Recently, Cegeka CSIRT investigated multiple incidents involving binaries with the file names ‘ManualFinderApp.exe’ and ‘PDF Editor.exe’. Cegeka CSIRT observed that the incidents started with the download of the malicious .msi package ‘AppSuite-PDF.msi’. The package installs the ‘PDF Editor’ application. The .msi package is hosted on several websites that leverage advertisements to increase their reach. Cegeka CSIRT observed existence of the aforementioned package on several hosts, indicating a broader distribution campaign rather than isolated cases.
During the investigation, Cegeka CSIRT noticed that the .msi package was downloaded from several websites (such as ‘pdfadmin[.]com’, pdfmeta[.]com’, ’pdftraining[.]com’, ‘fullpdf[.]com’ and others). All of the referenced domains share a nearly identical design and were found to distribute similar builds of the ‘AppSuite-PDF.msi’ package.
Analysis of the available telemetry from the affected hosts revealed a consistent sequence of events that lead to the download of ‘AppSuite-PDF.msi’:
This pattern suggests that the threat actor(s) may be leveraging malvertising to promote the application, increasing its visibility and reach across different victims.
Once the download is initiated, the websites showcase execution instructions to the user, instructing the user to run the .msi file. The infection occurs only if there is direct user interaction with the .msi file, meaning the user manually launches the downloaded ’.msi’ file, which then installs the malicious payload on the host.
The diagram below shows a high-level overview of the infection chain.
Cegeka CSIRT encourages organizations to:
Please find the full Cegeka CSIRT threat analysis report which includes the observed indicators of compromise here:
Our Cegeka Modern SOC, staffed with experienced security professionals, is able to detect these types of attacks and adequately respond to them in a timely manner, minimizing or even fully preventing impact on your organization.