IOC Report
https://na3.docusign.net/Signing/EmailStart.aspx?a=0782aff9-d6d8-4dac-885c-1586d7531928&etti=24&acct=41a629a2-9673-4bb0-9a1d-74ba1758b1de&er=6ecab204-b258-4076-9d79-4382672d38d5

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 14:25:52 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 14:25:52 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 14:25:52 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 14:25:52 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 14:25:52 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 100
GIF image data, version 89a, 352 x 3
downloaded
Chrome Cache Entry: 101
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 102
PNG image data, 280 x 60, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 103
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 104
ASCII text, with very long lines (45797)
downloaded
Chrome Cache Entry: 105
Unicode text, UTF-8 (with BOM) text, with no line terminators
downloaded
Chrome Cache Entry: 106
Unicode text, UTF-8 text, with very long lines (32009)
dropped
Chrome Cache Entry: 107
ASCII text, with very long lines (45797)
dropped
Chrome Cache Entry: 108
MS Windows icon resource - 4 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
downloaded
Chrome Cache Entry: 109
ASCII text, with very long lines (14782)
downloaded
Chrome Cache Entry: 110
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 111
ASCII text, with very long lines (64616)
dropped
Chrome Cache Entry: 112
Unicode text, UTF-8 text, with very long lines (32009)
downloaded
Chrome Cache Entry: 113
ASCII text, with very long lines (46591)
dropped
Chrome Cache Entry: 114
ASCII text, with very long lines (64616)
downloaded
Chrome Cache Entry: 115
ASCII text, with very long lines (14782)
dropped
Chrome Cache Entry: 85
HTML document, ASCII text, with very long lines (3450), with CRLF line terminators
downloaded
Chrome Cache Entry: 86
GIF image data, version 89a, 352 x 3
dropped
Chrome Cache Entry: 87
ASCII text, with very long lines (61177)
downloaded
Chrome Cache Entry: 88
ASCII text, with very long lines (46591)
downloaded
Chrome Cache Entry: 89
GIF image data, version 89a, 352 x 3
downloaded
Chrome Cache Entry: 90
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 91
PNG image data, 280 x 60, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 92
GIF image data, version 89a, 352 x 3
dropped
Chrome Cache Entry: 93
MS Windows icon resource - 4 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
Chrome Cache Entry: 94
ASCII text, with very long lines (64612)
dropped
Chrome Cache Entry: 95
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
Chrome Cache Entry: 96
ASCII text, with very long lines (64612)
downloaded
Chrome Cache Entry: 97
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 98
JPEG image data, JFIF standard 1.02, resolution (DPI), density 240x240, segment length 16, comment: "LEADTOOLS v20.0", baseline, precision 8, 1920x1080, components 3
dropped
Chrome Cache Entry: 99
JPEG image data, JFIF standard 1.02, resolution (DPI), density 240x240, segment length 16, comment: "LEADTOOLS v20.0", baseline, precision 8, 1920x1080, components 3
downloaded
There are 28 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2400 --field-trial-handle=2340,i,14020147851678416104,2164507396634301775,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://na3.docusign.net/Signing/EmailStart.aspx?a=0782aff9-d6d8-4dac-885c-1586d7531928&etti=24&acct=41a629a2-9673-4bb0-9a1d-74ba1758b1de&er=6ecab204-b258-4076-9d79-4382672d38d5"

