IOC Report
https://dgbkufxcsb.com/

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Sep 28 22:35:59 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Sep 28 22:35:59 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Sep 28 22:35:59 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Sep 28 22:35:59 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Sep 28 22:35:59 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 100
Unicode text, UTF-8 text, with very long lines (14526), with no line terminators
dropped
Chrome Cache Entry: 101
Unicode text, UTF-8 text, with very long lines (65535), with no line terminators
dropped
Chrome Cache Entry: 102
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 103
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 104
ASCII text, with very long lines (65299)
dropped
Chrome Cache Entry: 105
Unicode text, UTF-8 text, with very long lines (5450), with no line terminators
dropped
Chrome Cache Entry: 106
ASCII text, with very long lines (65299)
downloaded
Chrome Cache Entry: 107
ASCII text, with very long lines (65326)
downloaded
Chrome Cache Entry: 108
Unicode text, UTF-8 text, with CRLF line terminators
dropped
Chrome Cache Entry: 109
Unicode text, UTF-8 text
dropped
Chrome Cache Entry: 110
Unicode text, UTF-8 text, with very long lines (14526), with no line terminators
downloaded
Chrome Cache Entry: 111
ASCII text, with very long lines (65450), with CRLF line terminators
dropped
Chrome Cache Entry: 112
Unicode text, UTF-8 text
downloaded
Chrome Cache Entry: 80
HTML document, Unicode text, UTF-8 text, with very long lines (638)
downloaded
Chrome Cache Entry: 81
ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 82
ASCII text, with very long lines (65450), with CRLF line terminators
downloaded
Chrome Cache Entry: 83
ASCII text, with very long lines (833), with CRLF line terminators
dropped
Chrome Cache Entry: 84
Unicode text, UTF-8 text, with CRLF line terminators
downloaded
Chrome Cache Entry: 85
ASCII text, with very long lines (833), with CRLF line terminators
downloaded
Chrome Cache Entry: 86
ASCII text, with CRLF line terminators
dropped
Chrome Cache Entry: 87
Unicode text, UTF-8 text, with very long lines (22680)
downloaded
Chrome Cache Entry: 88
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 89
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 90
Unicode text, UTF-8 text, with very long lines (22680)
dropped
Chrome Cache Entry: 91
Unicode text, UTF-8 text, with CRLF line terminators
downloaded
Chrome Cache Entry: 92
Unicode text, UTF-8 text
dropped
Chrome Cache Entry: 93
JSON data
dropped
Chrome Cache Entry: 94
ASCII text, with very long lines (14271), with no line terminators
downloaded
Chrome Cache Entry: 95
Unicode text, UTF-8 text, with very long lines (5450), with no line terminators
downloaded
Chrome Cache Entry: 96
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 97
Unicode text, UTF-8 text, with very long lines (65535), with no line terminators
downloaded
Chrome Cache Entry: 98
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 99
Unicode text, UTF-8 text
downloaded
There are 30 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 --field-trial-handle=2280,i,2116785507049059594,7514917313697356121,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://dgbkufxcsb.com/"

URLs

Name
IP
Malicious
https://dgbkufxcsb.com/
malicious
https://dgbkufxcsb.com/#/
malicious
https://dgbkufxcsb.com/favicon.ico
118.107.57.26
https://www.yahoo.co.jp/
unknown
https://dgbkufxcsb.com/
118.107.57.26
https://dgbkufxcsb.com/css/jquery.confirm-1.1.css
118.107.57.26
https://dgbkufxcsb.com/css/bootstrap.min.css
118.107.57.26
https://dgbkufxcsb.com/js/la/layer.js
118.107.57.26
https://dgbkufxcsb.com/js/chunk-vendors.56b47b1b.js
118.107.57.26
https://dgbkufxcsb.com/js/bootstrap.bundle.min.js
118.107.57.26
https://dgbkufxcsb.com/api/api.php
118.107.57.26
https://github.com/twbs/bootstrap/blob/main/LICENSE)
unknown
http://blog.igorescobar.com
unknown
https://dgbkufxcsb.com/js/la/theme/default/layer.css?v=3.5.1
118.107.57.26
https://github.com/umdjs/umd/blob/master/jqueryPluginCommonjs.js
unknown
https://dgbkufxcsb.com/js/jquery.mask.js
118.107.57.26
https://getbootstrap.com/)
unknown
https://dgbkufxcsb.com/js/jquery-3.5.1.js
118.107.57.26
https://dgbkufxcsb.com/js/app.0be0ded0.js
118.107.57.26
https://github.com/twbs/bootstrap/graphs/contributors)
unknown
http://www.opensource.org/licenses/mit-license.php)
unknown
https://dgbkufxcsb.com/css/app.14b691ba.css
118.107.57.26
https://dgbkufxcsb.com/ResourceConfig/smsConfig.json
118.107.57.26
https://dgbkufxcsb.com/ResourceConfig/config.json
118.107.57.26
https://dgbkufxcsb.com/js/jquery.confirm-1.1.js
118.107.57.26
https://dgbkufxcsb.com/js/470.124d8f1e.js
118.107.57.26
https://dgbkufxcsb.com/img/amex.Csr7hRoy.1696b1b5.svg
118.107.57.26
https://dgbkufxcsb.com/js/jquery.validate.min.js
118.107.57.26
There are 17 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
dgbkufxcsb.com
118.107.57.26
malicious
www.google.com
142.250.74.196
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
118.107.57.26
dgbkufxcsb.com
Singapore
malicious
239.255.255.250
unknown
Reserved
192.168.2.4
unknown
unknown
142.250.74.196
www.google.com
United States
192.168.2.5
unknown
unknown

DOM / HTML

URL
Malicious
https://dgbkufxcsb.com/#/
malicious