IOC Report
RemittanceCopy389.html

loading gif

Files

File Path
Type
Category
Malicious
RemittanceCopy389.html
HTML document, ASCII text, with CRLF line terminators
initial sample
malicious
Chrome Cache Entry: 136
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 2905
downloaded
Chrome Cache Entry: 137
troff or preprocessor input, ASCII text, with very long lines (372)
downloaded
Chrome Cache Entry: 138
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 7390
downloaded
Chrome Cache Entry: 139
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 140
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 250
dropped
Chrome Cache Entry: 141
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 2905
dropped
Chrome Cache Entry: 142
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 7390
dropped
Chrome Cache Entry: 143
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 250
downloaded
Chrome Cache Entry: 144
ASCII text, with very long lines (32030)
downloaded
Chrome Cache Entry: 145
ASCII text, with very long lines (65536), with no line terminators
downloaded

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "C:\Users\user\Desktop\RemittanceCopy389.html"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 --field-trial-handle=1948,i,4964140377372381568,1844792585278010681,262144 /prefetch:8

URLs

Name
IP
Malicious
file:///C:/Users/user/Desktop/RemittanceCopy389.html#
malicious
file:///C:/Users/user/Desktop/RemittanceCopy389.html
malicious
https://rounded-screeching-script.glitch.me/dats.js
44.197.227.46
https://rounded-screeching-script.glitch.me/set.js
44.197.227.46
https://abbalandscape.info/wp-ad/c188fdc.php
185.244.151.84
http://fontawesome.io
unknown
https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/font-awesome.css
104.17.24.14
https://code.jquery.com/jquery-3.1.1.min.js
151.101.130.137
http://fontawesome.io/license
unknown

Domains

Name
IP
Malicious
rounded-screeching-script.glitch.me
44.197.227.46
s-part-0016.t-0009.t-msedge.net
13.107.246.44
code.jquery.com
151.101.130.137
cdnjs.cloudflare.com
104.17.24.14
www.google.com
216.58.206.68
abbalandscape.info
185.244.151.84
s-part-0032.t-0009.t-msedge.net
13.107.246.60

IPs

IP
Domain
Country
Malicious
104.17.24.14
cdnjs.cloudflare.com
United States
44.197.227.46
rounded-screeching-script.glitch.me
United States
13.107.246.44
s-part-0016.t-0009.t-msedge.net
United States
192.168.2.4
unknown
unknown
13.107.246.60
s-part-0032.t-0009.t-msedge.net
United States
192.168.2.6
unknown
unknown
151.101.130.137
code.jquery.com
United States
216.58.206.68
www.google.com
United States
185.244.151.84
abbalandscape.info
Netherlands
192.168.2.5
unknown
unknown
239.255.255.250
unknown
Reserved
142.250.185.164
unknown
United States
There are 2 hidden IPs, click here to show them.

DOM / HTML

URL
Malicious
file:///C:/Users/user/Desktop/RemittanceCopy389.html
malicious
file:///C:/Users/user/Desktop/RemittanceCopy389.html#
malicious