Windows
Analysis Report
Here is the completed and scanned document.eml
Overview
General Information
Detection
Score: | 48 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- OUTLOOK.EXE (PID: 7576 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \Root\Offi ce16\OUTLO OK.EXE" /e ml "C:\Use rs\user\De sktop\Here is the co mpleted an d scanned document.e ml" MD5: 91A5292942864110ED734005B7E005C0) - ai.exe (PID: 7952 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \root\vfs\ ProgramFil esCommonX6 4\Microsof t Shared\O ffice16\ai .exe" "D38 88E2E-DFB7 -4B28-A5D6 -C2ED926F9 7C1" "C557 A7C3-8F6F- 4EDD-9631- 70AA295F56 15" "7576" "C:\Progr am Files ( x86)\Micro soft Offic e\Root\Off ice16\OUTL OOK.EXE" " WordCombin edFloatieL reOnline.o nnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD)
- cleanup
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Click to jump to signature section
Phishing |
---|
Source: | Joe Sandbox AI: |
Source: | Email attachement header: | ||
Source: | Email attachement header: |
Source: | Classification: |
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Window found: | Jump to behavior |
Source: | Window detected: |
Source: | Key opened: | Jump to behavior |
Source: | Key value created or modified: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | File Volume queried: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 11 Browser Extensions | 1 Process Injection | 1 Masquerading | OS Credential Dumping | 1 Process Discovery | Remote Services | Data from Local System | 1 Non-Application Layer Protocol | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Modify Registry | LSASS Memory | 13 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Process Injection | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 DLL Side-Loading | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
bg.microsoft.map.fastly.net | 199.232.214.172 | true | false | high | |
212.20.149.52.in-addr.arpa | unknown | unknown | false | unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false |
| unknown | ||
false |
| unknown |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1585304 |
Start date and time: | 2025-01-07 13:40:55 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 13s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 6 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Here is the completed and scanned document.eml |
Detection: | MAL |
Classification: | mal48.winEML@3/3@1/0 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 52.109.89.18, 52.113.194.132, 52.109.89.19, 2.16.168.119, 2.16.168.101, 199.232.214.172, 13.89.179.11, 20.190.160.22, 4.245.163.56, 13.107.246.45, 40.69.42.241, 52.149.20.212, 40.126.32.68
