IOC Report
https://05kqatnrj9s0snah9.phish.farm/XNWovM1FGWG9WUTJhZEI4SDFaYWZZbTVBV2xEempsNGhRL3lkQUt5VUROTER6K2hlam5jK3hja3VFN2F1d2lnekJqVnpvWkZrNDdsMjFIR1NrNWtucTJReUc5ZWl1K09HZjhheHJJV0hrYmZtbjJpSThsdEwrZUZyN0JMMk5SN3lrSXhqaWZ0S3RaOG93b2t5RTd6OU1XZnJKQU05SXNRTGtzaG5xbE52dWMzOFlzaG9nbDFIckFQQy0tV0NacTU3Ymp2MG

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 23 17:05:58 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 23 17:05:58 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 5 07:00:51 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 23 17:05:58 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 23 17:05:58 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 23 17:05:58 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 64
RIFF (little-endian) data, Web/P image
downloaded
Chrome Cache Entry: 65
Web Open Font Format (Version 2), TrueType, length 9344, version 1.0
downloaded
Chrome Cache Entry: 66
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 67
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 68
ASCII text, with very long lines (65447)
downloaded
Chrome Cache Entry: 69
ASCII text, with very long lines (1572)
downloaded
Chrome Cache Entry: 70
Web Open Font Format (Version 2), TrueType, length 10180, version 1.0
downloaded
Chrome Cache Entry: 71
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 72
Web Open Font Format (Version 2), TrueType, length 17576, version 1.0
downloaded
Chrome Cache Entry: 73
Web Open Font Format (Version 2), TrueType, length 7728, version 1.0
downloaded
Chrome Cache Entry: 74
ASCII text, with very long lines (65371)
downloaded
Chrome Cache Entry: 75
Web Open Font Format (Version 2), TrueType, length 8572, version 1.0
downloaded
Chrome Cache Entry: 76
HTML document, Unicode text, UTF-8 text, with very long lines (2164)
downloaded
Chrome Cache Entry: 77
Web Open Font Format (Version 2), TrueType, length 15368, version 1.0
downloaded
Chrome Cache Entry: 78
Web Open Font Format (Version 2), TrueType, length 18668, version 1.0
downloaded
Chrome Cache Entry: 79
PNG image data, 60 x 60, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 80
Web Open Font Format (Version 2), TrueType, length 11116, version 1.0
downloaded
Chrome Cache Entry: 81
HTML document, ASCII text, with very long lines (398)
downloaded
Chrome Cache Entry: 82
ASCII text, with very long lines (65447)
dropped
Chrome Cache Entry: 83
ASCII text
downloaded
Chrome Cache Entry: 84
PNG image data, 200 x 38, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 85
Unicode text, UTF-8 text, with CRLF line terminators
downloaded
Chrome Cache Entry: 86
PNG image data, 60 x 60, 8-bit/color RGBA, non-interlaced
downloaded
There are 20 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1848,i,14200194463612556463,7566135678862087948,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://05kqatnrj9s0snah9.phish.farm/XNWovM1FGWG9WUTJhZEI4SDFaYWZZbTVBV2xEempsNGhRL3lkQUt5VUROTER6K2hlam5jK3hja3VFN2F1d2lnekJqVnpvWkZrNDdsMjFIR1NrNWtucTJReUc5ZWl1K09HZjhheHJJV0hrYmZtbjJpSThsdEwrZUZyN0JMMk5SN3lrSXhqaWZ0S3RaOG93b2t5RTd6OU1XZnJKQU05SXNRTGtzaG5xbE52dWMzOFlzaG9nbDFIckFQQy0tV0NacTU3Ymp2MGlpcUtCWS0tWVltL0pBUk43cVRMV2l2Y0tvc3VIUT09?cid=2252932795"

