IOC Report
PAYMENT INV-132_71.html

loading gif

Files

File Path
Type
Category
Malicious
PAYMENT INV-132_71.html
HTML document, ASCII text, with very long lines (1312), with CRLF line terminators
initial sample
malicious
Chrome Cache Entry: 68
PNG image data, 1124 x 1092, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 69
PNG image data, 1124 x 1092, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 70
ASCII text, with very long lines (65482), with CRLF line terminators
downloaded

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "C:\Users\user\Desktop\PAYMENT INV-132_71.html"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 --field-trial-handle=2004,i,9490730442077993374,16922931335629427452,262144 /prefetch:8

URLs

Name
IP
Malicious
file:///C:/Users/user/Desktop/PAYMENT%20INV-132_71.html
malicious
https://bengaladigital.cl/wpfd.js
162.241.61.68

Domains

Name
IP
Malicious
bengaladigital.cl
162.241.61.68
www.google.com
216.58.206.36

IPs

IP
Domain
Country
Malicious
192.168.2.4
unknown
unknown
216.58.206.36
www.google.com
United States
192.168.2.6
unknown
unknown
162.241.61.68
bengaladigital.cl
United States
239.255.255.250
unknown
Reserved

DOM / HTML

URL
Malicious
file:///C:/Users/user/Desktop/PAYMENT%20INV-132_71.html
malicious