IOC Report
https://library.wic.ac.uk/upload/~/app/step3.php?id=5384235

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 21 10:16:48 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 21 10:16:48 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 21 10:16:48 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 21 10:16:48 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 21 10:16:48 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 132
PNG image data, 176 x 50, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 133
ASCII text, with very long lines (1572)
downloaded
Chrome Cache Entry: 134
PNG image data, 24 x 24, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 135
PNG image data, 145 x 30, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 136
ASCII text, with very long lines (542)
dropped
Chrome Cache Entry: 137
PNG image data, 6 x 20, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 138
ASCII text, with very long lines (65317)
dropped
Chrome Cache Entry: 139
PNG image data, 150 x 30, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 140
PNG image data, 90 x 30, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 141
PNG image data, 85 x 30, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 142
PNG image data, 145 x 30, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 143
PNG image data, 26 x 26, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 144
MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
Chrome Cache Entry: 145
Unicode text, UTF-8 text, with very long lines (65306)
downloaded
Chrome Cache Entry: 146
PNG image data, 26 x 26, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 147
PNG image data, 6 x 20, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 148
ASCII text, with very long lines (41897), with CRLF line terminators
downloaded
Chrome Cache Entry: 149
PNG image data, 85 x 30, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 150
PNG image data, 14 x 8, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 151
ASCII text, with CRLF line terminators
dropped
Chrome Cache Entry: 152
PNG image data, 24 x 24, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 153
Web Open Font Format (Version 2), TrueType, length 48236, version 1.0
downloaded
Chrome Cache Entry: 154
PNG image data, 14 x 8, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 155
ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 156
PNG image data, 176 x 50, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 157
MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
downloaded
Chrome Cache Entry: 158
ASCII text, with very long lines (542)
downloaded
Chrome Cache Entry: 159
PNG image data, 90 x 30, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 160
ASCII text, with very long lines (65447)
downloaded
Chrome Cache Entry: 161
PNG image data, 150 x 30, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 162
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 163
ASCII text, with very long lines (7353), with CRLF line terminators
downloaded
Chrome Cache Entry: 164
ASCII text, with very long lines (65317)
downloaded
There are 30 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1992,i,7149571126012766585,10761904357655108780,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://library.wic.ac.uk/upload/~/app/step3.php?id=5384235"

URLs

Name
IP
Malicious
https://library.wic.ac.uk/upload/~/app/step3.php?id=5384235
malicious
https://library.wic.ac.uk/upload/~/app/step3.php?id=5384235
malicious
https://fontawesome.com
unknown
https://library.wic.ac.uk/upload/~/app/media/imgs/dots.png
195.224.222.59
https://library.wic.ac.uk/upload/~/app/media/imgs/social.png
195.224.222.59
https://library.wic.ac.uk/upload/~/app/media/imgs/logo.png
195.224.222.59
https://library.wic.ac.uk/upload/~/app/media/imgs/header-icon2.png
195.224.222.59
https://library.wic.ac.uk/upload/~/app/media/imgs/header-icon3.png
195.224.222.59
https://cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/js/bootstrap.bundle.min.js
151.101.65.229
http://www.day.com/dam/1.0
unknown
https://library.wic.ac.uk/upload/~/app/media/imgs/icon3.png
195.224.222.59
https://github.com/twbs/bootstrap/blob/main/LICENSE)
unknown
https://library.wic.ac.uk/upload/~/app/media/imgs/icon1.png
195.224.222.59
https://cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/css/bootstrap.min.css
151.101.65.229
https://library.wic.ac.uk/upload/~/app/media/imgs/arrow.png
195.224.222.59
https://library.wic.ac.uk/upload/~/app/media/css/helpers.css
195.224.222.59
https://library.wic.ac.uk/upload/~/app/media/js/js.js
195.224.222.59
https://library.wic.ac.uk/upload/~/app/media/css/style.css
195.224.222.59
https://library.wic.ac.uk/upload/~/app/media/imgs/header-icon1.png
195.224.222.59
https://library.wic.ac.uk/upload/~/app/media/imgs/ff.ico
195.224.222.59
https://cdnjs.cloudflare.com/ajax/libs/jquery.mask/1.14.16/jquery.mask.min.js
104.17.24.14
https://getbootstrap.com/)
unknown
https://code.jquery.com/jquery-3.6.1.min.js
151.101.194.137
https://cdnjs.cloudflare.com/ajax/libs/font-awesome/6.2.0/js/all.min.js
104.17.24.14
https://fontawesome.com/license/free
unknown
There are 14 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
library.wic.ac.uk
195.224.222.59
malicious
jsdelivr.map.fastly.net
151.101.65.229
bg.microsoft.map.fastly.net
199.232.214.172
code.jquery.com
151.101.194.137
cdnjs.cloudflare.com
104.17.24.14
www.google.com
142.250.185.164
fp2e7a.wpc.phicdn.net
192.229.221.95
cdn.jsdelivr.net
unknown

IPs

IP
Domain
Country
Malicious
195.224.222.59
library.wic.ac.uk
United Kingdom
malicious
104.17.24.14
cdnjs.cloudflare.com
United States
151.101.65.229
jsdelivr.map.fastly.net
United States
192.168.2.5
unknown
unknown
192.168.2.10
unknown
unknown
239.255.255.250
unknown
Reserved
142.250.185.164
www.google.com
United States
151.101.194.137
code.jquery.com
United States
104.17.25.14
unknown
United States

DOM / HTML

URL
Malicious
https://library.wic.ac.uk/upload/~/app/step3.php?id=5384235
malicious