Unusual Spear Phish

Unusual Spear Phish

We received an email that was a little strange and so I decided to check it out.

Email Contents

The contents of the email were as follows:
________________________________________________________

Dear Suppliers,

We attempted to contact a representative from your company several times over the last few weeks, but were unsuccessful. A request for quotation (RFQ) with the number CFTC-494 has been sent to your company. The Commodity Futures Trading Commission (CFTC) is looking to purchase the items listed in the attached quote.

We kindly request that you provide your best pricing with FOB destination, along with any applicable discount for bulk orders.

Please ensure your quote includes the following information:

* Itemized list of the computer peripherals, including quantity and unit price
* Total cost, including any applicable taxes and shipping fees
* Any applicable discounts or promotions
* Warranty, expected delivery time and shipping details

Please note that any responses received after the deadline, unless received via email, will not be accepted. Suppliers/Vendors are encouraged to take their time in submitting their RFQ pricing documents on time.

Your prompt attention to this matter is greatly appreciated.

Thank you and regards,
----

David Gillers

Senior Procurement Executive
Acquisitions & Business Services
Commodity Futures Trading Commission
1155 21st Street, NW | Washington, DC 20581
Phone: (202) 697-9509

This e-mail is confidential, intended only for the named recipient(s) above and contains information that is privileged. If you have received this e-mail in error, please notify us immediately by using the reply facility on your e-mail system. Nothing in this communication is intended to operate as an electronic signature under applicable law.

________________________________________________________

There is an embedded image in the email pointing to:

<img alt="" src="https://i.i mgur.com/oh4hYKW.png" style="width: 199px; height: 130px;">

To download it with wget you have to provide a user-agent string otherwise imgur gives an error. I included the server response to see if there was anything strange. There is an ETag, but I doubt the sender has any control over that or imgur.

wget --server-response --user-agent='Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.0.0 Safari/537.36' https://i.imgur.com/oh4hYKW.png
--2024-06-12 23:45:21--  https://i.imgur.com/oh4hYKW.png
Resolving i.imgur.com (i.imgur.com)... 146.75.104.193
Connecting to i.imgur.com (i.imgur.com)|146.75.104.193|:443... connected.
HTTP request sent, awaiting response...
 HTTP/1.1 200 OK
 Connection: keep-alive
 Content-Length: 19099
 Content-Type: image/png
 Last-Modified: Thu, 06 Jun 2024 15:18:33 GMT
 ETag: "dee08b3044b9cd1f1590d07846a4a452"
 x-amz-server-side-encryption: AES256
 X-Amz-Cf-Pop: MIA3-P1
 X-Amz-Cf-Id: IyN67XAfcFO8bdjGvjFXGzYt08Aoz_s-3-FjKlcx4bivgIwjgJNIkQ==
 cache-control: public, max-age=31536000
 Accept-Ranges: bytes
 Age: 281043
 Date: Wed, 12 Jun 2024 23:45:21 GMT
 X-Served-By: cache-iad-kcgs7200041-IAD, cache-dfw-kdfw8210080-DFW
 X-Cache: Miss from cloudfront, HIT, HIT
 X-Cache-Hits: 5, 0
 X-Timer: S1718235922.951180,VS0,VE1
 Strict-Transport-Security: max-age=300
 Access-Control-Allow-Methods: GET, OPTIONS
 Access-Control-Allow-Origin: *
 Server: cat factory 1.0
 X-Content-Type-Options: nosniff
Length: 19099 (19K) [image/png]
Saving to: ‘oh4hYKW.png’

The EXIF information for the file is:

ExifTool Version Number         : 11.88
File Name                       : oh4hYKW.png
Directory                       : .
File Size                       : 19 kB
File Modification Date/Time     : 2024:06:06 15:18:33+00:00
File Access Date/Time           : 2024:06:12 23:43:19+00:00
File Inode Change Date/Time     : 2024:06:12 23:43:13+00:00
File Permissions                : rw-r--r--
File Type                       : PNG
File Type Extension             : png
MIME Type                       : image/png
Image Width                     : 198
Image Height                    : 164
Bit Depth                       : 8
Color Type                      : RGB
Compression                     : Deflate/Inflate
Filter                          : Adaptive
Interlace                       : Noninterlaced
Image Size                      : 198x164
Megapixels                      : 0.032

So we can see it was created relatively recently.

The CFTC is a real organization and David Gillers is a member of that organization, however, he isn't a Senior Procurement Executive, he is the Chief of Staff and COO:

CFTC Chief of Staff

Lets look at the message headers.