URLs

Name
IP
Malicious
https://na3.docusign.net/Signing/EmailStart.aspx?a=0782aff9-d6d8-4dac-885c-1586d7531928&etti=24&acct=41a629a2-9673-4bb0-9a1d-74ba1758b1de&er=6ecab204-b258-4076-9d79-4382672d38d5
https://login.microsoftonline.com
unknown
https://aadcdn.msftauth.net/shared/1.0/content/js/asyncchunk/convergedlogin_pcustomizationloader_117b650bccea354984d8.js
152.199.21.175
http://www.opensource.org/licenses/mit-license.php)
unknown
https://aadcdn.msftauth.net/shared/1.0/content/js/ConvergedLogin_PCore_QLF_8apNRJD3OCol8jwtxw2.js
152.199.21.175
https://aadcdn.msftauth.net/shared/1.0/content/images/marching_ants_986f40b5a9dc7d39ef8396797f61b323.gif
152.199.21.175
https://aadcdn.msftauth.net/ests/2.1/content/cdnbundles/converged.v2.login.min_nin8k2ycrbzww8zl5vxkaq2.css
152.199.21.175
https://aadcdn.msftauth.net/shared/1.0/content/images/marching_ants_white_8257b0707cbe1d0bd2661b80068676fe.gif
152.199.21.175
https://autologon.microsoftazuread-sso.com/60d56295-773f-4d6d-bad7-84d99a24857a/winauth/ssoprobe?client-request-id=fd1b1a99-6113-4217-a041-c166c59398b9&_=1730215569213
40.126.31.73
https://login.microsoftonline.com/60d56295-773f-4d6d-bad7-84d99a24857a/saml2
https://login.microsoftonline.com/60d56295-773f-4d6d-bad7-84d99a24857a/saml2?sso_reload=true
https://aadcdn.msftauthimages.net/c1c6b6c8-h-ttb-em-kd5rfqxzpifyudj5tfnl06edlfzqbxo8m4/logintenantbranding/0/bannerlogo?ts=637842253396651705
13.107.246.45
https://aadcdn.msftauth.net/shared/1.0/content/images/favicon_a_eupayfgghqiai7k9sol6lg2.ico
152.199.21.175
https://aadcdn.msftauthimages.net/c1c6b6c8-h-ttb-em-kd5rfqxzpifyudj5tfnl06edlfzqbxo8m4/logintenantbranding/0/illustration?ts=637842253392142353
13.107.246.45
https://aadcdn.msftauth.net/shared/1.0/content/images/signin-options_3e3f6b73c3f310c31d2c4d131a8ab8c6.svg
152.199.21.175
http://knockoutjs.com/
unknown
https://aadcdn.msftauth.net/shared/1.0/content/js/asyncchunk/convergedlogin_pfetchsessionsprogress_d0a803279e7397bef834.js
152.199.21.175
https://github.com/douglascrockford/JSON-js
unknown
https://login.windows-ppe.net
unknown
https://aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ux.converged.login.strings-en.min_1yb3e7oii5t28dgo4xrtow2.js
152.199.21.175
http://feross.org
unknown
https://aadcdn.msftauth.net/shared/1.0/content/js/BssoInterrupt_Core_zKox_QMcTIVut7mG_Z9Eew2.js
152.199.21.175
https://aadcdn.msftauth.net/shared/1.0/content/js/asyncchunk/convergedlogin_pstringcustomizationhelper_4285088f1dbaf52a876d.js
152.199.21.175
There are 12 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
s-part-0016.t-0009.t-msedge.net
13.107.246.44
bg.microsoft.map.fastly.net
199.232.210.172
s-part-0017.t-0009.fb-t-msedge.net
13.107.253.45
sni1gl.wpc.omegacdn.net
152.199.21.175
s-part-0017.t-0009.t-msedge.net
13.107.246.45
www.google.com
172.217.16.196
fp2e7a.wpc.phicdn.net
192.229.221.95
autologon.microsoftazuread-sso.com
40.126.31.73
account.docusign.com
unknown
na3.docusign.net
unknown
identity.nel.measure.office.net
unknown
aadcdn.msftauth.net
unknown
login.microsoftonline.com
unknown
aadcdn.msftauthimages.net
unknown
There are 4 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
13.107.246.45
s-part-0017.t-0009.t-msedge.net
United States
13.107.246.44
s-part-0016.t-0009.t-msedge.net
United States
192.168.2.5
unknown
unknown
40.126.31.73
autologon.microsoftazuread-sso.com
United States
239.255.255.250
unknown
Reserved
192.168.2.13
unknown
unknown
192.168.2.15
unknown
unknown
152.199.21.175
sni1gl.wpc.omegacdn.net
United States
172.217.16.196
www.google.com
United States

DOM / HTML

URL
Malicious
https://account.docusign.com/oauth/auth?response_type=code&client_id=25e09398-0344-490c-8e53-3ab2ca5627bf&redirect_uri=https%3A%2F%2Fna3.docusign.net%2Fmember%2FAccountServerCallback.aspx&state=eyJFbnZlbG9wZUlkIjoiMmM1MzRiYjgtZGMxNS00M2UwLWFmMmItYWM1NGQ2NjUyMTA0IiwiUmVjaXBpZW50SWQiOiI2ZWNhYjIwNC1iMjU4LTQwNzYtOWQ3OS00MzgyNjcyZDM4ZDUiLCJIYXNoIjoiMzNFMERFOTBGRUE2NEM3MTQyQUY4NkFBQ0E1RkI5MkM5MDRFNTgxNkJBN0IwRjNEOUZFREE3MTMwMzQ1RjA1MCIsIkNsaWVudElkIjoiMjVlMDkzOTgtMDM0NC00OTBjLThlNTMtM2FiMmNhNTYyN2JmIiwiVHJhbnNhY3Rpb25JZCI6IiIsIkNvcnJlbGF0aW9uVG9rZW4iOiI5ZDQ5NzdmMC03M2YwLTRlYjgtYjE1NS02Nzc4Mzg1YzFlOGQiLCJTaWduaW5nUGF0aFBhcnRVcmwiOiIifQ%3D%3D&login_hint=thomas.dreier%40axpo-systems.com&ui_locales=en
https://login.microsoftonline.com/60d56295-773f-4d6d-bad7-84d99a24857a/saml2
https://login.microsoftonline.com/60d56295-773f-4d6d-bad7-84d99a24857a/saml2?sso_reload=true
https://login.microsoftonline.com/60d56295-773f-4d6d-bad7-84d99a24857a/saml2?sso_reload=true
https://login.microsoftonline.com/60d56295-773f-4d6d-bad7-84d99a24857a/saml2?sso_reload=true
https://login.microsoftonline.com/60d56295-773f-4d6d-bad7-84d99a24857a/saml2?sso_reload=true