IOC Report
file.bat

loading gif

Files

File Path
Type
Category
Malicious
file.bat
DOS batch file, ASCII text, with CRLF line terminators
initial sample
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping7120_1970308789\LICENSE
ASCII text
dropped
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping7120_1970308789\_metadata\verified_contents.json
JSON data
dropped
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping7120_1970308789\manifest.fingerprint
ASCII text, with no line terminators
dropped
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping7120_1970308789\manifest.json
JSON data
dropped
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping7120_1970308789\sets.json
JSON data
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\file.bat" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /K "C:\Users\user\Desktop\file.bat" MY_FLAG
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://valuable-gazette-shock-medication.trycloudflare.com/SCANNED.pdf
C:\Windows\System32\cmd.exe
cmd /c ""C:\Users\user\Pictures\kam.cmd""
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c ""C:\Users\user\Pictures\las.cmd""
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c ""C:\Users\user\Pictures\zap.cmd""
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c ""C:\Users\user\Pictures\sample.cmd""
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c ""C:\Users\user\Pictures\xff.cmd""
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c ""C:\Users\user\Pictures\time.cmd""
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c ""C:\Users\user\Pictures\upload.cmd""
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2684 --field-trial-handle=2636,i,6799672374632597056,542459975997173422,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\System32\cmd.exe
cmd /c ""C:\Users\user\Pictures\update.cmd""
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c ""C:\Users\user\Pictures\info.cmd""
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 14 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://wieistmeineip.de
unknown
https://mercadoshops.com.co
unknown
https://gliadomain.com
unknown
https://poalim.xyz
unknown
https://mercadolivre.com
unknown
https://reshim.org
unknown
https://nourishingpursuits.com
unknown
https://medonet.pl
unknown
https://unotv.com
unknown
https://mercadoshops.com.br
unknown
https://joyreactor.cc
unknown
https://zdrowietvn.pl
unknown
https://songstats.com
unknown
https://baomoi.com
unknown
https://supereva.it
unknown
https://elfinancierocr.com
unknown
https://bolasport.com
unknown
https://rws1nvtvt.com
unknown
https://desimartini.com
unknown
https://hearty.app
unknown
https://hearty.gift
unknown
https://mercadoshops.com
unknown
https://heartymail.com
unknown
https://radio2.be
unknown
https://finn.no
unknown
https://hc1.com
unknown
https://kompas.tv
unknown
https://mystudentdashboard.com
unknown
https://songshare.com
unknown
https://mercadopago.com.mx
unknown
https://talkdeskqaid.com
unknown
https://mercadopago.com.pe
unknown
https://cardsayings.net
unknown
https://mightytext.net
unknown
https://pudelek.pl
unknown
https://joyreactor.com
unknown
https://cookreactor.com
unknown
https://wildixin.com
unknown
https://eworkbookcloud.com
unknown
https://nacion.com
unknown
https://chennien.com
unknown
https://mercadopago.cl
unknown
https://talkdeskstgid.com
unknown
https://bonvivir.com
unknown
https://carcostadvisor.be
unknown
https://salemovetravel.com
unknown
https://wpext.pl
unknown
https://welt.de
unknown
https://poalim.site
unknown
https://blackrockadvisorelite.it
unknown
https://cafemedia.com
unknown
https://mercadoshops.com.ar
unknown
https://elpais.uy
unknown
https://landyrev.com
unknown
https://commentcamarche.com
unknown
https://tucarro.com.ve
unknown
https://rws3nvtvt.com
unknown
https://eleconomista.net
unknown
https://mercadolivre.com.br
unknown
https://clmbtech.com
unknown
https://standardsandpraiserepurpose.com
unknown
https://salemovefinancial.com
unknown
https://mercadopago.com.br
unknown
https://commentcamarche.net
unknown
https://etfacademy.it
unknown
https://mighty-app.appspot.com
unknown
https://hj.rs
unknown
https://hearty.me
unknown
https://mercadolibre.com.gt
unknown
https://timesinternet.in
unknown
https://idbs-staging.com
unknown
https://blackrock.com
unknown
https://idbs-eworkbook.com
unknown
https://mercadolibre.co.cr
unknown
https://hjck.com
unknown
https://vrt.be
unknown
https://prisjakt.no
unknown
https://kompas.com
unknown
https://idbs-dev.com
unknown
https://wingify.com
unknown
https://mercadolibre.cl
unknown
https://player.pl
unknown
https://mercadopago.com.ar
unknown
https://mercadolibre.com.hn
unknown
https://linternaute.com
unknown
https://tucarro.com.co
unknown
https://landyrev.ru
unknown
https://clarosports.com
unknown
https://een.be
unknown
https://nien.com
unknown
https://punjabijagran.com
unknown
https://cmxd.com.mx
unknown
https://grupolpg.sv
unknown
https://rws2nvtvt.com
unknown
https://abczdrowie.pl
unknown
https://gallito.com.uy
unknown
https://money.pl
unknown
https://mercadolibre.com.ve
unknown
https://stripe.network
unknown
https://ocdn.eu
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
google.com
142.250.186.46
www.google.com
142.250.185.164
valuable-gazette-shock-medication.trycloudflare.com
unknown

IPs

IP
Domain
Country
Malicious
239.255.255.250
unknown
Reserved
142.250.185.164
www.google.com
United States
192.168.2.7
unknown
unknown
192.168.2.16
unknown
unknown