IOC Report
https://docs.google.com/uc?export=download&id=1gucHUhrnC0jRDGAhRfRkCK8rYqf0o3cv

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\Downloads\FALLO SEGUNDA INSTANCIA TUTELA RAD 19-2024-10134-01.zip (copy)
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\unarchiver.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Downloads\FALLO SEGUNDA INSTANCIA TUTELA RAD 19-2024-10134-01.zip.crdownload
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
Chrome Cache Entry: 49
Zip archive data, at least v2.0 to extract, compression method=deflate
downloaded
Chrome Cache Entry: 50
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2420 --field-trial-handle=1984,i,9041773597454674287,8571613679135902817,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://docs.google.com/uc?export=download&id=1gucHUhrnC0jRDGAhRfRkCK8rYqf0o3cv"
malicious
C:\Windows\SysWOW64\unarchiver.exe
"C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Downloads\FALLO SEGUNDA INSTANCIA TUTELA RAD 19-2024-10134-01.zip"
C:\Windows\SysWOW64\7za.exe
"C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\cbr0q0l4.clz" "C:\Users\user\Downloads\FALLO SEGUNDA INSTANCIA TUTELA RAD 19-2024-10134-01.zip"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Domains

Name
IP
Malicious
docs.google.com
142.250.184.238
bg.microsoft.map.fastly.net
199.232.214.172
s-part-0017.t-0009.t-msedge.net
13.107.246.45
drive.usercontent.google.com
142.250.185.193
www.google.com
172.217.18.4
s-part-0032.t-0009.t-msedge.net
13.107.246.60

IPs

IP
Domain
Country
Malicious
142.250.185.193
drive.usercontent.google.com
United States
239.255.255.250
unknown
Reserved
172.217.18.4
www.google.com
United States
192.168.2.7
unknown
unknown
142.250.184.238
docs.google.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
960000
heap
page read and write
8E4000
heap
page read and write
8F0000
trusted library allocation
page read and write
2A08000
trusted library allocation
page read and write
C40000
trusted library allocation
page read and write
7F0000
heap
page read and write
7EE000
stack
page read and write
968000
heap
page read and write
700000
heap
page read and write
3961000
trusted library allocation
page read and write
710000
heap
page read and write
87E000
stack
page read and write
2A0D000
trusted library allocation
page read and write
840000
trusted library allocation
page read and write
886000
heap
page read and write
2A1B000
trusted library allocation
page read and write
7FAB0000
trusted library allocation
page execute and read and write
2A10000
trusted library allocation
page read and write
66E000
stack
page read and write
B20000
heap
page read and write
86B000
heap
page read and write
A5E000
stack
page read and write
4F9000
stack
page read and write
29E3000
trusted library allocation
page read and write
8BE000
stack
page read and write
B5F000
stack
page read and write
915000
heap
page read and write
A62000
trusted library allocation
page execute and read and write
85A000
trusted library allocation
page execute and read and write
1DC000
stack
page read and write
C50000
trusted library allocation
page execute and read and write
4F0E000
stack
page read and write
49EE000
stack
page read and write
84A000
trusted library allocation
page execute and read and write
8C0000
heap
page read and write
FF0000
trusted library allocation
page read and write
540000
heap
page read and write
8E0000
heap
page read and write
4CCE000
stack
page read and write
A7B000
trusted library allocation
page execute and read and write
820000
trusted library allocation
page read and write
6FD000
stack
page read and write
6A0000
heap
page read and write
860000
heap
page read and write
2A21000
trusted library allocation
page read and write
C2E000
stack
page read and write
29A7000
trusted library allocation
page read and write
4F6000
stack
page read and write
2961000
trusted library allocation
page read and write
2A19000
trusted library allocation
page read and write
832000
trusted library allocation
page execute and read and write
29D6000
trusted library allocation
page read and write
620000
heap
page read and write
2A02000
trusted library allocation
page read and write
4DCE000
stack
page read and write
29AF000
trusted library allocation
page read and write
4AED000
stack
page read and write
A77000
trusted library allocation
page execute and read and write
910000
heap
page read and write
C5F000
stack
page read and write
29FC000
trusted library allocation
page read and write
83A000
trusted library allocation
page execute and read and write
E10000
heap
page execute and read and write
2A1E000
trusted library allocation
page read and write
29F9000
trusted library allocation
page read and write
29D0000
trusted library allocation
page read and write
39C000
stack
page read and write
A6A000
trusted library allocation
page execute and read and write
ABE000
stack
page read and write
2A0A000
trusted library allocation
page read and write
1000000
heap
page read and write
842000
trusted library allocation
page execute and read and write
84C000
trusted library allocation
page execute and read and write
4FB000
stack
page read and write
29B4000
trusted library allocation
page read and write
7AF000
stack
page read and write
89E000
heap
page read and write
8C7000
heap
page read and write
29C2000
trusted library allocation
page read and write
29E0000
trusted library allocation
page read and write
2A24000
trusted library allocation
page read and write
B0E000
stack
page read and write
C70000
heap
page read and write
FBE000
stack
page read and write
29FF000
trusted library allocation
page read and write
4C2A000
stack
page read and write
2A13000
trusted library allocation
page read and write
29B7000
trusted library allocation
page read and write
4B2D000
stack
page read and write
4E0E000
stack
page read and write
6A6000
heap
page read and write
86E000
heap
page read and write
29F7000
trusted library allocation
page read and write
29CA000
trusted library allocation
page read and write
2990000
trusted library allocation
page read and write
29C5000
trusted library allocation
page read and write
2400000
heap
page read and write
8E6000
heap
page read and write
There are 88 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://drive.usercontent.google.com/download?id=1gucHUhrnC0jRDGAhRfRkCK8rYqf0o3cv&export=download
malicious