IOC Report
https://evt.mdlnk.se/Issues/95a62544-3b20-4dfc-b103-9657a7fca284/Click?ContactId=6a7f28ef-1fb4-4ecc-a626-bfbf4ab83fbd&url=https://e-sign-acrbatslgnatur3-na3d0cu-s3ttl3w3nt-vi3w-d0c-qanz7dg.s3.us-west-2.amazonaws.com/stationaries/confirmation/7253gdhsjHDSGD8374GDHSHDG3746gbds628r637dbf67whd/KtbxLxgVS

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 8 18:20:28 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 8 18:20:28 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 8 18:20:28 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 8 18:20:28 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 8 18:20:28 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 65
ASCII text, with very long lines (47459)
dropped
Chrome Cache Entry: 66
ASCII text, with very long lines (47459)
downloaded
Chrome Cache Entry: 67
PNG image data, 81 x 32, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 68
XML 1.0 document, ASCII text
downloaded
Chrome Cache Entry: 69
PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 70
HTML document, ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 71
PNG image data, 81 x 32, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 72
PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
downloaded
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=2008,i,13671118148332034358,13411952514939327540,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://evt.mdlnk.se/Issues/95a62544-3b20-4dfc-b103-9657a7fca284/Click?ContactId=6a7f28ef-1fb4-4ecc-a626-bfbf4ab83fbd&url=https://e-sign-acrbatslgnatur3-na3d0cu-s3ttl3w3nt-vi3w-d0c-qanz7dg.s3.us-west-2.amazonaws.com/stationaries/confirmation/7253gdhsjHDSGD8374GDHSHDG3746gbds628r637dbf67whd/KtbxLxgVShqnkTnvnxXXfgcmtZDCqxDrLV/pay4app.html&d=DwMCaQ"

URLs

Name
IP
Malicious
https://evt.mdlnk.se/Issues/95a62544-3b20-4dfc-b103-9657a7fca284/Click?ContactId=6a7f28ef-1fb4-4ecc-a626-bfbf4ab83fbd&url=https://e-sign-acrbatslgnatur3-na3d0cu-s3ttl3w3nt-vi3w-d0c-qanz7dg.s3.us-west-2.amazonaws.com/stationaries/confirmation/7253gdhsjHDSGD8374GDHSHDG3746gbds628r637dbf67whd/KtbxLxgVShqnkTnvnxXXfgcmtZDCqxDrLV/pay4app.html&d=DwMCaQ
https://e-sign-acrbatslgnatur3-na3d0cu-s3ttl3w3nt-vi3w-d0c-qanz7dg.s3.us-west-2.amazonaws.com/stationaries/confirmation/7253gdhsjHDSGD8374GDHSHDG3746gbds628r637dbf67whd/KtbxLxgVShqnkTnvnxXXfgcmtZDCqxDrLV/pay4app.html
malicious
https://evt.mdlnk.se/Issues/95a62544-3b20-4dfc-b103-9657a7fca284/Click?ContactId=6a7f28ef-1fb4-4ecc-a626-bfbf4ab83fbd&url=https://e-sign-acrbatslgnatur3-na3d0cu-s3ttl3w3nt-vi3w-d0c-qanz7dg.s3.us-west-2.amazonaws.com/stationaries/confirmation/7253gdhsjHDSGD8374GDHSHDG3746gbds628r637dbf67whd/KtbxLxgVShqnkTnvnxXXfgcmtZDCqxDrLV/pay4app.html&d=DwMCaQ
46.254.8.125
malicious
https://e-sign-acrbatslgnatur3-na3d0cu-s3ttl3w3nt-vi3w-d0c-qanz7dg.s3.us-west-2.amazonaws.com/favicon.ico
3.5.78.156
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/flow/ov1/284141240:1728411387:vfg86CFvIAzxt6F_MJXsf5mDV3GKSDndDb1bkl7s14w/8cf87d8b2ba841f9/50d6d0ed0e3f24e
104.18.95.41
https://challenges.cloudflare.com/turnstile/v0/b/62ec4f065604/api.js
104.18.95.41
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/orchestrate/chl_api/v1?ray=8cf87d8b2ba841f9&lang=auto
104.18.95.41
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/eeqm6/0x4AAAAAAAi6AO_efe7sJb3A/auto/fbE/normal/auto/
104.18.95.41
https://dfme.lawfederal.com/bcBbR/?_kx=iwYTM3KQBZvJDq6ifm4doARxWNjcrGJ66WsjBAl0rrw.U2CpH5?e=
unknown
https://challenges.cloudflare.com/turnstile/v0/api.js
104.18.95.41
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/pat/8cf87d8b2ba841f9/1728415251133/b6538ff273f4d3fcb0985dee52cd30d920779b4a374dc9013edeff859b87b938/6e5SjRP4ws-s1RO
104.18.95.41
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/i/8cf87d8b2ba841f9/1728415251134/xTZCIBDY7XO8KEN
104.18.95.41
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/cmg/1/wh0E0SXYnx6pTBdJW%2Fl926I%2BPRUplRdtQz3K9lHXs%2Fs%3D
104.18.95.41
There are 2 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
s3-r-w.us-west-2.amazonaws.com
3.5.78.156
challenges.cloudflare.com
104.18.95.41
s-part-0017.t-0009.t-msedge.net
13.107.246.45
www.google.com
172.217.23.100
evt.ungapped.io
46.254.8.125
fp2e7a.wpc.phicdn.net
192.229.221.95
s-part-0032.t-0009.t-msedge.net
13.107.246.60
evt.mdlnk.se
unknown
e-sign-acrbatslgnatur3-na3d0cu-s3ttl3w3nt-vi3w-d0c-qanz7dg.s3.us-west-2.amazonaws.com
unknown

IPs

IP
Domain
Country
Malicious
239.255.255.250
unknown
Reserved
3.5.78.156
s3-r-w.us-west-2.amazonaws.com
United States
172.217.23.100
www.google.com
United States
104.18.94.41
unknown
United States
46.254.8.125
evt.ungapped.io
Sweden
104.18.95.41
challenges.cloudflare.com
United States
192.168.2.5
unknown
unknown

DOM / HTML

URL
Malicious
https://e-sign-acrbatslgnatur3-na3d0cu-s3ttl3w3nt-vi3w-d0c-qanz7dg.s3.us-west-2.amazonaws.com/stationaries/confirmation/7253gdhsjHDSGD8374GDHSHDG3746gbds628r637dbf67whd/KtbxLxgVShqnkTnvnxXXfgcmtZDCqxDrLV/pay4app.html
https://e-sign-acrbatslgnatur3-na3d0cu-s3ttl3w3nt-vi3w-d0c-qanz7dg.s3.us-west-2.amazonaws.com/stationaries/confirmation/7253gdhsjHDSGD8374GDHSHDG3746gbds628r637dbf67whd/KtbxLxgVShqnkTnvnxXXfgcmtZDCqxDrLV/pay4app.html
https://e-sign-acrbatslgnatur3-na3d0cu-s3ttl3w3nt-vi3w-d0c-qanz7dg.s3.us-west-2.amazonaws.com/stationaries/confirmation/7253gdhsjHDSGD8374GDHSHDG3746gbds628r637dbf67whd/KtbxLxgVShqnkTnvnxXXfgcmtZDCqxDrLV/pay4app.html