IOC Report
Quarantined Messages (12).zip

loading gif

Files

File Path
Type
Category
Malicious
Quarantined Messages (12).zip
Zip archive data, at least v4.5 to extract, compression method=deflate
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntities.bin
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntitiesUpdated.bin
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\Floodgate\Outlook.CampaignStates.json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\Floodgate\Outlook.GovernedChannelStates.json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\Floodgate\Outlook.Settings.json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\Floodgate\Outlook.SurveyEventActivityStats.json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\56B632BC-CA16-4AAC-801B-A3619C0CEA49
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Office\OTele\outlook.exe.db
SQLite 3.x database, last written using SQLite version 3034001, writer version 2, read version 2, file counter 2, database pages 1, cookie 0, schema 0, largest root page 1, unknown 0 encoding, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Office\OTele\outlook.exe.db-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Microsoft\Office\OTele\outlook.exe.db-shm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\OTele\outlook.exe.db-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\9F1951F7.tmp
Microsoft Excel 2007+
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\Y8CBKWBK\~$Vendor Payment Details.XLS.xlsx
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{F4336852-CFFA-4B1B-AAE0-00B14765F921}.tmp
data
dropped
C:\Users\user\AppData\Local\Packages\oice_16_974fa576_32c1d314_889\AC\Temp\1242CAD8.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1768x228, components 3
dropped
C:\Users\user\AppData\Local\Packages\oice_16_974fa576_32c1d314_889\AC\Temp\752F5D41.xlsx:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Packages\oice_16_974fa576_32c1d314_889\AC\Temp\Diagnostics\EXCEL\App1711636037123260300_FEAB3EB7-B83F-4326-907B-0EAF8C71E878.log
ASCII text, with very long lines (855), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Packages\oice_16_974fa576_32c1d314_889\AC\Temp\Diagnostics\EXCEL\App1711636037124043100_FEAB3EB7-B83F-4326-907B-0EAF8C71E878.log
data
dropped
C:\Users\user\AppData\Local\Packages\oice_16_974fa576_32c1d314_889\AC\Temp\msoCF22.tmp
Microsoft OOXML
dropped
C:\Users\user\AppData\Local\Temp\Diagnostics\OUTLOOK\App1711636027248584700_692E6DBF-72EB-47BB-982E-55D2006EBA18.log
ASCII text, with very long lines (28730), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20240328T1527070035-2232.etl
data
modified
C:\Users\user\AppData\Roaming\Microsoft\Excel\A8820000
Applesoft BASIC program data, first line number 16
dropped
C:\Users\user\AppData\Roaming\Microsoft\Excel\Excel15.xlb (copy)
Applesoft BASIC program data, first line number 16
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\MSO3072.acl
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Outlook\NoEmail.srs
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\NormalEmail.dotm (copy)
Microsoft Word 2007+
dropped
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotm
data
modified
C:\Users\user\AppData\Roaming\Microsoft\Templates\~WRD0000.tmp
Microsoft Word 2007+
dropped
C:\Users\user\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 13:27:29 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 13:27:29 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:54:41 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 13:27:29 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 13:27:29 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 13:27:29 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\Documents\Outlook Files\Outlook Data File - NoEmail.pst
Microsoft Outlook email folder (>=2003)
dropped
C:\Users\user\Documents\Outlook Files\~Outlook Data File - NoEmail.pst.tmp
data
dropped
Chrome Cache Entry: 228
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 229
HTML document, ASCII text, with very long lines (1759)
downloaded
Chrome Cache Entry: 230
ASCII text, with very long lines (1162)
downloaded
Chrome Cache Entry: 231
ASCII text, with very long lines (2443), with no line terminators
downloaded
Chrome Cache Entry: 232
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 233
ASCII text, with very long lines (2121)
downloaded
Chrome Cache Entry: 234
ASCII text, with very long lines (2054)
downloaded
Chrome Cache Entry: 235
ASCII text, with very long lines (1504)
downloaded
Chrome Cache Entry: 237
PNG image data, 1976 x 401, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 238
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 239
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 241
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 242
ASCII text
downloaded
Chrome Cache Entry: 243
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 245
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
downloaded
Chrome Cache Entry: 246
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 247
ASCII text, with very long lines (1900)
downloaded
Chrome Cache Entry: 249
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 250
Web Open Font Format (Version 2), CFF, length 46464, version 0.0
downloaded
Chrome Cache Entry: 251
ASCII text, with very long lines (3383)
downloaded
Chrome Cache Entry: 252
ASCII text, with very long lines (1222)
downloaded
Chrome Cache Entry: 253
ASCII text, with very long lines (8376), with no line terminators
downloaded
Chrome Cache Entry: 254
ASCII text, with very long lines (383)
downloaded
Chrome Cache Entry: 255
ASCII text, with very long lines (2121)
downloaded
Chrome Cache Entry: 256
ASCII text
downloaded
Chrome Cache Entry: 257
ASCII text, with very long lines (64642), with CRLF line terminators
downloaded
Chrome Cache Entry: 258
ASCII text
downloaded
Chrome Cache Entry: 259
ASCII text, with very long lines (546)
downloaded
Chrome Cache Entry: 260
Web Open Font Format (Version 2), TrueType, length 34108, version 1.0
downloaded
Chrome Cache Entry: 261
HTML document, Unicode text, UTF-8 text, with very long lines (1136)
dropped
Chrome Cache Entry: 262
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 263
ASCII text, with very long lines (2054)
downloaded
Chrome Cache Entry: 264
Web Open Font Format (Version 2), TrueType, length 15744, version 1.0
downloaded
Chrome Cache Entry: 265
ASCII text, with very long lines (3265), with no line terminators
downloaded
Chrome Cache Entry: 267
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 268
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 269
ASCII text, with very long lines (705), with no line terminators
downloaded
Chrome Cache Entry: 270
ASCII text, with very long lines (65202)
downloaded
There are 66 hidden files, click here to show them.

