IOC Report
https://www.paypalobjects.com/digitalassets/c/system-triggered-email/n/layout/fonts/SupremeLL/SupremeLLTestSubWeb-Medium.woff2

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\Downloads\47f21400-ebff-4d18-8b1d-0c9c1a89d420.tmp
Web Open Font Format (Version 2), TrueType, length 28319, version 3.66
dropped
C:\Users\user\Downloads\SupremeLLTestSubWeb-Medium.woff2 (copy)
Web Open Font Format (Version 2), TrueType, length 28319, version 3.66
dropped
C:\Users\user\Downloads\SupremeLLTestSubWeb-Medium.woff2.crdownload
Web Open Font Format (Version 2), TrueType, length 28319, version 3.66
dropped
Chrome Cache Entry: 47
Web Open Font Format (Version 2), TrueType, length 28319, version 3.66
downloaded

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 --field-trial-handle=2168,i,15104771224958868918,13712037630410875883,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.paypalobjects.com/digitalassets/c/system-triggered-email/n/layout/fonts/SupremeLL/SupremeLLTestSubWeb-Medium.woff2"
C:\Windows\System32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding

URLs

Name
IP
Malicious
https://www.paypalobjects.com/digitalassets/c/system-triggered-email/n/layout/fonts/SupremeLL/SupremeLLTestSubWeb-Medium.woff2
https://www.paypalobjects.com/digitalassets/c/system-triggered-email/n/layout/fonts/SupremeLL/SupremeLLTestSubWeb-Medium.woff2
151.101.195.1

Domains

Name
IP
Malicious
paypal-dynamic-cdn.map.fastly.net
151.101.195.1
www.google.com
142.250.186.100
198.187.3.20.in-addr.arpa
unknown
www.paypalobjects.com
unknown

IPs

IP
Domain
Country
Malicious
151.101.195.1
paypal-dynamic-cdn.map.fastly.net
United States
239.255.255.250
unknown
Reserved
192.168.2.23
unknown
unknown
142.250.186.100
www.google.com
United States
142.250.185.100
unknown
United States
192.168.2.4
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
1F080FE000
stack
page read and write
1F0807E000
stack
page read and write
1B07BFF8000
heap
page read and write
1B07BFF0000
heap
page read and write
1B07C01E000
heap
page read and write
1B07BEE0000
heap
page read and write
1B07BFC0000
heap
page read and write
1B07C025000
heap
page read and write
1B07C01C000
heap
page read and write
1F07FFE000
stack
page read and write
1B07C025000
heap
page read and write
1B07C00C000
heap
page read and write
1B07DAC0000
heap
page read and write
1F07F7F000
stack
page read and write
1B07C025000
heap
page read and write
1B07C022000
heap
page read and write
1B07C011000
heap
page read and write
1B07C021000
heap
page read and write
1F07EFF000
stack
page read and write
1B07D8A0000
heap
page read and write
1B07D9B0000
heap
page read and write
1B07C025000
heap
page read and write
1B07D9B5000
heap
page read and write
1F07E7A000
stack
page read and write
There are 14 hidden memdumps, click here to show them.