Message Headers

Message headers
Close
Return-Path: <admin@nccofl.org>
X-Original-To: *************************
Delivered-To: *************************
Received: from hosting.dataspace.com.np (hosting.dataspace.com.np [103.243.100.13])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client
certificate requested) by ************** (Postfix) with ESMTPS id
4Vzw2V1wMQz9vPJY for <*************************>; Wed, 12 Jun 2024 19:04:33 +0000 (UTC)
Received: from nccofl_admin by hosting.dataspace.com.np with local (Exim 4.97.1)
(envelope-from <admin@nccofl.org>) id 1sHTGg-0000000073Z-2YjN for
*************************; Thu, 13 Jun 2024 00:49:22 +0545
Authentication-Results: **************; dmarc=none (p=none dis=none)
header.from=cftcc.gov
Authentication-Results: **************; spf=pass smtp.mailfrom=nccofl.org
Authentication-Results: **************; arc=none smtp.remote-ip=103.243.100.13
Authentication-Results: **************; dkim=none
To: *************************
Subject: Computer Peripheral Quote #: CFTC-495
X-Php-Originating-Script: 1017:.alexus.php
From: David Gillers <david.gillers@cftcc.gov>
Mime-Version: 1.0
Content-Type: text/html
Reply-To: David Gillers <david.gillers@cftccgov.org>
Message-Id: <E1sHTGg-0000000073Z-2YjN@hosting.dataspace.com.np>
Date: Thu, 13 Jun 2024 00:49:22 +0545
X-Pm-Spam: 0yezJI6YSpyJec91ztFGcjIxoJyLCvXBZcQniisnOkQZFNfRVijANOslxzJCL2Yy9ogZT2C4MNED0s0lIkIPJVTR1J01XTVUfSVkV0UPlI6TiuzMWN0VsSZkI0Tf1hDRVTVNRXJ0B2U0UCN6IBdWzICJLRFUEfJVRlRPJ9ETVGUZSRJVFfRlTERN9lOQU6yIUWAzus0lMkIUhxfTUBU1SRV0fM50TVWy8I6NCuzAWN0VsUhkIUTfxVTTUH0FURIS6dBzWCLNJdJU0GF9RU9kNU10XVQI9FERUiVIROslwiwSXkUWN9JRFWl9TQxUJUlERVWD9JURVJUZSRRUfPxkQ0QFtI6RCszAWIEjwy4yMDNuMAwMTzjELIxGplR3
<--SNIP--->
Y6I4wMC3DAMMUDwwADMTMxMMwMT5jEMLJCtslWY2XhNVndG53JbX12vsVGZjIioFpbWhGNbd5Cji12bWal59mZFlW5adVHuuQWZjMyAAyNDujEMYt2wsICdmIh1xfaW02FYZdWvflncmbtFI6ZSQlVIRFEUiMVRCLtJlsYWh2NXdVGn5J3b3XyBIib2ujAONAzz3UTMDM3Ak0Nj0jQMNwCiz9FcGctFowIjyjALMQj51YzMTMzEc1Nj0TkNMwyiuVnc2Xh5UibWuiJOZcXtuV2cGZyV19IniSwfcJ3p6ICZjI2YlmNj2TQMY EW3kN2NTOwUZjNGlTVNYJy9fQ==
X-Attached: CFTC-4295.pdf
X-Pm-Origin: external
X-Pm-Transfer-Encryption: TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)
X-Pm-Content-Encryption: on-delivery
X-Pm-Spamscore: 5
X-Pm-Spam-Action: inbox

A few things stand out:

Return-Path:
admin@nccofl.org
Received: from
hosting.dataspace.com.np 103.243.100.13]
Reply-To: David Gillers
david.gillers@cftccgov.org
Notice that its now a .org

Domain & IP Analysis

The IP for nccofl.org is 103.243.101.13.
Registrar: PDR Ltd. d/b/a PublicDomainRegistry.com
Every other detail of the domain shows: REDACTED FOR PRIVACY

