IOC Report
https://teluq-my.sharepoint.com/:x:/g/personal/marieke_zavallone_teluq_ca1/EZdyI1xAEL1Ci70C3BzcLaYBtuHkBUTg8lslugx_btEpzw?e=4%3a2LLC34&at=9&xsdata=MDV8MDJ8U2VydmljZXNUSUNAY3NzaGJvLmdvdXYucWMuY2F8YTQ1ODIzYTdkNzlkNDBmYWFkZmMwOGRjYzY4ZjYyYTV8ZDY4Zjk1NTc1ZjRhNDg1MWIwMjY2MWJiZjg0ODI3NDN8MHwwfDYzODYwMzU2N

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Aug 27 15:04:59 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Aug 27 15:04:58 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 5 07:00:51 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Aug 27 15:04:58 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Aug 27 15:04:58 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Aug 27 15:04:58 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 76
ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 77
MS Windows icon resource - 3 icons, 32x32, 32 bits/pixel, 24x24, 32 bits/pixel
downloaded
Chrome Cache Entry: 78
ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 79
MS Windows icon resource - 3 icons, 32x32, 32 bits/pixel, 24x24, 32 bits/pixel
dropped
Chrome Cache Entry: 80
ASCII text, with very long lines (65329), with CRLF line terminators
dropped
Chrome Cache Entry: 81
ASCII text, with very long lines (39257), with CRLF line terminators
downloaded
Chrome Cache Entry: 82
PNG image data, 226 x 48, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 83
ASCII text, with CRLF line terminators
dropped
Chrome Cache Entry: 84
ASCII text, with very long lines (17444)
downloaded
Chrome Cache Entry: 85
ASCII text, with CRLF line terminators
dropped
Chrome Cache Entry: 86
HTML document, Unicode text, UTF-8 text, with very long lines (30522), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 87
PNG image data, 226 x 48, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 88
ASCII text, with very long lines (37521)
downloaded
Chrome Cache Entry: 89
ASCII text, with very long lines (65329), with CRLF line terminators
downloaded
Chrome Cache Entry: 90
XML 1.0 document, Unicode text, UTF-8 (with BOM) text
downloaded
Chrome Cache Entry: 91
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 92
ASCII text, with very long lines (39257), with CRLF line terminators
dropped
Chrome Cache Entry: 93
ASCII text, with very long lines (17444)
dropped
Chrome Cache Entry: 94
ASCII text, with very long lines (37521)
dropped
There are 16 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1892,i,13439455924560854852,1024008919919531949,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://teluq-my.sharepoint.com/:x:/g/personal/marieke_zavallone_teluq_ca1/EZdyI1xAEL1Ci70C3BzcLaYBtuHkBUTg8lslugx_btEpzw?e=4%3a2LLC34&at=9&xsdata=MDV8MDJ8U2VydmljZXNUSUNAY3NzaGJvLmdvdXYucWMuY2F8YTQ1ODIzYTdkNzlkNDBmYWFkZmMwOGRjYzY4ZjYyYTV8ZDY4Zjk1NTc1ZjRhNDg1MWIwMjY2MWJiZjg0ODI3NDN8MHwwfDYzODYwMzU2NjMyOTYyNjM5OXxVbmtub3dufFRXRnBiR1pzYjNkOGV5SldJam9pTUM0d0xqQXdNREFpTENKUUlqb2lWMmx1TXpJaUxDSkJUaUk2SWsxaGFXd2lMQ0pYVkNJNk1uMD18MHx8fA%3d%3d&sdata=ODVoRWMyemdzeHN6S05ER000VzkxditTdkpPYlZoVkRzOTF6dFdybzNwTT0%3d"

