IOC Report
https://is.gd/by2jss

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Oct 6 17:27:20 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Oct 6 17:27:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Oct 6 17:27:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Oct 6 17:27:20 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Oct 6 17:27:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 136
PNG image data, 440 x 87, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 137
Web Open Font Format (Version 2), TrueType, length 7816, version 1.0
downloaded
Chrome Cache Entry: 138
PNG image data, 30 x 28, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 139
PNG image data, 51 x 51, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 140
gzip compressed data, from Unix, original size modulo 2^32 85578
downloaded
Chrome Cache Entry: 141
gzip compressed data, from Unix, original size modulo 2^32 19188
dropped
Chrome Cache Entry: 142
gzip compressed data, from Unix, original size modulo 2^32 86709
dropped
Chrome Cache Entry: 143
PNG image data, 30 x 28, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 144
ASCII text, with very long lines (1100), with no line terminators
downloaded
Chrome Cache Entry: 145
PNG image data, 197 x 46, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 146
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 147
Web Open Font Format (Version 2), TrueType, length 5552, version 1.0
downloaded
Chrome Cache Entry: 148
gzip compressed data, from Unix, original size modulo 2^32 271751
dropped
Chrome Cache Entry: 149
PNG image data, 30 x 30, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 150
gzip compressed data, from Unix, original size modulo 2^32 86709
downloaded
Chrome Cache Entry: 151
PNG image data, 197 x 46, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 152
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 153
gzip compressed data, from Unix, original size modulo 2^32 60893
downloaded
Chrome Cache Entry: 154
PNG image data, 440 x 87, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 155
PNG image data, 51 x 51, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 156
ASCII text
downloaded
Chrome Cache Entry: 157
PNG image data, 30 x 30, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 158
gzip compressed data, from Unix, original size modulo 2^32 85578
dropped
Chrome Cache Entry: 159
gzip compressed data, from Unix, original size modulo 2^32 19188
downloaded
Chrome Cache Entry: 160
Web Open Font Format (Version 2), TrueType, length 7884, version 1.0
downloaded
Chrome Cache Entry: 161
gzip compressed data, from Unix, original size modulo 2^32 271751
downloaded
There are 23 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2500 --field-trial-handle=2468,i,12268834004386701736,15261720488238249562,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://is.gd/by2jss"

URLs

Name
IP
Malicious
https://is.gd/by2jss
malicious
https://is.gd/by2jss
104.25.234.53
malicious
http://buymore.com.ng/tamask-v2/MT/index.html
malicious
http://buymore.com.ng/tamask-v2/MT/Folder/jquery-3.1.1.min.js
192.185.129.112
http://buymore.com.ng/tamask-v2/MT/Folder/tada.png
192.185.129.112
http://buymore.com.ng/tamask-v2/MT/Folder/popper.min.js
192.185.129.112
http://buymore.com.ng/tamask-v2/MT/Folder/eye-close.png
192.185.129.112
http://buymore.com.ng/tamask-v2/MT/Folder/icon.png
192.185.129.112
http://0174meldingen.online/css/Crypto/fonts.png
173.208.194.98
http://buymore.com.ng/tamask-v2/MT/Folder/full.png
192.185.129.112
http://buymore.com.ng/tamask-v2/MT/Folder/logo.png
192.185.129.112
http://buymore.com.ng/tamask-v2/MT/Folder/jquery-3.3.1.js
192.185.129.112
http://buymore.com.ng/tamask-v2/MT/Folder/confirm.png
192.185.129.112
http://buymore.com.ng/tamask-v2/MT/Folder/jquery.min.js
192.185.129.112
There are 3 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
buymore.com.ng
192.185.129.112
malicious
0174meldingen.online
173.208.194.98
www.google.com
142.250.186.164
is.gd
104.25.234.53
fp2e7a.wpc.phicdn.net
192.229.221.95
s-part-0032.t-0009.t-msedge.net
13.107.246.60

IPs

IP
Domain
Country
Malicious
192.185.129.112
buymore.com.ng
United States
malicious
173.208.194.98
0174meldingen.online
United States
192.168.2.5
unknown
unknown
239.255.255.250
unknown
Reserved
104.25.234.53
is.gd
United States
142.250.186.164
www.google.com
United States

DOM / HTML

URL
Malicious
http://buymore.com.ng/tamask-v2/MT/index.html
malicious
http://buymore.com.ng/tamask-v2/MT/index.html
malicious
http://buymore.com.ng/tamask-v2/MT/index.html