URLs

Name
IP
Malicious
https://05kqatnrj9s0snah9.phish.farm/XNWovM1FGWG9WUTJhZEI4SDFaYWZZbTVBV2xEempsNGhRL3lkQUt5VUROTER6K2hlam5jK3hja3VFN2F1d2lnekJqVnpvWkZrNDdsMjFIR1NrNWtucTJReUc5ZWl1K09HZjhheHJJV0hrYmZtbjJpSThsdEwrZUZyN0JMMk5SN3lrSXhqaWZ0S3RaOG93b2t5RTd6OU1XZnJKQU05SXNRTGtzaG5xbE52dWMzOFlzaG9nbDFIckFQQy0tV0NacTU3Ymp2MGlpcUtCWS0tWVltL0pBUk43cVRMV2l2Y0tvc3VIUT09?cid=2252932795
https://secured-login.net/assets/application-3ab7c63a41a8761925d45817a71fb79e0ef7208b59de505ac640c8a2a183ec19.js
3.93.18.143
https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.7/css/bootstrap.min.css
104.17.24.14
https://secured-login.net/packs/js/vendor-69f70dd3792dc7287ac8.js
3.93.18.143
https://secured-login.net/assets/landing-watermark-16f13e16a7ef02fb6f94250aa1931ded83dbee5d9fad278e33dd5792d085194f.css
3.93.18.143
https://secured-login.net/assets/landing-watermark-8487e36eef1bec74f06631f19fea0aa171c208e2976373cda5bd0a4b9e230903.css
3.93.18.143
http://getbootstrap.com)
unknown
https://github.com/twbs/bootstrap/blob/master/LICENSE)
unknown
https://secured-login.net/pages/c3955b1c48a/XNWovM1FGWG9WUTJhZEI4SDFaYWZZbTVBV2xEempsNGhRL3lkQUt5VUR
unknown
https://secured-login.net/favicon.ico
3.93.18.143
https://secured-login.net/assets/modernizr-654222debe8018b12f1993ceddff30dc163a7d5008d79869c399d6d167321f97.js
3.93.18.143
https://secured-login.net/pages/c3955b1c48a/XNWovM1FGWG9WUTJhZEI4SDFaYWZZbTVBV2xEempsNGhRL3lkQUt5VUROTER6K2hlam5jK3hja3VFN2F1d2lnekJqVnpvWkZrNDdsMjFIR1NrNWtucTJReUc5ZWl1K09HZjhheHJJV0hrYmZtbjJpSThsdEwrZUZyN0JMMk5SN3lrSXhqaWZ0S3RaOG93b2t5RTd6OU1XZnJKQU05SXNRTGtzaG5xbE52dWMzOFlzaG9nbDFIckFQQy0tV0NacTU3Ymp2MGlpcUtCWS0tWVltL0pBUk43cVRMV2l2Y0tvc3VIUT09
https://secured-login.net/assets/application-237cb5c4f318687625f8ccf2f42de3fc20238bfe267384653491a6bba8c8f6f5.js
3.93.18.143
https://s3.amazonaws.com/helpimg/landing_pages/css/dd.css
52.216.110.37
https://05kqatnrj9s0snah9.phish.farm/XNWovM1FGWG9WUTJhZEI4SDFaYWZZbTVBV2xEempsNGhRL3lkQUt5VUROTER6K2hlam5jK3hja3VFN2F1d2lnekJqVnpvWkZrNDdsMjFIR1NrNWtucTJReUc5ZWl1K09HZjhheHJJV0hrYmZtbjJpSThsdEwrZUZyN0JMMk5SN3lrSXhqaWZ0S3RaOG93b2t5RTd6OU1XZnJKQU05SXNRTGtzaG5xbE52dWMzOFlzaG9nbDFIckFQQy0tV0NacTU3Ymp2MGlpcUtCWS0tWVltL0pBUk43cVRMV2l2Y0tvc3VIUT09?cid=2252932795
3.93.18.143
https://cdn2.hubspot.net/hubfs/241394/html_file/files/img/KB4-logo.png
104.18.87.62
https://i.imgur.com/QRF01zv.png
199.232.192.193
There are 6 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
cdn2.hubspot.net
104.18.87.62
s3.amazonaws.com
52.216.110.37
cdnjs.cloudflare.com
104.17.24.14
www.google.com
142.250.186.100
secured-login.net
3.93.18.143
fp2e7a.wpc.phicdn.net
192.229.221.95
landing.training.knowbe4.com
3.93.18.143
ipv4.imgur.map.fastly.net
199.232.192.193
i.imgur.com
unknown
05kqatnrj9s0snah9.phish.farm
unknown

IPs

IP
Domain
Country
Malicious
104.18.87.62
cdn2.hubspot.net
United States
104.17.24.14
cdnjs.cloudflare.com
United States
3.93.18.143
secured-login.net
United States
23.22.29.127
unknown
United States
192.168.2.8
unknown
unknown
199.232.192.193
ipv4.imgur.map.fastly.net
United States
52.216.110.37
s3.amazonaws.com
United States
104.18.91.62
unknown
United States
199.232.196.193
unknown
United States
239.255.255.250
unknown
Reserved
142.250.186.100
www.google.com
United States
There are 1 hidden IPs, click here to show them.

DOM / HTML

URL
Malicious
https://secured-login.net/pages/c3955b1c48a/XNWovM1FGWG9WUTJhZEI4SDFaYWZZbTVBV2xEempsNGhRL3lkQUt5VUROTER6K2hlam5jK3hja3VFN2F1d2lnekJqVnpvWkZrNDdsMjFIR1NrNWtucTJReUc5ZWl1K09HZjhheHJJV0hrYmZtbjJpSThsdEwrZUZyN0JMMk5SN3lrSXhqaWZ0S3RaOG93b2t5RTd6OU1XZnJKQU05SXNRTGtzaG5xbE52dWMzOFlzaG9nbDFIckFQQy0tV0NacTU3Ymp2MGlpcUtCWS0tWVltL0pBUk43cVRMV2l2Y0tvc3VIUT09