- Excluded domains from analysis (whitelisted): omex.cdn.office.net, slscr.update.microsoft.com, weu-azsc-000.roaming.officeapps.live.com, weu-azsc-config.officeapps.live.com, eur.roaming1.live.com.akadns.net, ecs-office.s-0005.s-msedge.net, roaming.officeapps.live.com, osiprod-weu-buff-azsc-000.westeurope.cloudapp.azure.com, ocsp.digicert.com, login.live.com, officeclient.microsoft.com, wu-b-net.trafficmanager.net, a1864.dscd.akamai.net, ecs.office.com, self-events-data.trafficmanager.net, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, prod.configsvc1.live.com.akadns.net, self.events.data.microsoft.com, onedscolprdcus15.centralus.cloudapp.azure.com, ctldl.windowsupdate.com, prod.roaming1.live.com.akadns.net, s-0005-office.config.skype.com, fe3cr.delivery.mp.microsoft.com, s-0005.s-msedge.net, config.officeapps.live.com, ecs.office.trafficmanager.net, omex.cdn.office.net.akamaized.net, europe.configsvc1.live.com.akadns.net
- Report size getting too big, too many NtQueryAttributesFile calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
- VT rate limit hit for: Here is the completed and scanned document.eml
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
bg.microsoft.map.fastly.net | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | DcRat, KeyLogger, StormKitty, Strela Stealer, VenomRAT | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | RedLine | Browse |
|
C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20250107T0741540767-7576.etl
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 135168 |
Entropy (8bit): | 4.659942166122125 |
Encrypted: | false |
SSDEEP: | 768:cYSn5Rg6pOZo1kCtwv94Gf+J9Y+ANa6esdaYUCINdSdXcnAkjIlgmpGkX/VptnC6:In0Zn94GmJ9Y+AaNdSdm/nmpHXm4 |
MD5: | DF74A1055858B8CE892E2678B11554B4 |
SHA1: | CC86B8B28567FE19333086D5B0CAA20CE470CC7D |
SHA-256: | 9D16A0698A2311EBC3EC8C80EF381795F9F274EAD9232EDB0A8F690B65CE3149 |
SHA-512: | 21179E28B1E92A75F25FA3AC707507DA510D6AB43D22BD35AA8705CAC88A0B1D7F5BFA79754DBAE52D59DC27A59CFD447DBA069E7C4CC4DE15E97D509D80CEE7 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 271360 |
Entropy (8bit): | 2.9707872763944314 |
Encrypted: | false |
SSDEEP: | 1536:5miTgRmN9sYNcBPV3dkZf3MG5qTC9AJLNqKVW53jEpEHPVQ10BAwrCUCvxW53jEP:k6xcJeuToAXpjP/pj |
MD5: | 218805640FC7E0CE034CC8D681A14E98 |
SHA1: | EF76E66EF7DECCB824F11FB6607B1B6C4B4C1FF0 |
SHA-256: | 6D7DD828DDFE8779BC6EA556969FA5B349D2B69249B16DF0DB3206B1F44EFA98 |
SHA-512: | 3CAA3286C1439E4852A1BBF13C3CC4F5B2E1C8D242B1140CCF2FE75F589BF3CDA798F4C313611AD9498A49043D681962873086897063AFBBAE5286EBBE6ACB82 |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 131072 |
Entropy (8bit): | 3.776854688601513 |
Encrypted: | false |
SSDEEP: | 1536:5X6B3MJ5qTZBT9AGiW53jEpEHPVQ10BAwrRwKTg4wK+v:s3TZvAGApj6q |
MD5: | 99D40857DF4440832D0082355063780E |
SHA1: | AF51B926E1D0C506B644D1513F85F05E769185A6 |
SHA-256: | 2963378174C78240FE143919961D21EE8C69680E401AE854DFD2A596D54A2FF7 |
SHA-512: | BC533092D0A195C50E4FC41B4541C6B7B4ED29EB26DD10F82F54E2C9722C248D9012E1202891173373F11FE76ED84EA7B12FF104168BE5E520B9FC28A3200377 |
Malicious: | true |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 6.15032807018834 |
