IOC Report
_Rmcgaughy_Sonicwall inc._Financial...2024-jxj9FL.svg

loading gif

Files

File Path
Type
Category
Malicious
_Rmcgaughy_Sonicwall inc._Financial...2024-jxj9FL.svg
SVG Scalable Vector Graphics image
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Nov 25 17:08:09 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Nov 25 17:08:08 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Nov 25 17:08:08 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Nov 25 17:08:08 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Nov 25 17:08:08 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 100
PNG image data, 1496 x 1458, 8-bit/color RGB, non-interlaced
dropped
Chrome Cache Entry: 101
HTML document, ASCII text
downloaded
Chrome Cache Entry: 102
ASCII text, with very long lines (8054), with no line terminators
downloaded
Chrome Cache Entry: 97
HTML document, ASCII text, with very long lines (952)
downloaded
Chrome Cache Entry: 98
ASCII text, with very long lines (8166), with no line terminators
dropped
Chrome Cache Entry: 99
PNG image data, 1496 x 1458, 8-bit/color RGB, non-interlaced
downloaded
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "C:\Users\user\Desktop\_Rmcgaughy_Sonicwall inc._Financial...2024-jxj9FL.svg"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=2000,i,17634049054164985552,14244340915316438034,262144 /prefetch:8

URLs

Name
IP
Malicious
https://goodfreelaceemployebeneficiary.zg5c3y99bp.free.hr/Newmlcft
malicious
https://a.nel.cloudflare.com/report/v4?s=ylnpdnuG5tzCltQ27M0aAdla5n6w8ibWFOSXb3NbmCFh0EDUbcXL9Yps9znloi7HP1Sp6sJFxACcVB6bi2sTu88l4YnaY%2FdHL28a9CWlG6D3%2BmGVi2IAo%2BoPAGTCKuh6in1J9S%2B8mfe8IsXW8D0cBdGMwsVz108zSvoqpI7EGV6cFQNP
35.190.80.1
https://i.imgur.com/CSqw4as.png
199.232.196.193
https://goodfreelaceemployebeneficiary.zg5c3y99bp.free.hr/favicon.ico
172.67.205.48
https://goodfreelaceemployebeneficiary.zg5c3y99bp.free.hr/cdn-cgi/challenge-platform/h/g/jsd/r/8e8395dc9c5e41fe
172.67.205.48
https://imgur.com/CSqw4as.png
199.232.196.193
https://goodfreelaceemployebeneficiary.zg5c3y99bp.free.hr/cdn-cgi/challenge-platform/h/g/scripts/jsd/e4025c85ea63/main.js?
172.67.205.48
https://a.nel.cloudflare.com/report/v4?s=d2VW6p%2FvpSJQRzAQzp8XIOPfhRH%2F2cdMEerqjU7sBxieMMA01wJOX9QWkmG0fTltsDNeoptGJLSZodJyUDZpaPS9aji%2FxsXGk9sx7t6Ep%2BVkiB2nbyD2WzRJZ8uyfH%2BYrbrCNs8YvoWHy3JZvH1FMyrccAucST7QcabSWtD6FiAJ6%2FLy
35.190.80.1
https://goodfreelaceemployebeneficiary.zg5c3y99bp.free.hr/cdn-cgi/challenge-platform/scripts/jsd/main.js
172.67.205.48

Domains

Name
IP
Malicious
goodfreelaceemployebeneficiary.zg5c3y99bp.free.hr
172.67.205.48
malicious
a.nel.cloudflare.com
35.190.80.1
imgur.com
199.232.196.193
www.google.com
216.58.208.228
ipv4.imgur.map.fastly.net
199.232.196.193
i.imgur.com
unknown

IPs

IP
Domain
Country
Malicious
172.67.205.48
goodfreelaceemployebeneficiary.zg5c3y99bp.free.hr
United States
malicious
199.232.196.193
imgur.com
United States
104.21.66.145
unknown
United States
192.168.2.5
unknown
unknown
239.255.255.250
unknown
Reserved
216.58.208.228
www.google.com
United States
35.190.80.1
a.nel.cloudflare.com
United States

DOM / HTML

URL
Malicious
https://goodfreelaceemployebeneficiary.zg5c3y99bp.free.hr/Newmlcft
https://goodfreelaceemployebeneficiary.zg5c3y99bp.free.hr/Newmlcft