The IP has the following information:

inetnum:          103.243.100.0 - 103.243.101.255
netname:          DATASPACEPVTLTD-NP
descr:                Dataspace Pvt. Ltd.
country:           NP
org:                   ORG-DPL33-AP
admin-c:          DPLA23-AP
tech-c:              DPLA23-AP
abuse-c:           AD1277-AP
status:              ASSIGNED PORTABLE
mnt-by:            APNIC-HM
mnt-routes:     MAINT-DATASPACEPVTLTD-NP
mnt-irt:             IRT-DATASPACEPVTLTD-NP
last-modified:  2023-07-25T04:04:41Z
source:              APNIC
irt:                     IRT-DATASPACEPVTLTD-NP
address:           Putalisadak-28, Kathmandu Bagmati 44600
admin-c:          DPLA23-AP
tech-c:              DPLA23-AP
organisation:  ORG-DPL33-AP
org-name:       Dataspace Pvt. Ltd.
org-type:         LIR
country:          NP
address:          Putalisadak-28
phone:            +977-1-5369718
e-mail:            ds@ds.com.np

The IP is registered in NEPAL.


The IP for cftccgov.org is 84.32.84.32.

It appears to be located in:

Ground Floor, 4 Victoria Square, St Albans, Hertfordshire, AL1 3TF, UK

File Analysis


FILE TYPE:
CFTC-4295.pdf: PDF document, version 1.7, 1 pages (zip deflate encoded)
FILE SIZE:
232K
MD5SUM:
85609e747dae737adcb6b20fca1a2221
VIRUSTOTAL:
No detections
PDF ANALYSIS:

Incremental update: 1: objects= 32 length= 234463 difference= 234463

PDF STATS:
Comment: 3
XREF: 1
Trailer: 1
StartXref: 1
Indirect object: 32
Indirect objects with a stream: 12, 16, 19, 4, 26, 3, 27, 2, 28, 32
  9: 12, 15, 16, 18, 19, 21, 23, 25, 29
 /Catalog 1: 30
 /ExtGState 2: 6, 5
 /Font 5: 11, 10, 9, 8, 7
 /FontDescriptor 5: 14, 17, 20, 22, 24
 /Metadata 1: 32
 /Page 1: 1
 /Pages 2: 13, 31
 /XObject 6: 4, 26, 3, 27, 2, 28

PDF INFO:
    /Author (Windows User)
    /Keywords (www.Neevia.com, Document Converter Pro, Convert to PDF or Image in batches!)
    /Creator (Microsoft Word 2016)
    /Producer '(Neevia Document Converter Pro v7.5.0.241 \\(http://neevia.com\\))'
    /CreationDate "(D:20240610051202-04'00')"
    /ModDate "(D:20240610051202-04'00')"

PDF KEYWORDS:

 PDF Header: %PDF-1.7
 obj                      32
 endobj                32
 stream                10
 endstream          10
 xref                     1
 trailer                  1
 startxref              1
 /Page                  1
 /Encrypt              0
 /ObjStm              0
 /JS                      0
 /JavaScript          0
 /AA                     0
 /OpenAction       0
 /AcroForm           0
 /JBIG2Decode      0
 /RichMedia           0
 /Launch                0
 /EmbeddedFile      0
 /XFA                      0
 /URI                      0
 /Colors > 2^24     0

XREFS:

1/0: uncompressed; offset = 17
2/0: uncompressed; offset = 82909
3/0: uncompressed; offset = 54173
4/0: uncompressed; offset = 43431
5/0: uncompressed; offset = 43378
6/0: uncompressed; offset = 43325
7/0: uncompressed; offset = 42894
8/0: uncompressed; offset = 42216
9/0: uncompressed; offset = 41554
10/0: uncompressed; offset = 23240
11/0: uncompressed; offset = 8696
12/0: uncompressed; offset = 356
13/0: uncompressed; offset = 231483
14/0: uncompressed; offset = 9122
15/0: uncompressed; offset = 8877
16/0: uncompressed; offset = 9373
17/0: uncompressed; offset = 23744
18/0: uncompressed; offset = 23421
19/0: uncompressed; offset = 23993
20/0: uncompressed; offset = 41991
21/0: uncompressed; offset = 41716
22/0: uncompressed; offset = 42664
23/0: uncompressed; offset = 42383
24/0: uncompressed; offset = 43090
25/0: uncompressed; offset = 43065
26/0: uncompressed; offset = 49760
27/0: uncompressed; offset = 80861
28/0: uncompressed; offset = 216508
29/0: uncompressed; offset = 231179
30/0: uncompressed; offset = 233459
31/0: uncompressed; offset = 231552
32/0: uncompressed; offset = 231608

OBJECTS:

<< /Contents 12 0 R /Group << /CS /DeviceRGB /S /Transparency /Type /Group >> /MediaBox [ 0 0 612 792 ] /Parent 13 0 R /Resources << /ExtGState << /GS10 6 0 R /GS6 5 0 R >> /Font << /F1 7 0 R /F2 8 0 R /F3 9 0 R /F4 10 0 R /F5 11 0 R >> /ProcSet [ /PDF /Text /ImageB /ImageC /ImageI ] /XObject << /Image11 3 0 R /Image13 4 0 R /Image4 2 0 R >> >> /Tabs /S /Type /Page >>
-----------------------------------
Showing details for object 2:
Object is stream.  Dictionary:
<< /BitsPerComponent 8 /ColorSpace /DeviceRGB /Filter /FlateDecode /Height 1200 /Interpolate false /Length 133403 /SMask 28 0 R /Subtype /Image /Type /XObject /Width 1200 >>
-----------------------------------
Showing details for object 3:
Object is stream.  Dictionary:
<< /BitsPerComponent 8 /ColorSpace /DeviceRGB /Filter /FlateDecode /Height 413 /Interpolate false /Length 26494 /SMask 27 0 R /Subtype /Image /Type /XObject /Width 1501 >>
-----------------------------------
Showing details for object 4:
Object is stream.  Dictionary:
<< /BitsPerComponent 8 /ColorSpace /DeviceRGB /Filter /FlateDecode /Height 170 /Interpolate false /Length 6137 /SMask 26 0 R /Subtype /Image /Type /XObject /Width 415 >>
-----------------------------------
Showing details for object 5:
<< /BM /Normal /Type /ExtGState /ca 1 >>
-----------------------------------
Showing details for object 6:
<< /BM /Normal /CA 1 /Type /ExtGState >>
-----------------------------------
Showing details for object 7:
<< /BaseFont /TimesNewRomanPSMT /Encoding /WinAnsiEncoding /FirstChar 32 /FontDescriptor 24 0 R /LastChar 32 /Name /F1 /Subtype /TrueType /Type /Font /Widths 25 0 R >>
-----------------------------------
Showing details for object 8:
<< /BaseFont /Arial-BoldMT /Encoding /WinAnsiEncoding /FirstChar 32 /FontDescriptor 22 0 R /LastChar 121 /Name /F2 /Subtype /TrueType /Type /Font /Widths 23 0 R >>
-----------------------------------
Showing details for object 9:
<< /BaseFont /ArialMT /Encoding /WinAnsiEncoding /FirstChar 32 /FontDescriptor 20 0 R /LastChar 120 /Name /F3 /Subtype /TrueType /Type /Font /Widths 21 0 R >>
-----------------------------------
Showing details for object 10:
<< /BaseFont /BCDEEE+MicrosoftSansSerif /Encoding /WinAnsiEncoding /FirstChar 32 /FontDescriptor 17 0 R /LastChar 121 /Name /F4 /Subtype /TrueType /Type /Font /Widths 18 0 R >>
-----------------------------------
Showing details for object 11:
<< /BaseFont /BCDFEE+TrebuchetMS-Italic /Encoding /WinAnsiEncoding /FirstChar 32 /FontDescriptor 14 0 R /LastChar 121 /Name /F5 /Subtype /TrueType /Type /Font /Widths 15 0 R >>
-----------------------------------
Showing details for object 12:
Object is stream.  Dictionary:
<< /Filter /FlateDecode /Length 8266 >>
-----------------------------------
Showing details for object 13:
<< /Count 1 /Kids [ 1 0 R ] /Parent 31 0 R /Type /Pages >>
-----------------------------------
Showing details for object 14:
<< /Ascent 939 /AvgWidth 458 /CapHeight 737 /Descent -205 /Flags 32 /FontBBox [ -449 -205 1363 737 ] /FontFile2 16 0 R /FontName /BCDFEE+TrebuchetMS-Italic /FontWeight 400 /ItalicAngle -10 /MaxWidth 1812 /StemV 45 /Type /FontDescriptor /XHeight 250 >>
-----------------------------------
Showing details for object 15:
[ 301 0 0 0 0 0 0 0 0 0 0 0 0 367 0 0 0 0 0 524 0 524 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 852 0 0 0 0 0 0 0 0 0 525 557 0 557 537 401 502 557 307 0 0 0 0 546 537 557 0 417 405 420 557 0 744 0 493 ]
-----------------------------------
Showing details for object 16:
Object is stream.  Dictionary:
<< /Filter /FlateDecode /Length 13778 /Length1 28176 >>
-----------------------------------
Showing details for object 17:
<< /Ascent 922 /AvgWidth 440 /CapHeight 728 /Descent -210 /Flags 32 /FontBBox [ -580 -210 1473 728 ] /FontFile2 19 0 R /FontName /BCDEEE+MicrosoftSansSerif /FontWeight 400 /ItalicAngle 0 /MaxWidth 2053 /StemV 44 /Type /FontDescriptor /XHeight 250 >>
-----------------------------------
Showing details for object 18:
[ 266 0 355 0 556 0 0 0 333 333 0 0 278 333 0 278 556 556 556 556 556 556 556 556 556 556 278 0 0 0 0 0 0 667 667 722 722 667 611 778 0 278 0 0 556 833 722 778 667 0 722 667 611 722 667 944 667 0 611 0 0 0 0 0 0 556 556 500 556 556 0 556 556 228 0 500 228 833 556 556 556 0 333 500 278 556 500 0 500 500 ]
-----------------------------------
Showing details for object 19:
Object is stream.  Dictionary:
<< /Filter /FlateDecode /Length 17472 /Length1 51272 >>
-----------------------------------
Showing details for object 20:
<< /Ascent 905 /AvgWidth 441 /CapHeight 728 /Descent -210 /Flags 32 /FontBBox [ -665 -210 2000 728 ] /FontName /ArialMT /FontWeight 400 /ItalicAngle 0 /Leading 33 /MaxWidth 2665 /StemV 44 /Type /FontDescriptor /XHeight 250 >>
-----------------------------------
Showing details for object 21:
[ 278 0 0 0 0 0 0 0 333 333 0 0 278 333 0 0 556 556 556 0 0 556 556 556 556 556 278 0 0 0 0 0 0 0 0 722 722 667 0 0 0 0 0 0 0 0 722 0 667 0 0 667 0 722 0 944 0 0 0 0 0 0 0 0 0 556 0 500 556 556 0 556 556 222 0 0 0 833 556 556 0 0 333 500 278 556 500 0 500 ]
-----------------------------------
Showing details for object 22:
<< /Ascent 905 /AvgWidth 479 /CapHeight 728 /Descent -210 /Flags 32 /FontBBox [ -628 -210 2000 728 ] /FontName /Arial-BoldMT /FontWeight 700 /ItalicAngle 0 /Leading 33 /MaxWidth 2628 /StemV 47 /Type /FontDescriptor /XHeight 250 >>
-----------------------------------
Showing details for object 23:
[ 278 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 333 0 0 0 0 0 0 722 0 722 722 667 611 778 722 278 0 0 611 0 722 778 667 778 722 667 611 722 0 0 667 667 0 0 0 0 0 0 0 556 611 0 611 556 0 611 611 278 0 0 278 889 611 611 611 0 389 556 333 611 556 0 556 556 ]
-----------------------------------
Showing details for object 24:
<< /Ascent 891 /AvgWidth 401 /CapHeight 693 /Descent -216 /Flags 32 /FontBBox [ -568 -216 2046 693 ] /FontName /TimesNewRomanPSMT /FontWeight 400 /ItalicAngle 0 /Leading 42 /MaxWidth 2614 /StemV 40 /Type /FontDescriptor /XHeight 250 >>
-----------------------------------
Showing details for object 25:
[ 250 ]
-----------------------------------
Showing details for object 26:
Object is stream.  Dictionary:
<< /BitsPerComponent 8 /ColorSpace /DeviceGray /Filter /FlateDecode /Height 170 /Interpolate false /Length 4219 /Matte [ 0 0 0 ] /Subtype /Image /Type /XObject /Width 415 >>
-----------------------------------
Showing details for object 27:
Object is stream.  Dictionary:
<< /BitsPerComponent 8 /ColorSpace /DeviceGray /Filter /FlateDecode /Height 413 /Interpolate false /Length 1853 /Matte [ 0 0 0 ] /Subtype /Image /Type /XObject /Width 1501 >>
-----------------------------------
Showing details for object 28:
Object is stream.  Dictionary:
<< /BitsPerComponent 8 /ColorSpace /DeviceGray /Filter /FlateDecode /Height 1200 /Interpolate false /Length 14474 /Matte [ 0 0 0 ] /Subtype /Image /Type /XObject /Width 1200 >>
-----------------------------------
Showing details for object 29:
<< /Author (Windows User) /CreationDate (D:20240610051202-04'00') /Creator (Microsoft Word 2016) /Keywords (www.Neevia.com, Document Converter Pro, Convert to PDF or Image in batches!) /ModDate (D:20240610051202-04'00') /Producer (Neevia Document Converter Pro v7.5.0.241 \(http://neevia.com\)) >>
-----------------------------------
Showing details for object 30:
<< /Extensions << /ADBE << /BaseVersion /1.7 /ExtensionLevel 3 >> >> /Lang (en) /Metadata 32 0 R /Pages 31 0 R /Type /Catalog /ViewerPreferences << /DisplayDocTitle true >> >>
-----------------------------------
Showing details for object 31:
<< /Count 1 /Kids [ 13 0 R ] /Type /Pages >>
-----------------------------------
Showing details for object 32:
Object is stream.  Dictionary:
<< /Length 1770 /Subtype /XML /Type /Metadata >>

