IOC Report
fileN.cmd

loading gif

Files

File Path
Type
Category
Malicious
fileN.cmd
DOS batch file, ASCII text, with CRLF line terminators
initial sample
Chrome Cache Entry: 47
HTML document, ASCII text
downloaded
Chrome Cache Entry: 48
HTML document, ASCII text
downloaded

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\fileN.cmd" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://s2r.tn/cgi/INVOICERVSHA.pdf
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2080 --field-trial-handle=2016,i,2758172289711227357,3117054335507487613,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://s2r.tn/cgi/INVOICERVSHA.pdf
https://s2r.tn/favicon.ico
70.38.21.234

Domains

Name
IP
Malicious
s2r.tn
70.38.21.234
www.google.com
216.58.212.132

IPs

IP
Domain
Country
Malicious
70.38.21.234
s2r.tn
Canada
239.255.255.250
unknown
Reserved
216.58.212.132
www.google.com
United States
192.168.2.6
unknown
unknown

DOM / HTML

URL
Malicious
https://s2r.tn/cgi/INVOICERVSHA.pdf