IOC Report
https://edi.huevosanjuan.com.mx/Account/Login?ReturnUrl=%2F

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Aug 29 03:36:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Aug 29 03:36:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Aug 29 03:36:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Aug 29 03:36:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Aug 29 03:36:18 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 100
Web Open Font Format (Version 2), TrueType, length 23040, version 1.0
downloaded
Chrome Cache Entry: 101
JSON data
downloaded
Chrome Cache Entry: 102
ASCII text, with very long lines (55494)
dropped
Chrome Cache Entry: 103
ASCII text, with very long lines (59860), with CRLF line terminators
downloaded
Chrome Cache Entry: 104
Web Open Font Format (Version 2), TrueType, length 78268, version 331.-31196
downloaded
Chrome Cache Entry: 105
PNG image data, 1024 x 1024, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 106
ASCII text, with very long lines (65324)
downloaded
Chrome Cache Entry: 107
ASCII text, with very long lines (55494)
downloaded
Chrome Cache Entry: 108
PNG image data, 32 x 32, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 109
Unicode text, UTF-8 text, with very long lines (24228)
downloaded
Chrome Cache Entry: 110
ASCII text, with very long lines (5607), with CRLF line terminators
downloaded
Chrome Cache Entry: 79
ASCII text, with very long lines (64965), with CRLF line terminators
dropped
Chrome Cache Entry: 80
ASCII text, with very long lines (5607), with CRLF line terminators
dropped
Chrome Cache Entry: 81
Web Open Font Format (Version 2), TrueType, length 13224, version 331.-31196
downloaded
Chrome Cache Entry: 82
ASCII text, with no line terminators
dropped
Chrome Cache Entry: 83
ASCII text, with very long lines (57687)
downloaded
Chrome Cache Entry: 84
ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 85
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 86
ASCII text, with very long lines (64965), with CRLF line terminators
downloaded
Chrome Cache Entry: 87
ASCII text, with CRLF line terminators
dropped
Chrome Cache Entry: 88
Unicode text, UTF-8 text, with very long lines (24228)
dropped
Chrome Cache Entry: 89
ASCII text, with very long lines (13132)
downloaded
Chrome Cache Entry: 90
ASCII text, with very long lines (65451)
downloaded
Chrome Cache Entry: 91
ASCII text, with very long lines (59119)
downloaded
Chrome Cache Entry: 92
ASCII text, with very long lines (13132)
dropped
Chrome Cache Entry: 93
ASCII text
downloaded
Chrome Cache Entry: 94
PNG image data, 32 x 32, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 95
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 96
PNG image data, 1024 x 1024, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 97
ASCII text, with very long lines (65451)
dropped
Chrome Cache Entry: 98
ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 99
Web Open Font Format (Version 2), TrueType, length 23580, version 1.0
downloaded
There are 29 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2008 --field-trial-handle=1952,i,14133914975765218484,15731330687132469167,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://edi.huevosanjuan.com.mx/Account/Login?ReturnUrl=%2F"

URLs

Name
IP
Malicious
https://edi.huevosanjuan.com.mx/Account/Login?ReturnUrl=%2F
https://edi.huevosanjuan.com.mx/Account/Login?ReturnUrl=%2F
https://edi.huevosanjuan.com.mx/site.webmanifest
18.208.216.109
https://edi.huevosanjuan.com.mx/lib/fontAwesome/css/all.min.css
18.208.216.109
https://edi.huevosanjuan.com.mx/lib/bootstrap/css/bootstrap.min.css
18.208.216.109
https://edi.huevosanjuan.com.mx/lib/jquery-validation/jquery.validate.min.js
18.208.216.109
https://edi.huevosanjuan.com.mx/lib/fontAwesome/webfonts/fa-regular-400.woff2
18.208.216.109
https://jqueryvalidation.org/
unknown
https://edi.huevosanjuan.com.mx/lib/fontAwesome/css/fontawesome.min.css
18.208.216.109
https://edi.huevosanjuan.com.mx/favicon-32x32.png
18.208.216.109
https://edi.huevosanjuan.com.mx/lib/fontAwesome/webfonts/fa-solid-900.woff2
18.208.216.109
https://edi.huevosanjuan.com.mx/lib/bootstrap/js/bootstrap.min.js
18.208.216.109
http://opensource.org/licenses/MIT
unknown
https://edi.huevosanjuan.com.mx/lib/isJs/is.min.js
18.208.216.109
http://github.com/semantic-org/semantic-ui/
unknown
https://getbootstrap.com/)
unknown
https://edi.huevosanjuan.com.mx/lib/login/css/login.css
18.208.216.109
https://edi.huevosanjuan.com.mx/lib/semantic/semantic.min.js
18.208.216.109
https://fontawesome.com/license/free
unknown
https://fontawesome.com
unknown
https://edi.huevosanjuan.com.mx/js/site.min.js
18.208.216.109
https://edi.huevosanjuan.com.mx/lib/login/js/login.js
18.208.216.109
https://edi.huevosanjuan.com.mx/lib/jquery-validation-unobtrusive/jquery.validate.unobtrusive.min.js
18.208.216.109
https://github.com/twbs/bootstrap/graphs/contributors)
unknown
https://edi.huevosanjuan.com.mx/images/cart.png
18.208.216.109
https://github.com/Semantic-Org/Semantic-UI
unknown
https://edi.huevosanjuan.com.mx/lib/jquery/jquery.min.js
18.208.216.109
http://www.semantic-ui.com/
unknown
https://github.com/twbs/bootstrap/blob/master/LICENSE)
unknown
https://edi.huevosanjuan.com.mx/lib/semantic/semantic.min.css
18.208.216.109
There are 19 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.210.172
edi.huevosanjuan.com.mx
18.208.216.109
www.google.com
216.58.206.68
fp2e7a.wpc.phicdn.net
192.229.221.95
windowsupdatebg.s.llnwi.net
87.248.205.0

IPs

IP
Domain
Country
Malicious
18.208.216.109
edi.huevosanjuan.com.mx
United States
239.255.255.250
unknown
Reserved
192.168.2.5
unknown
unknown
216.58.206.68
www.google.com
United States

DOM / HTML

URL
Malicious
https://edi.huevosanjuan.com.mx/Account/Login?ReturnUrl=%2F