IOC Report
Settlement DOL 08262024 - Victoria Brignon - Reference #27224675-2722934.html

loading gif

Files

File Path
Type
Category
Malicious
Settlement DOL 08262024 - Victoria Brignon - Reference #27224675-2722934.html
HTML document, ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 14:29:45 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 14:29:45 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 14:29:45 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 14:29:45 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 14:29:44 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 100
ASCII text, with very long lines (19015)
downloaded
Chrome Cache Entry: 101
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1592
dropped
Chrome Cache Entry: 102
gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1592
downloaded
Chrome Cache Entry: 103
ASCII text, with very long lines (32065)
downloaded
Chrome Cache Entry: 104
ASCII text, with very long lines (32030)
downloaded
Chrome Cache Entry: 91
ASCII text
downloaded
Chrome Cache Entry: 92
ASCII text, with very long lines (54456)
downloaded
Chrome Cache Entry: 93
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 94
ASCII text, with very long lines (48664)
downloaded
Chrome Cache Entry: 95
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 96
ASCII text, with very long lines (32012)
downloaded
Chrome Cache Entry: 97
ASCII text
downloaded
Chrome Cache Entry: 98
ASCII text, with very long lines (65325)
downloaded
Chrome Cache Entry: 99
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
There are 11 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "C:\Users\user\Desktop\Settlement DOL 08262024 - Victoria Brignon - Reference #27224675-2722934.html"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 --field-trial-handle=2224,i,17334446119998781605,2213609609449426346,262144 /prefetch:8

URLs

Name
IP
Malicious
file:///C:/Users/user/Desktop/Settlement%20DOL%2008262024%20-%20Victoria%20Brignon%20-%20Reference%20%2327224675-2722934.html
malicious
https://pnnacleevaluationemployerform.com/tellmehow/trost.js
198.54.115.192
malicious
https://bugs.webkit.org/show_bug.cgi?id=136851
unknown
http://jquery.org/license
unknown
https://jsperf.com/thor-indexof-vs-for/5
unknown
https://code.jquery.com/jquery-3.2.1.slim.min.js
151.101.194.137
https://bugs.jquery.com/ticket/12359
unknown
https://web.archive.org/web/20100324014747/http://blindsignals.com/index.php/2009/07/jquery-delay/
unknown
https://html.spec.whatwg.org/#strip-and-collapse-whitespace
unknown
https://promisesaplus.com/#point-75
unknown
https://web.archive.org/web/20141116233347/http://fluidproject.org/blog/2008/01/09/getting-setting-a
unknown
https://drafts.csswg.org/cssom/#common-serializing-idioms
unknown
https://html.spec.whatwg.org/multipage/forms.html#concept-fe-disabled
unknown
https://bugs.webkit.org/show_bug.cgi?id=29084
unknown
https://fontawesome.com/license/free
unknown
https://infra.spec.whatwg.org/#strip-and-collapse-ascii-whitespace
unknown
https://fontawesome.com
unknown
https://github.com/eslint/eslint/issues/6125
unknown
https://html.spec.whatwg.org/multipage/forms.html#concept-option-disabled
unknown
https://github.com/jquery/jquery/pull/557)
unknown
https://github.com/twbs/bootstrap/graphs/contributors)
unknown
https://bugs.chromium.org/p/chromium/issues/detail?id=378607
unknown
https://github.com/jrburke/requirejs/wiki/Updating-existing-libraries#wiki-anon
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=687787
unknown
https://bugs.chromium.org/p/chromium/issues/detail?id=470258
unknown
https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/bootstrap.min.js
104.18.10.207
http://opensource.org/licenses/MIT).
unknown
https://bugs.jquery.com/ticket/13378
unknown
https://promisesaplus.com/#point-64
unknown
https://promisesaplus.com/#point-61
unknown
https://drafts.csswg.org/cssom/#resolved-values
unknown
https://bugs.chromium.org/p/chromium/issues/detail?id=589347
unknown
https://code.jquery.com/jquery-3.1.1.min.js
151.101.194.137
https://html.spec.whatwg.org/multipage/syntax.html#attributes-2
unknown
https://promisesaplus.com/#point-59
unknown
https://jsperf.com/getall-vs-sizzle/2
unknown
https://promisesaplus.com/#point-57
unknown
https://github.com/eslint/eslint/issues/3229
unknown
https://promisesaplus.com/#point-54
unknown
https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/css/bootstrap.min.css
104.18.10.207
https://code.jquery.com/jquery-3.3.1.js
151.101.194.137
https://html.spec.whatwg.org/multipage/forms.html#category-listed
unknown
https://html.spec.whatwg.org/multipage/scripting.html#selector-disabled
unknown
https://developer.mozilla.org/en-US/docs/CSS/display
unknown
https://jquery.org/license
unknown
https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.js
104.17.25.14
https://jquery.com/
unknown
https://getbootstrap.com)
unknown
https://bugs.webkit.org/show_bug.cgi?id=137337
unknown
https://html.spec.whatwg.org/multipage/scripting.html#selector-enabled
unknown
https://github.com/twbs/bootstrap/blob/master/LICENSE)
unknown
https://promisesaplus.com/#point-48
unknown
https://github.com/jquery/sizzle/pull/225
unknown
https://sizzlejs.com/
unknown
https://bugs.chromium.org/p/chromium/issues/detail?id=449857
unknown
There are 45 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
pnnacleevaluationemployerform.com
198.54.115.192
malicious
part-0013.t-0009.t-msedge.net
13.107.213.41
code.jquery.com
151.101.194.137
cdnjs.cloudflare.com
104.17.25.14
maxcdn.bootstrapcdn.com
104.18.10.207
www.google.com
142.250.64.164
use.fontawesome.com
unknown

IPs

IP
Domain
Country
Malicious
198.54.115.192
pnnacleevaluationemployerform.com
United States
malicious
13.107.246.41
unknown
United States
104.18.10.207
maxcdn.bootstrapcdn.com
United States
192.168.2.16
unknown
unknown
192.168.2.4
unknown
unknown
192.168.2.6
unknown
unknown
192.168.2.5
unknown
unknown
142.250.64.164
www.google.com
United States
13.107.213.41
part-0013.t-0009.t-msedge.net
United States
151.101.194.137
code.jquery.com
United States
239.255.255.250
unknown
Reserved
142.251.35.228
unknown
United States
104.17.25.14
cdnjs.cloudflare.com
United States
There are 3 hidden IPs, click here to show them.

DOM / HTML

URL
Malicious
file:///C:/Users/user/Desktop/Settlement%20DOL%2008262024%20-%20Victoria%20Brignon%20-%20Reference%20%2327224675-2722934.html
malicious