IOC Report
http://bervokter-pdf.vercel.app/

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Oct 13 16:37:25 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Oct 13 16:37:25 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Oct 13 16:37:25 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Oct 13 16:37:25 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Oct 13 16:37:25 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 67
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 68
HTML document, ASCII text
downloaded
Chrome Cache Entry: 69
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 70
ASCII text, with very long lines (1785)
downloaded
Chrome Cache Entry: 71
PNG image data, 400 x 206, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 72
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 73
PNG image data, 512 x 512, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 74
PNG image data, 512 x 512, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 75
ASCII text, with very long lines (37509)
downloaded
Chrome Cache Entry: 76
ASCII text, with very long lines (37509)
dropped
Chrome Cache Entry: 77
PNG image data, 606 x 116, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 78
PNG image data, 606 x 116, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 79
PNG image data, 400 x 206, 8-bit/color RGBA, non-interlaced
downloaded
There are 10 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 --field-trial-handle=2204,i,17366316294336017658,7202924918819156274,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://bervokter-pdf.vercel.app/"

URLs

Name
IP
Malicious
http://bervokter-pdf.vercel.app/
malicious
https://bervokter-pdf.vercel.app/assets/cap-gLOFRe8y.png
76.76.21.164
malicious
http://bervokter-pdf.vercel.app/
76.76.21.164
malicious
https://bervokter-pdf.vercel.app/assets/one-DPd2foRy.png
76.76.21.164
malicious
https://bervokter-pdf.vercel.app/assets/pdf-C_Kx5N2u.png
76.76.21.164
malicious
https://bervokter-pdf.vercel.app/
malicious
https://bervokter-pdf.vercel.app/assets/index-CziX4pvh.js
76.76.21.164
malicious
https://bervokter-pdf.vercel.app/assets/index-om7KAz33.css
76.76.21.164
malicious
https://bervokter-pdf.vercel.app/vite.svg
76.76.21.164
malicious
https://api.telegram.org/bot$
unknown

Domains

Name
IP
Malicious
bervokter-pdf.vercel.app
76.76.21.164
malicious
bg.microsoft.map.fastly.net
199.232.214.172
s-part-0017.t-0009.fb-t-msedge.net
13.107.253.45
s-part-0017.t-0009.t-msedge.net
13.107.246.45
www.google.com
142.250.185.132
fp2e7a.wpc.phicdn.net
192.229.221.95
s-part-0032.t-0009.t-msedge.net
13.107.246.60
windowsupdatebg.s.llnwi.net
46.228.146.128

IPs

IP
Domain
Country
Malicious
76.76.21.164
bervokter-pdf.vercel.app
United States
malicious
76.76.21.9
unknown
United States
239.255.255.250
unknown
Reserved
142.250.185.132
www.google.com
United States
192.168.2.6
unknown
unknown
192.168.2.5
unknown
unknown

DOM / HTML

URL
Malicious
https://bervokter-pdf.vercel.app/
malicious