URLs

Name
IP
Malicious
https://teluq-my.sharepoint.com/:x:/g/personal/marieke_zavallone_teluq_ca1/EZdyI1xAEL1Ci70C3BzcLaYBtuHkBUTg8lslugx_btEpzw?e=4%3a2LLC34&at=9&xsdata=MDV8MDJ8U2VydmljZXNUSUNAY3NzaGJvLmdvdXYucWMuY2F8YTQ1ODIzYTdkNzlkNDBmYWFkZmMwOGRjYzY4ZjYyYTV8ZDY4Zjk1NTc1ZjRhNDg1MWIwMjY2MWJiZjg0ODI3NDN8MHwwfDYzODYwMzU2NjMyOTYyNjM5OXxVbmtub3dufFRXRnBiR1pzYjNkOGV5SldJam9pTUM0d0xqQXdNREFpTENKUUlqb2lWMmx1TXpJaUxDSkJUaUk2SWsxaGFXd2lMQ0pYVkNJNk1uMD18MHx8fA%3d%3d&sdata=ODVoRWMyemdzeHN6S05ER000VzkxditTdkpPYlZoVkRzOTF6dFdybzNwTT0%3d
http://github.com/jrburke/requirejs
unknown
https://teluq-my.sharepoint.com/personal/marieke_zavallone_teluq_ca1/_layouts/15/images/savexc.png
unknown
https://teluq-my.sharepoint.com/_layouts/15/images/microsoft-logo.png
13.107.136.10
https://teluq-my.sharepoint.com/ScriptResource.axd?d=uwuvlwMwmWtdi0Coaef1vQ3kSeo89Syy2jHYuAGJ8nHskFkBWNyVlwKB4Bak4A-Q8QsnZC4GtjosRU8nUPVP5fQ6YITeXwmTzPgNXDL8mVINUKtiymdLHCXG4k_46V2ew7fLIjvuKmOLT8fQ6BZFsR5hkpIXDy7LK5uQvbRH4TiHxhLh1KTmrieyOEl8Enb50&t=74258c30
13.107.136.10
https://teluq-my.sharepoint.com/ScriptResource.axd?d=d5nJHL_Jk-ug8CmEuLNnGPTGTu-rHajAO2ujVVlrpvWBuIOu6G6tHtBUHRMueYZbkv7G9LzK5YFLZ1dMMb7X-TeH15GMtE1azK0DO89Uq4H2ohBLPdCWD-yMqjNk4aTn8a3RUUbYf2D34ic7Gk0GVt-jxVfgOVan_-PxXC6TOfJ-Izet3_nxegIO97y_8Z9D0&t=74258c30
13.107.136.10
https://spoprod-a.akamaihd.net/files/odsp-common-library-prod_2019-02-15_20190219.002/require.js
unknown
https://reactjs.org/docs/error-decoder.html?invariant=
unknown
https://teluq-my.sharepoint.com/_layouts/15/images/favicon.ico?rev=47
13.107.136.10

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.210.172
k256-all.gslb.ksyuncdn.com
125.39.194.1
dual-spo-0005.spo-msedge.net
13.107.136.10
www.google.com
142.250.186.100
fp2e7a.wpc.phicdn.net
192.229.221.95
teluq-my.sharepoint.com
unknown
m365cdn.nel.measure.office.net
unknown

IPs

IP
Domain
Country
Malicious
13.107.136.10
dual-spo-0005.spo-msedge.net
United States
192.168.2.8
unknown
unknown
192.168.2.22
unknown
unknown
239.255.255.250
unknown
Reserved
142.250.186.100
www.google.com
United States

DOM / HTML

URL
Malicious
https://teluq-my.sharepoint.com/:x:/g/personal/marieke_zavallone_teluq_ca1/EZdyI1xAEL1Ci70C3BzcLaYBtuHkBUTg8lslugx_btEpzw?e=4%3a2LLC34&at=9&xsdata=MDV8MDJ8U2VydmljZXNUSUNAY3NzaGJvLmdvdXYucWMuY2F8YTQ1ODIzYTdkNzlkNDBmYWFkZmMwOGRjYzY4ZjYyYTV8ZDY4Zjk1NTc1ZjRhNDg1MWIwMjY2MWJiZjg0ODI3NDN8MHwwfDYzODYwMzU2NjMyOTYyNjM5OXxVbmtub3dufFRXRnBiR1pzYjNkOGV5SldJam9pTUM0d0xqQXdNREFpTENKUUlqb2lWMmx1TXpJaUxDSkJUaUk2SWsxaGFXd2lMQ0pYVkNJNk1uMD18MHx8fA%3d%3d&sdata=ODVoRWMyemdzeHN6S05ER000VzkxditTdkpPYlZoVkRzOTF6dFdybzNwTT0%3d