IOC Report
http://mail.w-find.com/icloud-archivos/code2022esp.php

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Oct 13 14:47:34 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Oct 13 14:47:34 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Oct 13 14:47:34 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Oct 13 14:47:34 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Oct 13 14:47:34 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 65
gzip compressed data, from Unix, original size modulo 2^32 4391
downloaded
Chrome Cache Entry: 66
PNG image data, 382 x 50, 4-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 67
gzip compressed data, from Unix, original size modulo 2^32 11816
downloaded
Chrome Cache Entry: 68
gzip compressed data, from Unix, original size modulo 2^32 82736
downloaded
Chrome Cache Entry: 69
gzip compressed data, from Unix, original size modulo 2^32 404
downloaded
Chrome Cache Entry: 70
gzip compressed data, from Unix, original size modulo 2^32 9582
downloaded
Chrome Cache Entry: 71
GIF image data, version 89a, 32 x 32
dropped
Chrome Cache Entry: 72
MS Windows icon resource - 4 icons, 32x32, 8 bits/pixel, 16x16, 8 bits/pixel
downloaded
Chrome Cache Entry: 73
MS Windows icon resource - 4 icons, 32x32, 8 bits/pixel, 16x16, 8 bits/pixel
dropped
Chrome Cache Entry: 74
ASCII text, with very long lines (65447)
dropped
Chrome Cache Entry: 75
PNG image data, 382 x 50, 4-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 76
GIF image data, version 89a, 32 x 32
downloaded
Chrome Cache Entry: 77
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 78
ASCII text, with very long lines (65447)
downloaded
There are 11 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 --field-trial-handle=2212,i,6414971712123106963,358737482875290457,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://mail.w-find.com/icloud-archivos/code2022esp.php"

URLs

Name
IP
Malicious
http://mail.w-find.com/icloud-archivos/code2022esp.php
malicious
http://mail.w-find.com/icloud-archivos/code2022esp.php
malicious
http://mail.w-find.com/sep.png
50.6.138.164
http://mail.w-find.com/icloud-archivos/app.css
50.6.138.164
http://mail.w-find.com/icloud-archivos/myriad-set-pro_text.ttf
50.6.138.164
http://mail.w-find.com/assets/img/ajax-loader.gif
50.6.138.164
http://mail.w-find.com/icloud-archivos/myriad-set-pro_thin.ttf
50.6.138.164
http://mail.w-find.com/icloud-archivos/fonts.css
50.6.138.164
http://mail.w-find.com/icloud-archivos/style.css
50.6.138.164
http://mail.w-find.com/icloud-archivos/myriad-set-pro_thin.woff
50.6.138.164
http://mail.w-find.com/icloud-archivos/myriad-set-pro_text.woff
50.6.138.164
http://mail.w-find.com/favicon.ico
50.6.138.164
There are 1 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.214.172
mail.w-find.com
50.6.138.164
s-part-0044.t-0009.fb-t-msedge.net
13.107.253.72
s-part-0015.t-0009.t-msedge.net
13.107.246.43
s-part-0017.t-0009.t-msedge.net
13.107.246.45
www.google.com
142.250.185.132
fp2e7a.wpc.phicdn.net
192.229.221.95
s-part-0032.t-0009.t-msedge.net
13.107.246.60

IPs

IP
Domain
Country
Malicious
142.250.185.132
www.google.com
United States
192.168.2.4
unknown
unknown
50.6.138.164
mail.w-find.com
United States
192.168.2.5
unknown
unknown
239.255.255.250
unknown
Reserved

DOM / HTML

URL
Malicious
http://mail.w-find.com/icloud-archivos/code2022esp.php