IOC Report
https://uporniacomnuvidx.z13.web.core.windows.net/index.html

loading gif

Files

File Path
Type
Category
Malicious
Chrome Cache Entry: 58
Audio file with ID3 version 2.4.0, contains: MPEG ADTS, layer III, v1, 128 kbps, 44.1 kHz, Stereo
downloaded
Chrome Cache Entry: 59
Web Open Font Format (Version 2), TrueType, length 7748, version 1.0
downloaded
Chrome Cache Entry: 60
Web Open Font Format (Version 2), TrueType, length 66624, version 4.262
downloaded
Chrome Cache Entry: 61
ASCII text, with very long lines (65326)
downloaded
Chrome Cache Entry: 62
ASCII text, with very long lines (32180)
downloaded
Chrome Cache Entry: 63
ASCII text, with very long lines (27303)
downloaded
Chrome Cache Entry: 64
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=7, orientation=upper-left, xresolution=98, yresolution=106, resolutionunit=2, software=Adobe Photoshop 21.0 (Windows)], baseline, precision 8, 47x46, components 3
dropped
Chrome Cache Entry: 65
HTML document, Unicode text, UTF-8 text, with very long lines (310), with CRLF line terminators
downloaded
Chrome Cache Entry: 66
PNG image data, 676 x 806, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 67
Web Open Font Format (Version 2), TrueType, length 7824, version 1.0
downloaded
Chrome Cache Entry: 68
HTML document, ASCII text, with very long lines (321), with no line terminators
downloaded
Chrome Cache Entry: 69
PNG image data, 1846 x 710, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 70
ASCII text, with very long lines (5152), with no line terminators
downloaded
Chrome Cache Entry: 71
Web Open Font Format (Version 2), TrueType, length 8000, version 1.0
downloaded
Chrome Cache Entry: 72
ASCII text, with very long lines (59765)
downloaded
Chrome Cache Entry: 73
ASCII text, with very long lines (4666), with no line terminators
downloaded
Chrome Cache Entry: 74
ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 75
ASCII text
downloaded
Chrome Cache Entry: 76
PNG image data, 1846 x 710, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 77
PNG image data, 676 x 806, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 78
ASCII text, with very long lines (3829), with no line terminators
downloaded
Chrome Cache Entry: 79
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=7, orientation=upper-left, xresolution=98, yresolution=106, resolutionunit=2, software=Adobe Photoshop 22.3 (Windows)], baseline, precision 8, 1892x1366, components 3
dropped
Chrome Cache Entry: 80
ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 81
Web Open Font Format (Version 2), TrueType, length 7884, version 1.0
downloaded
Chrome Cache Entry: 82
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=7, orientation=upper-left, xresolution=98, yresolution=106, resolutionunit=2, software=Adobe Photoshop 22.3 (Windows)], baseline, precision 8, 1892x1366, components 3
downloaded
Chrome Cache Entry: 83
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=7, orientation=upper-left, xresolution=98, yresolution=106, resolutionunit=2, software=Adobe Photoshop 21.0 (Windows)], baseline, precision 8, 47x46, components 3
downloaded
There are 17 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=2024,i,13314379522545086292,8042181613780995042,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://uporniacomnuvidx.z13.web.core.windows.net/index.html"

URLs

Name
IP
Malicious
https://uporniacomnuvidx.z13.web.core.windows.net/index.html
malicious
https://d2fuc4clr7gvcn.cloudfront.net/track.js
65.8.184.5
http://fontawesome.io
unknown
https://maxcdn.bootstrapcdn.com/font-awesome/4.5.0/css/font-awesome.min.css
104.18.10.207
https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.3/jquery.min.js
104.17.25.14
https://github.com/twbs/bootstrap/graphs/contributors)
unknown
https://getbootstrap.com/)
unknown
https://maxcdn.bootstrapcdn.com/font-awesome/4.5.0/fonts/fontawesome-webfont.woff2?v=4.5.0
104.18.10.207
https://github.com/twbs/bootstrap/blob/main/LICENSE)
unknown
https://stackpath.bootstrapcdn.com/bootstrap/4.5.2/js/bootstrap.min.js
104.18.10.207
https://track.gaug.es/track.gif
unknown
https://stackpath.bootstrapcdn.com/bootstrap/4.5.2/css/bootstrap.min.css
104.18.10.207
http://fontawesome.io/license
unknown
There are 2 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
stackpath.bootstrapcdn.com
104.18.10.207
cdnjs.cloudflare.com
104.17.25.14
d2fuc4clr7gvcn.cloudfront.net
65.8.184.5
maxcdn.bootstrapcdn.com
104.18.10.207
www.google.com
142.250.217.228
track.gaug.es
54.156.134.49
fp2e7a.wpc.phicdn.net
192.229.211.108

IPs

IP
Domain
Country
Malicious
104.18.10.207
stackpath.bootstrapcdn.com
United States
54.156.134.49
track.gaug.es
United States
65.8.184.5
d2fuc4clr7gvcn.cloudfront.net
United States
142.250.217.228
www.google.com
United States
192.168.2.4
unknown
unknown
54.197.93.113
unknown
United States
239.255.255.250
unknown
Reserved
104.17.25.14
cdnjs.cloudflare.com
United States

DOM / HTML

URL
Malicious
https://uporniacomnuvidx.z13.web.core.windows.net/index.html
malicious