.168.2.16:49713
Source: global traffic TCP traffic: 192.168.2.16:49713 -> 23.200.196.138:443
Source: Joe Sandbox View IP Address: 23.39.37.95 23.39.37.95
Source: Joe Sandbox View IP Address: 23.200.196.138 23.200.196.138
Source: global traffic HTTP traffic detected: GET /onboarding/smskillreader.txt HTTP/1.1host: armmf.adobe.comaccept-language: en-US,en;q=0.9user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) ReaderServices/23.6.20320 Chrome/105.0.0.0 Safari/537.36sec-fetch-site: same-originsec-fetch-mode: no-corssec-fetch-dest: emptyaccept-encoding: identity
Source: unknown TCP traffic detected without corresponding DNS query: 23.200.196.138
Source: unknown TCP traffic detected without corresponding DNS query: 23.200.196.138
Source: unknown TCP traffic detected without corresponding DNS query: 23.200.196.138
Source: unknown TCP traffic detected without corresponding DNS query: 23.200.196.138
Source: unknown TCP traffic detected without corresponding DNS query: 23.200.196.138
Source: unknown TCP traffic detected without corresponding DNS query: 23.200.196.138
Source: unknown TCP traffic detected without corresponding DNS query: 23.200.196.138
Source: unknown TCP traffic detected without corresponding DNS query: 23.200.196.138
Source: unknown TCP traffic detected without corresponding DNS query: 23.200.196.138
Source: unknown TCP traffic detected without corresponding DNS query: 23.200.196.138
Source: unknown TCP traffic detected without corresponding DNS query: 23.200.196.138
Source: unknown TCP traffic detected without corresponding DNS query: 23.200.196.138
Source: unknown TCP traffic detected without corresponding DNS query: 23.200.196.138
Source: unknown TCP traffic detected without corresponding DNS query: 23.200.196.138
Source: unknown TCP traffic detected without corresponding DNS query: 23.200.196.138
Source: unknown TCP traffic detected without corresponding DNS query: 23.200.196.138
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic HTTP traffic detected: GET /onboarding/smskillreader.txt HTTP/1.1host: armmf.adobe.comaccept-language: en-US,en;q=0.9user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) ReaderServices/23.6.20320 Chrome/105.0.0.0 Safari/537.36sec-fetch-site: same-originsec-fetch-mode: no-corssec-fetch-dest: emptyaccept-encoding: identity
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Microsoft-CryptoAPI/10.0Host: x1.i.lencr.org
Source: global traffic DNS traffic detected: DNS query: x1.i.lencr.org
Source: 77EC63BDA74BD0D0E0426DC8F80085060.3.dr String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: 2D85F72862B55C4EADD9E66E06947F3D0.3.dr String found in binary or memory: http://x1.i.lencr.org/
Source: 132eb6fd-2510-4633-be5f-24a3fbfa0a02.tmp.6.dr String found in binary or memory: https://chrome.cloudflare-dns.com
Source: unknown Network traffic detected: HTTP traffic on port 49713 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49713
Source: classification engine Classification label: clean3.winPDF@16/50@1/2
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe File created: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt23.lst.6200 Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe File created: C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2025-06-10 12-58-40-789.log Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA Jump to behavior
Source: unknown Process created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
Source: unknown Process created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Desktop\Paradigm-corp_Remittance_Advice_Monday, June 9, 2025 at 07_36_45 PM.pdf"
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe Process created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2120 --field-trial-handle=1552,i,5071983132029350567,6716144300352404056,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
Source: unknown Process created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe Process created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215 Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2120 --field-trial-handle=1552,i,5071983132029350567,6716144300352404056,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8 Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process created: unknown unknown Jump to behavior
Source: Paradigm-corp_Remittance_Advice_Monday, June 9, 2025 at 07_36_45 PM.pdf Initial sample: PDF keyword /JS count = 0
Source: Paradigm-corp_Remittance_Advice_Monday, June 9, 2025 at 07_36_45 PM.pdf Initial sample: PDF keyword /JavaScript count = 0
Source: Paradigm-corp_Remittance_Advice_Monday, June 9, 2025 at 07_36_45 PM.pdf Initial sample: PDF keyword /Encrypt count = 1
Source: Paradigm-corp_Remittance_Advice_Monday, June 9, 2025 at 07_36_45 PM.pdf Initial sample: PDF keyword /EmbeddedFile count = 0
Source: Paradigm-corp_Remittance_Advice_Monday, June 9, 2025 at 07_36_45 PM.pdf Initial sample: PDF keyword /Encrypt
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe Process information queried: ProcessInformation Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs