IOC Report
https://neuraxpharm.eurosbiolab.eu/?__cf_chl_rt_tk=TES3LKGEhjH1G5Ym.iTFDxwaSWwxOocOm2ySKfq7pJU-1716481117-0.0.1.1-1621

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu May 23 15:21:59 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu May 23 15:21:59 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu May 23 15:21:59 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu May 23 15:21:59 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu May 23 15:21:59 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 67
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 68
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 69
HTML document, ASCII text, with very long lines (4020)
downloaded
Chrome Cache Entry: 70
PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 71
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 72
PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 73
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 74
PNG image data, 57 x 28, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 75
ASCII text, with very long lines (7043), with no line terminators
downloaded
Chrome Cache Entry: 76
ASCII text, with very long lines (42526)
downloaded
Chrome Cache Entry: 77
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 78
ASCII text, with very long lines (50758)
downloaded
Chrome Cache Entry: 79
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 80
ASCII text, with very long lines (32065)
downloaded
Chrome Cache Entry: 81
PNG image data, 57 x 28, 8-bit/color RGB, non-interlaced
downloaded
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 --field-trial-handle=2020,i,1608871676901385173,8127745285693893402,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://neuraxpharm.eurosbiolab.eu/?__cf_chl_rt_tk=TES3LKGEhjH1G5Ym.iTFDxwaSWwxOocOm2ySKfq7pJU-1716481117-0.0.1.1-1621"

URLs

Name
IP
Malicious
https://neuraxpharm.eurosbiolab.eu/?__cf_chl_rt_tk=TES3LKGEhjH1G5Ym.iTFDxwaSWwxOocOm2ySKfq7pJU-1716481117-0.0.1.1-1621
malicious
https://github.com/twbs/bootstrap/blob/master/LICENSE)
unknown
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/orchestrate/chl_api/v1?ray=888661f8cf534267
104.17.2.184
https://github.com/twbs/bootstrap/graphs/contributors)
unknown
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/i/888661f8cf534267/1716481328715/jjbZVO2eMyee-WT
104.17.2.184
https://getbootstrap.com/)
unknown
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/flow/ov1/85758309:1716480597:GmAbQwqG4ONR6Dwy9361TUexKo-XIwV7UVEgPfOeOA4/888661f8cf534267/6bb229d5fda7a8c
104.17.2.184
https://a.nel.cloudflare.com/report/v4?s=r8OSZ09Z%2F%2BPpqnYgOWjtb7Ll%2FEDa6pDDbObXbQ2txTud4M6ZjMBBjK8CvxYbUOvL%2BQoT0kbwAGuUO5pheVdGve6Q3MFpUVYrrXTCmTJm36FbYfOukmImf4DRrsS%2BGJMtpbQTKZ3LwhZN32fJjQ%3D%3D
35.190.80.1
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/pat/888661f8cf534267/1716481328714/92f1a38a72d44906b09047bf0cd194c13bcf585e0a7bb494175daaed2d912774/gkR4hgIqOdOJo-_
104.17.2.184
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/cmg/1/wh0E0SXYnx6pTBdJW%2Fl926I%2BPRUplRdtQz3K9lHXs%2Fs%3D
104.17.2.184
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/1zzpq/0x4AAAAAAADnPIDROrmt1Wwj/light/normal
https://a.nel.cloudflare.com/report/v4?s=hr%2BSbpdfJN03KIWtBF%2FV9S8g8mYLO0LScDZ2ZD9y4S9%2B3aN%2B5lqco4IaMnUYIkRaulf5jFKQO3DYQk4i3cm9U9y09KjDB0g7CUfZITdCBNxHeZbIW88qUeZ0TxBp%2BpvW7TDoBBD%2F4eboMI41wA%3D%3D
35.190.80.1
There are 1 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
neuraxpharm.eurosbiolab.eu
188.114.96.3
malicious
a.nel.cloudflare.com
35.190.80.1
challenges.cloudflare.com
104.17.2.184
www.google.com
142.250.186.100
fp2e7a.wpc.phicdn.net
192.229.221.95
windowsupdatebg.s.llnwi.net
87.248.204.0

IPs

IP
Domain
Country
Malicious
188.114.96.3
neuraxpharm.eurosbiolab.eu
European Union
malicious
192.168.2.5
unknown
unknown
239.255.255.250
unknown
Reserved
188.114.97.3
unknown
European Union
35.190.80.1
a.nel.cloudflare.com
United States
142.250.186.100
www.google.com
United States
104.17.2.184
challenges.cloudflare.com
United States

DOM / HTML

URL
Malicious
https://neuraxpharm.eurosbiolab.eu/6fc27ea7f3db2fd9787a0f6b674d5bc4664f6d4ae7ef9LOG6fc27ea7f3db2fd9787a0f6b674d5bc4664f6d4ae7efa
malicious
https://neuraxpharm.eurosbiolab.eu/6fc27ea7f3db2fd9787a0f6b674d5bc4664f6d4ae7ef9LOG6fc27ea7f3db2fd9787a0f6b674d5bc4664f6d4ae7efa
malicious
https://neuraxpharm.eurosbiolab.eu/6fc27ea7f3db2fd9787a0f6b674d5bc4664f6d4ae7ef9LOG6fc27ea7f3db2fd9787a0f6b674d5bc4664f6d4ae7efa#
malicious
https://neuraxpharm.eurosbiolab.eu/?__cf_chl_rt_tk=TES3LKGEhjH1G5Ym.iTFDxwaSWwxOocOm2ySKfq7pJU-1716481117-0.0.1.1-1621
https://neuraxpharm.eurosbiolab.eu/?__cf_chl_rt_tk=TES3LKGEhjH1G5Ym.iTFDxwaSWwxOocOm2ySKfq7pJU-1716481117-0.0.1.1-1621
https://neuraxpharm.eurosbiolab.eu/?__cf_chl_rt_tk=TES3LKGEhjH1G5Ym.iTFDxwaSWwxOocOm2ySKfq7pJU-1716481117-0.0.1.1-1621
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/1zzpq/0x4AAAAAAADnPIDROrmt1Wwj/light/normal
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/1zzpq/0x4AAAAAAADnPIDROrmt1Wwj/light/normal
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/1zzpq/0x4AAAAAAADnPIDROrmt1Wwj/light/normal