IOC Report
wp-4033.php

loading gif

Files

File Path
Type
Category
Malicious
wp-4033.html
HTML document, ASCII text, with CRLF line terminators
initial sample
C:\Program Files\ChromiumTemp2676_1737719147\model-info.pb
data
dropped
C:\Program Files\ChromiumTemp2676_1737719147\model.tflite
data
dropped
C:\Program Files\ChromiumTemp2676_465053166\model-info.pb
data
dropped
C:\Program Files\ChromiumTemp2676_465053166\model.tflite
data
dropped
C:\Program Files\ChromiumTemp2676_727087975\model-info.pb
data
dropped
C:\Program Files\ChromiumTemp2676_727087975\model.tflite
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\5fc08576-4cc1-4646-9725-e5ecb3022a5b\model.tflite (copy)
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\c3243259-25cd-4152-bbdb-e883ab9a4020\model.tflite (copy)
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\e7e374d4-55ef-4d0e-ba6f-730cebc44fb2\model.tflite (copy)
data
dropped
Chrome Cache Entry: 94
PNG image data, 950 x 950, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 95
Web Open Font Format (Version 2), TrueType, length 16552, version 1.0
downloaded
Chrome Cache Entry: 96
ASCII text
downloaded
Chrome Cache Entry: 97
ASCII text
downloaded
Chrome Cache Entry: 98
Web Open Font Format (Version 2), TrueType, length 14344, version 1.0
downloaded
Chrome Cache Entry: 99
PNG image data, 950 x 950, 8-bit/color RGBA, non-interlaced
downloaded
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --start-maximized "C:\Users\user\Desktop\wp-4033.html"
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1464 --field-trial-handle=1280,i,16188122852209060692,12297160335389111313,131072 /prefetch:8

URLs

Name
IP
Malicious
file:///C:/Users/user/Desktop/wp-4033.html
https://i.ibb.co/xzvcd1f/Cyb3r-Drag0nz-Team-1.png
91.134.82.79
https://Mirror-H.xyz/
unknown

Domains

Name
IP
Malicious
www.google.com
172.217.17.36
i.ibb.co
91.134.82.79

IPs

IP
Domain
Country
Malicious
239.255.255.250
unknown
Reserved
172.217.17.36
www.google.com
United States
91.134.9.159
unknown
France
91.134.82.79
i.ibb.co
France

DOM / HTML

URL
Malicious
file:///C:/Users/user/Desktop/wp-4033.html