IOC Report
https://ek3k.workspectrumhub.com/bdDURYAV

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 25 12:39:47 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 25 12:39:47 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 25 12:39:47 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 25 12:39:47 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 25 12:39:47 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 62
PNG image data, 37 x 44, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 63
PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 64
ASCII text, with very long lines (47671)
dropped
Chrome Cache Entry: 65
PNG image data, 37 x 44, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 66
HTML document, ASCII text, with very long lines (8586)
downloaded
Chrome Cache Entry: 67
MS Windows icon resource - 3 icons, 32x32, 32 bits/pixel, 24x24, 32 bits/pixel
dropped
Chrome Cache Entry: 68
MS Windows icon resource - 3 icons, 32x32, 32 bits/pixel, 24x24, 32 bits/pixel
downloaded
Chrome Cache Entry: 69
PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 70
ASCII text, with very long lines (47671)
downloaded
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2556 --field-trial-handle=2168,i,11812067590360676007,13144369932760024317,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://ek3k.workspectrumhub.com/bdDURYAV"

URLs

Name
IP
Malicious
https://ek3k.workspectrumhub.com/bdDURYAV
malicious
https://ek3k.workspectrumhub.com/bdDURYAV
malicious
https://challenges.cloudflare.com/turnstile/v0/b/e1a56f38220d/api.js
104.18.95.41
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/tkiv3/0x4AAAAAAAe9WKYS0Fw36sxk/auto/fbE/normal/auto/
104.18.94.41
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/cmg/1
104.18.94.41
https://ek3k.workspectrumhub.com/owa/favicon.ico
188.114.96.3
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/pat/8d829d7e6e4dddb4/1729863595957/984f12ef3c102e1dfb921fb307c9b85cb70c973fe1c8c04095f73a5b34ca19c3/NI_v11rHMSwYDBl
104.18.94.41
https://challenges.cloudflare.com/turnstile/v0/api.js?onload=onloadTurnstileCallback
104.18.95.41
https://ek3k.workspectrumhub.com/favicon.ico
188.114.96.3
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/orchestrate/chl_api/v1?ray=8d829d7e6e4dddb4&lang=auto
104.18.94.41
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/i/8d829d7e6e4dddb4/1729863595953/rOx_x5n7teLrpUm
104.18.94.41

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.210.172
ek3k.workspectrumhub.com
188.114.96.3
challenges.cloudflare.com
104.18.95.41
www.google.com
172.217.16.196
default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
217.20.57.22

IPs

IP
Domain
Country
Malicious
239.255.255.250
unknown
Reserved
188.114.96.3
ek3k.workspectrumhub.com
European Union
104.18.94.41
unknown
United States
104.18.95.41
challenges.cloudflare.com
United States
172.217.16.196
www.google.com
United States
192.168.2.5
unknown
unknown

DOM / HTML

URL
Malicious
https://ek3k.workspectrumhub.com/bdDURYAV
https://ek3k.workspectrumhub.com/bdDURYAV