IOC Report
https://docs.google.com/uc?export=download&id=1gucHUhrnC0jRDGAhRfRkCK8rYqf0o3cv

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\Downloads\FALLO SEGUNDA INSTANCIA TUTELA RAD 19-2024-10134-01.zip (copy)
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\unarchiver.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 22:08:29 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 22:08:28 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 5 07:00:51 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 22:08:28 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 22:08:29 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 22:08:28 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\Downloads\012301b8-d4a6-4e56-81d7-61a09fb43fd8.tmp
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\Downloads\FALLO SEGUNDA INSTANCIA TUTELA RAD 19-2024-10134-01.zip.crdownload (copy)
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
Chrome Cache Entry: 59
Zip archive data, at least v2.0 to extract, compression method=deflate
downloaded
Chrome Cache Entry: 60
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2060 --field-trial-handle=2016,i,16869703180556477407,8708892340595785305,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://docs.google.com/uc?export=download&id=1gucHUhrnC0jRDGAhRfRkCK8rYqf0o3cv"
malicious
C:\Windows\SysWOW64\unarchiver.exe
"C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Downloads\FALLO SEGUNDA INSTANCIA TUTELA RAD 19-2024-10134-01.zip"
C:\Windows\SysWOW64\7za.exe
"C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\qhqxwr2q.1y1" "C:\Users\user\Downloads\FALLO SEGUNDA INSTANCIA TUTELA RAD 19-2024-10134-01.zip"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Domains

Name
IP
Malicious
docs.google.com
142.250.186.78
drive.usercontent.google.com
142.250.184.193
www.google.com
216.58.206.68
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
142.250.186.78
docs.google.com
United States
239.255.255.250
unknown
Reserved
142.250.184.193
drive.usercontent.google.com
United States
192.168.2.8
unknown
unknown
216.58.206.68
www.google.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
2B63000
trusted library allocation
page read and write
51C000
stack
page read and write
DC7000
trusted library allocation
page execute and read and write
E0E000
stack
page read and write
26F0000
heap
page read and write
D70000
trusted library allocation
page read and write
4D1E000
stack
page read and write
2AF1000
trusted library allocation
page read and write
27AE000
stack
page read and write
2500000
heap
page read and write
B2F000
stack
page read and write
E5E000
stack
page read and write
4F5A000
stack
page read and write
99B000
heap
page read and write
1090000
heap
page read and write
2B73000
trusted library allocation
page read and write
2BA3000
trusted library allocation
page read and write
A09000
heap
page read and write
580000
heap
page read and write
2B40000
trusted library allocation
page read and write
2B9A000
trusted library allocation
page read and write
7FAB0000
trusted library allocation
page execute and read and write
2B69000
trusted library allocation
page read and write
960000
trusted library allocation
page read and write
9DC000
heap
page read and write
D5F000
stack
page read and write
2B4D000
trusted library allocation
page read and write
2BAE000
trusted library allocation
page read and write
2B2E000
trusted library allocation
page read and write
99E000
heap
page read and write
523F000
stack
page read and write
EA0000
heap
page execute and read and write
8FB000
stack
page read and write
4FFE000
stack
page read and write
D82000
trusted library allocation
page execute and read and write
2BB1000
trusted library allocation
page read and write
DAA000
trusted library allocation
page execute and read and write
820000
heap
page read and write
D8A000
trusted library allocation
page execute and read and write
5B0000
heap
page read and write
C5F000
stack
page read and write
950000
heap
page read and write
2BA8000
trusted library allocation
page read and write
4C8E000
stack
page read and write
590000
heap
page read and write
2B8F000
trusted library allocation
page read and write
3AF1000
trusted library allocation
page read and write
65C000
stack
page read and write
513E000
stack
page read and write
5E0000
heap
page read and write
2BA0000
trusted library allocation
page read and write
2B52000
trusted library allocation
page read and write
8F9000
stack
page read and write
2B2C000
trusted library allocation
page read and write
4E5D000
stack
page read and write
DBA000
trusted library allocation
page execute and read and write
2B92000
trusted library allocation
page read and write
2BAB000
trusted library allocation
page read and write
50FE000
stack
page read and write
D9A000
trusted library allocation
page execute and read and write
2B66000
trusted library allocation
page read and write
2B60000
trusted library allocation
page read and write
2B70000
trusted library allocation
page read and write
2BB6000
trusted library allocation
page read and write
2B55000
trusted library allocation
page read and write
2B20000
trusted library allocation
page read and write
DB2000
trusted library allocation
page execute and read and write
2B9D000
trusted library allocation
page read and write
DCB000
trusted library allocation
page execute and read and write
2B89000
trusted library allocation
page read and write
2B47000
trusted library allocation
page read and write
7C0000
heap
page read and write
5240000
trusted library allocation
page read and write
8F6000
stack
page read and write
2BB4000
trusted library allocation
page read and write
26F5000
heap
page read and write
93E000
stack
page read and write
97E000
stack
page read and write
5C0000
heap
page read and write
93E000
stack
page read and write
B68000
heap
page read and write
2B8C000
trusted library allocation
page read and write
D90000
trusted library allocation
page read and write
5C6000
heap
page read and write
9CD000
heap
page read and write
B60000
heap
page read and write
ED0000
heap
page read and write
E80000
trusted library allocation
page read and write
D5F000
stack
page read and write
E90000
trusted library allocation
page execute and read and write
2B25000
trusted library allocation
page read and write
4E1D000
stack
page read and write
A0E000
heap
page read and write
75D000
stack
page read and write
80E000
stack
page read and write
810000
heap
page read and write
9E4000
heap
page read and write
990000
heap
page read and write
D9C000
trusted library allocation
page execute and read and write
2B38000
trusted library allocation
page read and write
D92000
trusted library allocation
page execute and read and write
9B6000
heap
page read and write
There are 92 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://drive.usercontent.google.com/download?id=1gucHUhrnC0jRDGAhRfRkCK8rYqf0o3cv&export=download
malicious