IOC Report
Employee-SSN.html

loading gif

Files

File Path
Type
Category
Malicious
Employee-SSN.html
HTML document, Unicode text, UTF-8 text, with very long lines (16161), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Nov 20 01:49:22 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Nov 20 01:49:22 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Nov 20 01:49:22 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Nov 20 01:49:22 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Nov 20 01:49:22 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 100
Web Open Font Format, TrueType, length 27799, version 1.0
downloaded
Chrome Cache Entry: 90
ASCII text
downloaded
Chrome Cache Entry: 91
ASCII text, with very long lines (65501)
downloaded
Chrome Cache Entry: 92
ASCII text, with very long lines (65451)
downloaded
Chrome Cache Entry: 93
Web Open Font Format, TrueType, length 28985, version 1.0
downloaded
Chrome Cache Entry: 94
ASCII text, with very long lines (65451)
dropped
Chrome Cache Entry: 95
Web Open Font Format, TrueType, length 28201, version 1.0
downloaded
Chrome Cache Entry: 96
ASCII text
dropped
Chrome Cache Entry: 97
Web Open Font Format, TrueType, length 28825, version 1.0
downloaded
Chrome Cache Entry: 98
Web Open Font Format, CFF, length 16835, version 1.0
downloaded
Chrome Cache Entry: 99
Web Open Font Format, CFF, length 17443, version 1.0
downloaded
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "C:\Users\user\Desktop\Employee-SSN.html"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2476 --field-trial-handle=1872,i,3959837772708319671,5181824506081963404,262144 /prefetch:8

URLs

Name
IP
Malicious
file:///C:/Users/user/Desktop/Employee-SSN.html
malicious
https://www.usaa.com/privacy
unknown
https://z1c4u.com/ologun/hjehje8/secure/easyn/code.php
unknown
https://z1c4u.com/ologun/hjehje8/secure/easyn/pin.php
unknown
http://www.opensource.org/licenses/mit-license.php)
unknown
https://www.usaa.com/inet/pages/accessibility_at_usaa_main?wa_ref=pub_subglobal_footer_accessibility
unknown
https://difficult-amethyst-friction.glitch.me/style.css
54.88.25.112
https://www.usaa.com/join/get-started/
unknown
http://blog.igorescobar.com
unknown
https://github.com/umdjs/umd/blob/master/jqueryPluginCommonjs.js
unknown
https://cdnjs.cloudflare.com/ajax/libs/jquery.mask/1.14.10/jquery.mask.js
104.17.25.14
https://z1c4u.com/ologun/hjehje8/secure/easyn/data.php
unknown
https://www.usaa.com/inet/wc/security_center?0&wa_ref=logon_jump_security_center
unknown
https://z1c4u.com/ologun/hjehje8/secure/easyn/cok.php
unknown
https://ajax.aspnetcdn.com/ajax/jQuery/jquery-3.3.1.min.js
unknown
https://z1c4u.com/ologun/hjehje8/secure/easyn/pnum.php
unknown
https://www.usaa.com/my/logon
unknown
https://www.usaa.com/
unknown
There are 8 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
cdnjs.cloudflare.com
104.17.25.14
difficult-amethyst-friction.glitch.me
54.88.25.112
www.google.com
216.58.206.36
content.usaa.com
unknown
ajax.aspnetcdn.com
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.4
unknown
unknown
216.58.206.36
www.google.com
United States
192.168.2.5
unknown
unknown
239.255.255.250
unknown
Reserved
104.17.25.14
cdnjs.cloudflare.com
United States
54.88.25.112
difficult-amethyst-friction.glitch.me
United States

DOM / HTML

URL
Malicious
file:///C:/Users/user/Desktop/Employee-SSN.html
malicious