URLs

Name
IP
Malicious
https://form.feathery.io/to/IZif6Z#Step%202
https://drive.google.com/auth_warmup
https://form.feathery.io/to/IZif6Z#Step%201
about:blank
https://sites.google.com/open-remitdocuments.com/67757?usp=sharing
https://form.feathery.io/to/IZif6Z

Domains

Name
IP
Malicious
external-new.us-west-1.elasticbeanstalk.com
52.8.165.41
plus.l.google.com
142.250.31.113
play.google.com
142.251.167.113
sites.google.com
142.251.163.113
drive.google.com
142.251.167.102
www.google.com
142.251.167.103
s3-r-w.us-west-1.amazonaws.com
52.219.116.57
part-0012.t-0009.t-msedge.net
13.107.246.40
googlehosted.l.googleusercontent.com
172.253.122.132
form.feathery.io
18.213.222.111
feathery.s3.us-west-1.amazonaws.com
unknown
cdn.feathery.io
unknown
api.feathery.io
unknown
lh3.googleusercontent.com
unknown
apis.google.com
unknown
There are 5 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
192.168.2.17
unknown
unknown
malicious
52.109.4.7
unknown
United States
20.189.173.9
unknown
United States
13.107.246.40
part-0012.t-0009.t-msedge.net
United States
142.251.167.103
www.google.com
United States
172.253.62.94
unknown
United States
172.253.122.132
googlehosted.l.googleusercontent.com
United States
142.251.167.102
drive.google.com
United States
20.42.65.84
unknown
United States
172.253.62.95
unknown
United States
18.213.222.111
form.feathery.io
United States
23.215.0.45
unknown
United States
142.251.163.94
unknown
United States
52.113.194.132
unknown
United States
3.5.161.107
unknown
United States
1.1.1.1
unknown
Australia
142.251.167.132
unknown
United States
54.219.204.123
unknown
United States
142.251.111.95
unknown
United States
142.250.31.113
plus.l.google.com
United States
142.251.167.113
play.google.com
United States
172.253.63.94
unknown
United States
142.251.167.138
unknown
United States
142.251.111.94
unknown
United States
172.253.122.102
unknown
United States
142.251.163.113
sites.google.com
United States
23.54.46.90
unknown
United States
172.253.122.100
unknown
United States
52.8.165.41
external-new.us-west-1.elasticbeanstalk.com
United States
172.253.122.95
unknown
United States
142.251.167.84
unknown
United States
239.255.255.250
unknown
Reserved
151.101.2.133
unknown
United States
52.109.52.131
unknown
United States
52.219.116.57
s3-r-w.us-west-1.amazonaws.com
United States
142.251.16.94
unknown
United States
54.84.236.175
unknown
United States
142.251.179.138
unknown
United States
There are 28 hidden IPs, click here to show them.