TrID: |
|
File name: | Here is the completed and scanned document.eml |
File size: | 28'972 bytes |
MD5: | 09d8f89832aa9ae45c3a14668c2ac9b8 |
SHA1: | 921b0f7dfd7e7d85d281d76f2f586897d1cfa2b7 |
SHA256: | 79669b97f54feea0d5433ab17a05a4e4574b34defd94d98aacb20561ee46ca73 |
SHA512: | 783b01ab6ed50b2987a26670c6aa072c2b676fa5ea2b4173e4b54defa6db61787bbe893bb132a1484b40a8a6390e7bb1833045994504b4aed986184597a6b647 |
SSDEEP: | 768:T3QrbCp7kuL01ePSYEpNJPDn3GTNgxDlT0WzmMjCqJbpCGzYRZbG7QDY:T3SCtkubS3pNBC0VSMuqJ9CGzybjY |
TLSH: | B4D2BF14D736AD0D76A3D97D3C997C0C414026A8EBBFF950CAAD200816DF6D072DEAE9 |
File Content Preview: | Return-Path: <7jxOn.noreply@tools2winretail.com>.Received: from out7.antispamcloud.com ([94.75.244.176])..by mail.coredc.com (Kerio Connect 10.0.6 patch 2) with ESMTPS..(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256 bits))..for ama@coredc.com;..Mo |
Subject: | Here is the completed and scanned document |
From: | eDoc Coredc | zcqtfspv <7jxOn.noreply@tools2winretail.com> |
To: | ama@coredc.com |
Cc: | |
BCC: | |
Date: | Mon, 06 Jan 2025 11:02:39 -0800 |
Communications: |
|
Attachments: |
|
Key | Value |
---|---|
Return-Path | <7jxOn.noreply@tools2winretail.com> |
Received | from clouldfare.com (139.99.165.139) by MWH0EPF000971E8.mail.protection.outlook.com (10.167.243.68) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8335.7 via Frontend Transport; Mon, 6 Jan 2025 19:02:39 +0000 |
ARC-Seal | i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=Ue4QvJaoW/zfHvFIE4Dxp5Pqxofox/EL7cfKPMV/gldBTlnC/ym8qleeQ/6/lXd7IJNzsH1BQsk9niYgVfQM5cMc8skdpYy8BoosNaSL2M3vKUkjne+XrEfwZ4GcX4pZpYcVeCKZ+pzfP/j5Pwl8VMGBt2GPX14E2mEle5DuRfAn1LDJknRQfSi1Bf4q1L6raLoYfgTQPy2JDJD0XiHMfW8dW5C7gACBL7AxwwsEZso7tNm89bczadkBkNbsFPp4gL+j4pUOGBLiRMsQL/GaZOxr2cIPEqELsjtPtQlyL43xkZn/aqOg3cQDAJcYzhfnmkCoIzOcLx/4mKyrLtqYVA== |
ARC-Message-Signature | i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=IMUy4sAt961kNl11k2HM49XQc0L2uNeEdQmKwyXul08=; b=boI8tUjLptWtivZwqRpPdF6MiY83HX27XU+O1F9I72LKDb71R34TPG0xhL/73CyKYmvKZDPG5Ppbyn9Sj8K09jey9ZDQuAd5x8lTAi+JRc8EFRXjeG2MaxwYVqljfAJ0eD1wQCNhh0+fh/zr57vVJUHGbp3ejGZ4Cvd88w8MmTU8XWCx/E/S++nfpFov4Xt2csM4BK8zOaaHlmBJuXTL+reS1Pvz4up6U5qcGSKRQQntcmj0eAE+e4EgATO+0PhgjZ8hVWXV+OI6AaqGF3wC/eVRIYNbUnHgXxvC2Xu9vyQCCmUgMysO2iaWi04tApYezZCPLWZuldLOifSB+6biGQ== |
ARC-Authentication-Results | i=1; mx.microsoft.com 1; spf=softfail (sender ip is 139.99.165.139) smtp.rcpttodomain=coredc.com smtp.mailfrom=tools2winretail.com; dmarc=fail (p=none sp=none pct=100) action=none header.from=tools2winretail.com; dkim=none (message not signed); arc=none (0) |
X-MS-Exchange-Authentication-Results | spf=softfail (sender IP is 139.99.165.139) smtp.mailfrom=tools2winretail.com; dkim=none (message not signed) header.d=none;dmarc=fail action=none header.from=tools2winretail.com; |