 

I can't really find any evidence of an exploit or other type of attack within the PDF so I decided to look at it in a controlled system and see what the contents were:

Malicious PDF Contents

Looks fairly official, but its requesting my contact info.

I analyzed some of the meta data from the PDF and found:

<?xpacket begin='' id='W5M0MpCehiHzreSzNTczkc9d'?>
<?adobe-xap-filters esc="CRLF"?>
<x:xmpmeta xmlns:x='adobe:ns:meta/' x:xmptk='3.1-702'>
<rdf:RDF xmlns:rdf='http://www.w3.org/1999/02/22-rdf-syntax-ns#'>
<rdf:Description rdf:about='23B7679B-EEDE-57C7-267A-95E8A8FE1EFC' xmlns:pdf='http://ns.adobe.com/pdf/1.3/'><pdf:Keywords>www.Neevia.com, Document Converter Pro, Convert to PDF or Image in batches!</pdf:Keywords><pdf:Producer>Neevia Document Converter Pro v7.5.0.241 (http://neevia.com)</pdf:Producer></rdf:Description>
<rdf:Description rdf:about='23B7679B-EEDE-57C7-267A-95E8A8FE1EFC' xmlns:xmp='http://ns.adobe.com/xap/1.0/'><xmp:ModifyDate>2024-06-10T05:12:02-04:00</xmp:ModifyDate><xmp:CreateDate>2024-06-10T05:12:02-04:00</xmp:CreateDate><xmp:MetadataDate>2024-06-10T05:12:02-04:00</xmp:MetadataDate><xmp:CreatorTool>Microsoft Word 2016</xmp:CreatorTool></rdf:Description>
<rdf:Description rdf:about='23B7679B-EEDE-57C7-267A-95E8A8FE1EFC' xmlns:dc='http://purl.org/dc/elements/1.1/'><dc:format>application/pdf</dc:format><dc:description><rdf:Alt><rdf:li xml:lang='x-default'></rdf:li></rdf:Alt></dc:description><dc:creator><rdf:Seq><rdf:li>Windows User</rdf:li></rdf:Seq></dc:creator><dc:title><rdf:Alt><rdf:li xml:lang='x-default'></rdf:li></rdf:Alt></dc:title></rdf:Description>
<rdf:Description rdf:about='23B7679B-EEDE-57C7-267A-95E8A8FE1EFC' xmlns:xmpMM='http://ns.adobe.com/xap/1.0/mm/'><xmpMM:DocumentID>uuid:008A1793-EDB4-5D17-C264-47F9AB37C26F</xmpMM:DocumentID><xmpMM:InstanceID>uuid:23B7679B-EEDE-57C7-267A-95E8A8FE1EFC</xmpMM:InstanceID></rdf:Description>

Neevia Document Converter Pro is a software product that dynamically converts Microsoft Office 2007/2010/2013/2016/2019/365, WordPerfect, HTML, AutoCAD DWG/DWF, EML, MSG, PostScript and many other document types to PDF, PDF/A, PostScript, JPEG, TIFF, PNG, PCX, BMP. To me, this indicates that they created the document in Word and then used Neevia to convert it to PDF, which is a little strange since Word can already export to PDF, but maybe they wanted to control the meta data.

Essentially, it looks like the trick is to get me to fill out the PDF and reply to the fake gov address. I don't know if this is just for data collection, or to establish contact, or what the purpose is.

I checked our various logs and servers to see if that IP, or one similar, had contacted any of our systems but no luck.

In any case, I'm not sure we are the right people to send spear phishes to, but I appreciate it as it gives me more content for my blog and sometimes I get novel techniques I can reuse.

Thanks for reading.

A.