IOC Report
https://ee.mydnadigital.com/

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 18 15:27:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 18 15:27:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 18 15:27:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 18 15:27:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 18 15:27:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 70
HTML document, ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 71
PNG image data, 420 x 125, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 72
Web Open Font Format (Version 2), TrueType, length 33092, version 1.0
downloaded
Chrome Cache Entry: 73
ASCII text
downloaded
Chrome Cache Entry: 74
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 75
MS Windows icon resource - 1 icon, -31x256, 32 bits/pixel
downloaded
Chrome Cache Entry: 76
JSON data
dropped
Chrome Cache Entry: 77
HTML document, ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 78
ASCII text
downloaded
Chrome Cache Entry: 79
JSON data
downloaded
Chrome Cache Entry: 80
ASCII text
downloaded
Chrome Cache Entry: 81
JSON data
downloaded
Chrome Cache Entry: 82
Web Open Font Format, TrueType, length 48292, version 0.0
downloaded
Chrome Cache Entry: 83
MS Windows icon resource - 1 icon, -31x256, 32 bits/pixel
dropped
Chrome Cache Entry: 84
PNG image data, 420 x 125, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 85
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 86
JSON data
dropped
Chrome Cache Entry: 87
ASCII text, with very long lines (50212)
downloaded
Chrome Cache Entry: 88
JSON data
downloaded
There are 16 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 --field-trial-handle=2024,i,4063609773814584156,12300272151828366041,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://ee.mydnadigital.com/"

URLs

Name
IP
Malicious
https://ee.mydnadigital.com/
https://ee.mydnadigital.com/
https://fontawesome.com
unknown
https://use.fontawesome.com/releases/v5.4.1/css/all.css
unknown
https://ee.mydnadigital.com/signup
https://fontawesome.com/license/free
unknown

IPs

IP
Domain
Country
Malicious
64.233.177.94
unknown
United States
3.228.43.187
unknown
United States
1.1.1.1
unknown
Australia
142.250.105.84
unknown
United States
23.21.184.8
unknown
United States
172.67.142.245
unknown
United States
142.250.105.138
unknown
United States
173.194.219.94
unknown
United States
172.253.124.94
unknown
United States
192.168.2.5
unknown
unknown
54.84.24.70
unknown
United States
173.194.219.95
unknown
United States
107.22.125.25
unknown
United States
239.255.255.250
unknown
Reserved
3.163.80.61
unknown
United States
13.107.213.41
unknown
United States
108.177.122.95
unknown
United States
108.177.122.147
unknown
United States
There are 8 hidden IPs, click here to show them.

DOM / HTML

URL
Malicious
https://ee.mydnadigital.com/
https://ee.mydnadigital.com/signup
https://ee.mydnadigital.com/signup