Received-SPF | pass (mx269.antispamcloud.com: domain of tools2winretail.com designates 2a01:111:f403:d800:: as permitted sender) client-ip=2a01:111:f403:d800::; envelope-from=7jxOn.noreply@tools2winretail.com; helo=BYAPR05CU005.outbound.protection.outlook.com; |
From | eDoc Coredc | zcqtfspv <7jxOn.noreply@tools2winretail.com> |
Subject | Here is the completed and scanned document |
To | ama@coredc.com |
Content-Type | multipart/mixed; boundary="wF17Y=_oO3w4erqEFKwsbyLAYUAGvIvIBh" |
MIME-Version | 1.0 |
Date | Mon, 06 Jan 2025 11:02:39 -0800 |
Message-Id | <063720250102111205524308-AD5285EFB1@tools2winretail.com> |
X-Mailer | Outlook Express 6.00.2900.2527 |
X-EOPAttributedMessage | 0 |
X-MS-PublicTrafficType | |
X-MS-TrafficTypeDiagnostic | MWH0EPF000971E8:EE_|SJ0PR04MB8421:EE_ |
X-MS-Office365-Filtering-Correlation-Id | 923da074-7b11-4618-2ded-08dd2e84b0f2 |
X-MS-Exchange-SenderADCheck | 1 |
X-MS-Exchange-AntiSpam-Relay | 0 |
X-Microsoft-Antispam | BCL:0;ARA:13230040|36860700013|82310400026|376014|61400799027|16072699012|563134004|36310999015; |
X-Microsoft-Antispam-Message-Info | sEtauOSbLJso/JyvafEbz0Cfwe5snGoX2Mgl3qP9YRgC6dv1jUzrp6JJeW3egAL1Am5Y6Qpm+X7K7G8+AyiZIuFhrzFldV474Y83bLieSiO6bg/0wduU4uRAi2yE/FEh5VYzMXbCkPZCLUxgcQxRm0bJeokl4Co5CiQvhAyw8eTwi+80yJtXAkofcZVxtOy0NFzICRejfQL8/bLTiKFetsWTmbptDrV0gsoMkztE1zDBt9yMY9d9KhSgETkHB/Rp7da6RJA/t8KoZCrjcBTYfBP60fUe4n44ztQxUmmB5JSvL7Sb08FTqjAJJBXjkepAXJcUYrWC31W3M2gszI4TfOOWmUq+C15WDrPSPzvCGcWRxTr5wAQHsXI2/R4x7qa19WLHtNVjTQHgtKbsdkagkDnrakVp7voB2i8zM54BmD+Xt68zGqRUN0s7Guft1kTgbJ+8mDEofG14f7/JhFweycMEQxdxu80q0cPd5bUb877RvzxKDpjvbBf4Bzo4+W/p90FSBGa0W2Gxcnu+IPU81iN6JsSi9SErmfHVEX/Zh16D81BdEqpj0LcGNSwtTq296FmPJvWNSbhuQRDMtCZfUva2q/vWx4tujdoanjgs8XMgxXatxmnDP7g3I85CJRlEv65Lm5D8hbVEMxJ+R/xeoAypV8e6MlPB5uST4X1/hhUkG8np91ZVnEZ4TGbIcAXcOqE+GDV7Fnmo8nSW8TVit1m8v9baVIz23eq1WNFl+fthSjVozSkkl5xWMhtKQXcF1kayws5JkZIMcEYU03Y5QUFZT5C+mYs1n42/Hj8QebXcji7YtufJm5gnq/ZURtVgtVzPm9+L0hPjCVtiHGdu0med7s8jPpsNmbaSw9xvxJBPWLkwnYlzJdQYNQEnMZHwqdUhoEG0O0g/l8HhkorOwJjCu5caU0e9lkN/kA0Shrppf7N+ElSijE89D6tpeVOAo0iqGu6r59BIGeLB0Y+hLDDfrHdSSePMmgpVzbvUs2WIRgo7Ikt7YOecH0uqBH85jfEFk5TjZAUUVzNB8SsI2Q6tKfXheju2vISm1eTpRlDOTTiCdpjTkSwVFFukub5v2T1ZgVTVSl1r6m2IQVMw/MqfKzKw9b4UJv/8A4p8sE3c2A0ie0MY6WPF4silo/hSHbyR7pvxi4Io9DKr81C6u2Fcxofn4InpiaKqgDx8hKGPKvrSFQ/Yea29mkcePSMvdRBU0R4fENOttYHrKI8dngIf8TKCzkxbwvSvEDZBmJ6MotejMI8cJmldmLNvQMF43Vi3AN7g7dWqqsaq1xTDegz2LIxhvgGLu02AfQkiwKLfsDWFy+Ri1iVg9CtFgITU6I0a3ARFFtr4llJ4dtFjtjJbIyhHEUVtgWWTF2jwCEr55pTAuaItSbPJz55l2/GJtctwB/hJdiXCe4t13hB9Z7yiu7bHMIgCrCj2WZitG5xI5UQQ5cMbZykfBxXzhx4jjuBrVhl06xopOz/qrJseW1KX0ZEsOEvSVem1HbXO5ni158+H2Cf8p3LcB86B0xbbfLwzcC2omW40W26chxNK5dib1R1Eou+fyex5+Om6kCdcXXPQAGQCDjRddZm7/qdk7W7M8/lmH8efphmnaOPIwoM5BuCBynZKHXo9sxeyJiiLXqsa/hLRo1kfykNgvkTpKPMft+t5yn8IZIEk7jT1UDfBvNbBHLiP/RHqbtpsr55l3rBgXhXR0+6w7FENK1HXCOmNqaeZW6IBcZ0qRrDrXOJjCaK9L8Ew1+96PR4TeQAirWGaDekU5ZHHS7RPN2WTagFroz1M0WhEZGusGK54B0taNW/9FqZQZFJBAp15qCRIV3zTFe6ILkS4f3rgiEYtHW8BY224nAHNsrCOkntdSsPe4sHlZWwHzbVBEp4VM417ICd1ATxwbyZ6H5a2707iy7ob4T6oOU7kdTmwAcleG1WcpW4oia9Aca5ncXujP04K2De/yu4DtPGG2EZaODVeqsWTUiv9ymhUyJ4tgDeRfU8qRPb1DEhFv/vdMoUEj11a6sbzQXXZu3NPmrLh8egBefaROwMTIh0KrAGlqSDK41CbwD/Lw2rmJuJSpuQhBH2u7I6FRdPShLPLkVBs1Py78D3ZpE9eocd/Ya1BamJeIGaS4Oa8mAXZAdqNehDIirOJ7vjdnqEjMzA1wAJPYGzwISsQXd1U7VK/n/Hy1s+MZJyOUSxbK4v1zP3Zoa9mOLODbBXaqzmm6wdq4xRze/Z+DnYsShbgH2m6Q2PWcuJYbzNe0ZJDXH2P6WCyt56mIIEVDGfVZZuVdW95SGns1sdBRpyHVIBLgaikYrkndFcf0QyGLd2yZeM3tTFGXyl9xmVUyoSTJg6q4yb+qXftE8JZrxc7QFi55grkI04KAluwygn9/gGSFnWyo8onT29kaiwbYtr5if2ihRHH4/VNreuyflIXfPx6PT2LPgV8h8W3oJnYBInrMqlPgH6kAY0iou4= |
X-Forefront-Antispam-Report | CIP:139.99.165.139;CTRY:AU;LANG:en;SCL:8;SRV:;IPV:NLI;SFV:SPM;H:clouldfare.com;PTR:ip139.ip-139-99-165.net;CAT:OSPM;SFS:(13230040)(36860700013)(82310400026)(376014)(61400799027)(16072699012)(563134004)(36310999015);DIR:OUT;SFP:1501; |
X-OriginatorOrg | tools2winretail.com |
X-MS-Exchange-CrossTenant-OriginalArrivalTime | 06 Jan 2025 19:02:39.0388 (UTC) |
X-MS-Exchange-CrossTenant-Network-Message-Id | 923da074-7b11-4618-2ded-08dd2e84b0f2 |
X-MS-Exchange-CrossTenant-Id | 4da6a4ed-1de0-45d6-9b28-5d1efea2bb10 |
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp | TenantId=4da6a4ed-1de0-45d6-9b28-5d1efea2bb10;Ip=[139.99.165.139];Helo=[clouldfare.com] |
X-MS-Exchange-CrossTenant-AuthSource | MWH0EPF000971E8.namprd02.prod.outlook.com |
X-MS-Exchange-CrossTenant-AuthAs | Anonymous |
X-MS-Exchange-CrossTenant-FromEntityHeader | HybridOnPrem |
X-MS-Exchange-Transport-CrossTenantHeadersStamped | SJ0PR04MB8421 |
X-SPF-Result | mx269.antispamcloud.com: domain of tools2winretail.com designates 2a01:111:f403:d800:: as permitted sender |
Authentication-Results | antispamcloud.com; spf=pass smtp.mailfrom=7jxOn.noreply@tools2winretail.com |
X-Spampanel-Class | unsure |
X-Spampanel-Evidence | Combined (0.75) |
X-Recommended-Action | accept |
X-Filter-ID | Mvzo4OR0dZXEDF/gcnlw0W1qM9OcPzJ9YbzMuV3suMKpSDasLI4SayDByyq9LIhVPVXONZorfVPm Ig8yjvyL1kTNWdUk1Ol2OGx3IfrIJKywOmJyM1qr8uRnWBrbSAGDO2rLyLEFG+efsqHSEwilrpj9 EvBvwu01uVCaGVBWGqtjx1nGv9wcVQHIG1zkAV9W2kDN/MHG/tk+OBQVEowst1c8kLCTErh90CU3 /ps/n2TJOeIu1y7EbyRWksEZ9x0jK5uN4Nhp7uOkWlmbQCkb22ZahCgUvTCueR5bi0bHK/zq20Ir djTsEn8SSkbQKzz72uNIutGUgOOU1d7zP0IzRJc2U9pupMpV7IKkiJNmJEfskbZmeZzTL1YTEdfH u1rCSQ9g0nnV4fDFlhJr2ODpv1DBaLChQHOQr/kVk71YZ+M4lUhleGxK1cXYP3CiRw1Tugk/TNbL VqFE8m0alOSe9N9fxN2oReTDHAyOynaY0ClcqmlN0Am+3nOtnembDnMBmdySlZou9qHIGOZDEEo7 Owe4HWYH/z7sdXOfHCsVEZouMGQ4DiUkiT/mRx1mtCEM9ngl7EKICrwmSWNWIze1fPlwf46ajxCs 2fE9/cuikhDiXSby+2vXVLZ/ZdwU3ORj++DuIQUs/5JJj4C/n4CILlTRndWJl2Xl/Y8qCTk2Czv9 b2bcVafhhZs1gMEioif465aNI5FZUTvT1f1cTePU/DzYqp/CxNV/mRDVAfTZCIHsxBoFbdIyTZwD 0tTyhMSscJvXbl3jeSR1QgqmNVi1EGhZVOisvoJ744rs3lbZorTYU5QgjZ82d+iyZzpIMDv8KGRv QEF3FLFrOnxRiVjTMNH+BtxsajLDh58wUAFSXY8u1P1Sv0JAAhMee4sPjNWvIbtf63VNbf0lrvss Y+k7ABo9D2tqf4DULohY1lyI1zZWX1tc21uQB7LzHSfmcfLKyJk4O6DtrI4CX/tu77cn+JMqrDBz 8bmo/O1i1/VBoF1RAYGGs10R0L+0q1wNBANdDee5A8esHIlnr+yJWwdEQ5s77ycxFgv2R6RUvh2H HTqJ+cv73CChOPjKA0/DVd83NKZx1/egxD/lODh+l6xrFg== |
X-Report-Abuse-To | spam@quarantine14.antispamcloud.com |
Icon Hash: | 46070c0a8e0c67d6 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 7, 2025 13:42:07.318691015 CET | 62259 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 7, 2025 13:42:07.323543072 CET | 53 | 62259 | 1.1.1.1 | 192.168.2.5 |
Jan 7, 2025 13:42:07.323659897 CET | 62259 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 7, 2025 13:42:07.328438997 CET | 53 | 62259 | 1.1.1.1 | 192.168.2.5 |
Jan 7, 2025 13:42:07.768351078 CET | 62259 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 7, 2025 13:42:07.773449898 CET | 53 | 62259 | 1.1.1.1 | 192.168.2.5 |
Jan 7, 2025 13:42:07.773704052 CET | 62259 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 7, 2025 13:42:09.865349054 CET | 52440 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 7, 2025 13:42:09.870151043 CET | 53 | 52440 | 1.1.1.1 | 192.168.2.5 |
Jan 7, 2025 13:42:09.870274067 CET | 52440 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 7, 2025 13:42:09.875070095 CET | 53 | 52440 | 1.1.1.1 | 192.168.2.5 |
Jan 7, 2025 13:42:10.312880039 CET | 52440 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 7, 2025 13:42:10.318248987 CET | 53 | 52440 | 1.1.1.1 | 192.168.2.5 |
Jan 7, 2025 13:42:10.318334103 CET | 52440 | 53 | 192.168.2.5 | 1.1.1.1 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 7, 2025 13:42:07.318320036 CET | 53 | 64499 | 1.1.1.1 | 192.168.2.5 |
Jan 7, 2025 13:42:09.864921093 CET | 53 | 64413 | 1.1.1.1 | 192.168.2.5 |
Jan 7, 2025 13:42:11.964227915 CET | 62989 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 7, 2025 13:42:11.971460104 CET | 53 | 62989 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 7, 2025 13:42:11.964227915 CET | 192.168.2.5 | 1.1.1.1 | 0x7712 | Standard query (0) | PTR (Pointer record) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 7, 2025 13:42:00.496326923 CET | 1.1.1.1 | 192.168.2.5 | 0x7323 | No error (0) | 199.232.214.172 | A (IP address) | IN (0x0001) | false | ||
Jan 7, 2025 13:42:00.496326923 CET | 1.1.1.1 | 192.168.2.5 | 0x7323 | No error (0) | 199.232.210.172 | A (IP address) | IN (0x0001) | false | ||
Jan 7, 2025 13:42:11.971460104 CET | 1.1.1.1 | 192.168.2.5 | 0x7712 | Name error (3) | none | none | PTR (Pointer record) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 07:41:51 |
Start date: | 07/01/2025 |
Path: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xf0000 |
File size: | 34'446'744 bytes |
MD5 hash: | 91A5292942864110ED734005B7E005C0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 2 |
Start time: | 07:41:58 |
Start date: | 07/01/2025 |
Path: | C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff765180000 |
File size: | 710'048 bytes |
MD5 hash: | EC652BEDD90E089D9406AFED89A8A8BD |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |