Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RFQ # PC25-1301.xlsx

Overview

General Information

Sample name:RFQ # PC25-1301.xlsx
Analysis ID:1591786
MD5:e15cba1287fd9a0d755685df0c8d24e2
SHA1:39be11722c3417a9e330dd265cae7d30c2b23c32
SHA256:46bcde824114484f405e35827ddd2a1520ba1349644cd0bd7d9bead3f3d83730
Tags:xlsxuser-TeamDreier
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Excel Network Connections
Sigma detected: Suspicious Office Outbound Connections
Yara signature match

Classification

  • System is w11x64_office
  • EXCEL.EXE (PID: 7868 cmdline: "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding MD5: F9F7B6C42211B06E7AC3E4B60AA8FB77)
    • splwow64.exe (PID: 5872 cmdline: C:\Windows\splwow64.exe 12288 MD5: AF4A7EBF6114EE9E6FBCC910EC3C96E6)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
sheet1.xmlINDICATOR_XML_LegacyDrawing_AutoLoad_Documentdetects AutoLoad documents using LegacyDrawingditekSHen
  • 0x1bb:$s1: <legacyDrawing r:id="
  • 0x1e3:$s2: <oleObject progId="
  • 0x22a:$s3: autoLoad="true"

System Summary

barindex
Source: Network ConnectionAuthor: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0", Tim Shelton: Data: DestinationIp: 13.107.246.45, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE, Initiated: true, ProcessId: 7868, Protocol: tcp, SourceIp: 192.168.2.24, SourceIsIpv6: false, SourcePort: 49753
Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.24, DestinationIsIpv6: false, DestinationPort: 49753, EventID: 3, Image: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE, Initiated: true, ProcessId: 7868, Protocol: tcp, SourceIp: 13.107.246.45, SourceIsIpv6: false, SourcePort: 443
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: RFQ # PC25-1301.xlsxAvira: detected
Source: RFQ # PC25-1301.xlsxVirustotal: Detection: 57%Perma Link
Source: RFQ # PC25-1301.xlsxReversingLabs: Detection: 71%
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEDirectory created: C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xmlJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile opened: C:\Program Files\Microsoft Office\root\vfs\System\MSVCR100.dllJump to behavior
Source: unknownHTTPS traffic detected: 13.107.246.45:443 -> 192.168.2.24:49753 version: TLS 1.2
Source: global trafficDNS query: name: otelrules.svc.static.microsoft
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 13.107.246.45:443
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 13.107.246.45:443
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 13.107.246.45:443
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 13.107.246.45:443
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 13.107.246.45:443
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 13.107.246.45:443
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 13.107.246.45:443
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 13.107.246.45:443
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 13.107.246.45:443
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 13.107.246.45:443
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 13.107.246.45:443
Source: global trafficTCP traffic: 13.107.246.45:443 -> 192.168.2.24:49753
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 13.107.246.45:443
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 13.107.246.45:443
Source: global trafficTCP traffic: 13.107.246.45:443 -> 192.168.2.24:49753
Source: global trafficTCP traffic: 13.107.246.45:443 -> 192.168.2.24:49753
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 13.107.246.45:443
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 13.107.246.45:443
Source: global trafficTCP traffic: 13.107.246.45:443 -> 192.168.2.24:49753
Source: global trafficTCP traffic: 13.107.246.45:443 -> 192.168.2.24:49753
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 13.107.246.45:443
Source: global trafficTCP traffic: 13.107.246.45:443 -> 192.168.2.24:49753
Source: global trafficTCP traffic: 13.107.246.45:443 -> 192.168.2.24:49753
Source: global trafficTCP traffic: 13.107.246.45:443 -> 192.168.2.24:49753
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 13.107.246.45:443
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 13.107.246.45:443
Source: global trafficTCP traffic: 13.107.246.45:443 -> 192.168.2.24:49753
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 13.107.246.45:443
Source: global trafficTCP traffic: 13.107.246.45:443 -> 192.168.2.24:49753
Source: Joe Sandbox ViewIP Address: 13.107.246.45 13.107.246.45
Source: Joe Sandbox ViewJA3 fingerprint: 258a5a1e95b8a911872bae9081526644
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /rules/rule170146v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.18129; Pro)Host: otelrules.svc.static.microsoft
Source: global trafficDNS traffic detected: DNS query: otelrules.svc.static.microsoft
Source: Primary1736943994317993900_A1798503-CE31-4C98-978E-830A26D58429.log.0.drString found in binary or memory: https://res.cdn.office.net/mro1cdnstorage/fonts/prod/4.40/flatfontassets.pkg
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownHTTPS traffic detected: 13.107.246.45:443 -> 192.168.2.24:49753 version: TLS 1.2

System Summary

barindex
Source: sheet1.xml, type: SAMPLEMatched rule: detects AutoLoad documents using LegacyDrawing Author: ditekSHen
Source: sheet1.xml, type: SAMPLEMatched rule: INDICATOR_XML_LegacyDrawing_AutoLoad_Document author = ditekSHen, description = detects AutoLoad documents using LegacyDrawing
Source: classification engineClassification label: mal64.winXLSX@3/6@1/1
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xmlJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Users\user\Desktop\~$RFQ # PC25-1301.xlsxJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\{A1798503-CE31-4C98-978E-830A26D58429} - OProcSessId.datJump to behavior
Source: RFQ # PC25-1301.xlsxOLE indicator, Workbook stream: true
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: RFQ # PC25-1301.xlsxVirustotal: Detection: 57%
Source: RFQ # PC25-1301.xlsxReversingLabs: Detection: 71%
Source: unknownProcess created: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\CommonJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEDirectory created: C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xmlJump to behavior
Source: RFQ # PC25-1301.xlsxStatic file information: File size 1624746 > 1048576
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile opened: C:\Program Files\Microsoft Office\root\vfs\System\MSVCR100.dllJump to behavior
Source: RFQ # PC25-1301.xlsxInitial sample: OLE indicators vbamacros = False
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeWindow / User API: threadDelayed 907Jump to behavior
Source: C:\Windows\splwow64.exeLast function: Thread delayed
Source: C:\Windows\splwow64.exeLast function: Thread delayed
Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information queried: ProcessInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
Exploitation for Client Execution
Path Interception1
Process Injection
3
Masquerading
OS Credential Dumping1
Process Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
File and Directory Discovery
Distributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
RFQ # PC25-1301.xlsx57%VirustotalBrowse
RFQ # PC25-1301.xlsx71%ReversingLabsDocument-Office.Exploit.CVE-2017-11882
RFQ # PC25-1301.xlsx100%AviraEXP/CVE-2017-11882.Gen
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
s-part-0017.t-0009.t-msedge.net
13.107.246.45
truefalse
    high
    otelrules.svc.static.microsoft
    unknown
    unknownfalse
      high
      NameMaliciousAntivirus DetectionReputation
      https://otelrules.svc.static.microsoft/rules/rule170146v0s19.xmlfalse
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        13.107.246.45
        s-part-0017.t-0009.t-msedge.netUnited States
        8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
        Joe Sandbox version:42.0.0 Malachite
        Analysis ID:1591786
        Start date and time:2025-01-15 13:25:28 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 5m 6s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:defaultwindowsofficecookbook.jbs
        Analysis system description:Windows 11 23H2 with Office Professional Plus 2021, Chrome 131, Firefox 133, Adobe Reader DC 24, Java 8 Update 431, 7zip 24.09
        Run name:Potential for more IOCs and behavior
        Number of analysed new started processes analysed:16
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:RFQ # PC25-1301.xlsx
        Detection:MAL
        Classification:mal64.winXLSX@3/6@1/1
        EGA Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .xlsx
        • Found Word or Excel or PowerPoint or XPS Viewer
        • Attach to Office via COM
        • Active ActiveX Object
        • Scroll down
        • Close Viewer
        • Exclude process from analysis (whitelisted): dllhost.exe, sppsvc.exe, SIHClient.exe, appidcertstorecheck.exe, conhost.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 52.109.89.18, 52.109.89.119, 52.113.194.132, 52.109.28.47, 23.38.98.96, 23.38.98.104, 23.38.98.97, 51.104.15.252, 20.190.159.23, 172.202.163.200
        • Excluded domains from analysis (whitelisted): odc.officeapps.live.com, slscr.update.microsoft.com, europe.odcsm1.live.com.akadns.net, otelrules.afd.azureedge.net, weu-azsc-config.officeapps.live.com, eur.roaming1.live.com.akadns.net, mobile.events.data.microsoft.com, ecs-office.s-0005.s-msedge.net, roaming.officeapps.live.com, osiprod-weu-bronze-azsc-000.westeurope.cloudapp.azure.com, login.live.com, officeclient.microsoft.com, c.pki.goog, res-1-tls.cdn.office.net, ecs.office.com, e40491.dscg.akamaiedge.net, client.wns.windows.com, otelrules.azureedge.net, prod.configsvc1.live.com.akadns.net, ctldl.windowsupdate.com, weu-azsc-000.odc.officeapps.live.com, prod.roaming1.live.com.akadns.net, s-0005-office.config.skype.com, osiprod-uks-buff-azsc-000.uksouth.cloudapp.azure.com, x1.c.lencr.org, uks-azsc-000.roaming.officeapps.live.com, res-prod.trafficmanager.net, owamail.public.cdn.office.net.edgekey.net, onedscolprduks01.uksouth.cloudapp.azure.com, s-0005.s-msedge.net, config.officeapps.live.com, owamail.public.c
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtCreateKey calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        • Report size getting too big, too many NtReadVirtualMemory calls found.
        • Report size getting too big, too many NtSetValueKey calls found.
        TimeTypeDescription
        07:27:36API Interceptor932x Sleep call for process: splwow64.exe modified
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        13.107.246.45https://pcefan.com/diary/index.php?st-manager=1&path=/click/track&id=4973&type=ranking&url=http://nam.dcv.ms/BxPVLH2cz4Get hashmaliciousHTMLPhisherBrowse
        • nam.dcv.ms/BxPVLH2cz4
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        s-part-0017.t-0009.t-msedge.nethttps://eventor.orienteering.asn.au/Home/RedirectToLivelox?redirectUrl=https%3A%2F%2Farchive1.diqx8fescpsb0.amplifyapp.com%2Fm1%2Fenvelope%2Fdocument%2Fcontent%2F4086Get hashmaliciousUnknownBrowse
        • 13.107.246.45
        Setup_BrightSlide_1.0.9.exeGet hashmaliciousUnknownBrowse
        • 13.107.246.45
        9179390927_20250115_155451.htmlGet hashmaliciousHTMLPhisherBrowse
        • 13.107.246.45
        https://www.pdfforge.org/pdfcreator?srsltid=AfmBOoq1lpA5qNxfcLUyxjmEXAioeKYtqPTpBsIbZ5VOdq3uhOg1WclGGet hashmaliciousUnknownBrowse
        • 13.107.246.45
        0969686.vbeGet hashmaliciousAgentTeslaBrowse
        • 13.107.246.45
        Inquiry.jsGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
        • 13.107.246.45
        http://jfdhq.offerpeercheck.comGet hashmaliciousUnknownBrowse
        • 13.107.246.45
        T1#U5b89#U88c5#U53051.0.3.msiGet hashmaliciousUnknownBrowse
        • 13.107.246.45
        https://padlet.com/prowebsolutions488/new-message-jba6y6w7rg9tzzmnGet hashmaliciousHTMLPhisherBrowse
        • 13.107.246.45
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        MICROSOFT-CORP-MSN-AS-BLOCKUSemail.emlGet hashmaliciousUnknownBrowse
        • 52.111.231.21
        Setup_BrightSlide_1.0.9.exeGet hashmaliciousUnknownBrowse
        • 52.109.28.46
        9179390927_20250115_155451.htmlGet hashmaliciousHTMLPhisherBrowse
        • 13.107.253.62
        https://www.pdfforge.org/pdfcreator?srsltid=AfmBOoq1lpA5qNxfcLUyxjmEXAioeKYtqPTpBsIbZ5VOdq3uhOg1WclGGet hashmaliciousUnknownBrowse
        • 13.107.253.45
        MDE_File_Sample_88933f06263e296e986a83ec7e62d0a89d46b277.zipGet hashmaliciousUnknownBrowse
        • 40.126.32.134
        POSTA CERTIFICATA PRESTITI FINTECH FINO A 5 MILIONI DI EURO - BLOCCA PE... (633Ko).msgGet hashmaliciousUnknownBrowse
        • 20.42.65.85
        email.emlGet hashmaliciousUnknownBrowse
        • 52.109.76.144
        http://jfdhq.offerpeercheck.comGet hashmaliciousUnknownBrowse
        • 204.79.197.203
        mips.elfGet hashmaliciousMiraiBrowse
        • 137.135.93.73
        https://padlet.com/prowebsolutions488/new-message-jba6y6w7rg9tzzmnGet hashmaliciousHTMLPhisherBrowse
        • 20.42.73.26
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        258a5a1e95b8a911872bae9081526644DHL AWB CUSTOM CLEARANCE.xlsGet hashmaliciousUnknownBrowse
        • 13.107.246.45
        P-04071A.xlsGet hashmaliciousUnknownBrowse
        • 13.107.246.45
        ProductBOMpq_v4.xlsmGet hashmaliciousUnknownBrowse
        • 13.107.246.45
        RFQ____PC25-1301.xlsxGet hashmaliciousUnknownBrowse
        • 13.107.246.45
        B317.xlsxGet hashmaliciousUnknownBrowse
        • 13.107.246.45
        YYYY-NNN AUDIT DETAIL REPORT .docxGet hashmaliciousUnknownBrowse
        • 13.107.246.45
        CY SEC AUDIT PLAN 2025.docx.docGet hashmaliciousUnknownBrowse
        • 13.107.246.45
        H565rymIuO.docGet hashmaliciousUnknownBrowse
        • 13.107.246.45
        Sample_Order_000000991.xlsGet hashmaliciousUnknownBrowse
        • 13.107.246.45
        Payment_swift_copy.xlsGet hashmaliciousUnknownBrowse
        • 13.107.246.45
        No context
        Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):118
        Entropy (8bit):3.5700810731231707
        Encrypted:false
        SSDEEP:3:QaklTlAlXMLLmHlIlFLlmIK/5lTn84vlJlhlXlDHlA6l3l6Als:QFulcLk04/5p8GVz6QRq
        MD5:573220372DA4ED487441611079B623CD
        SHA1:8F9D967AC6EF34640F1F0845214FBC6994C0CB80
        SHA-256:BE84B842025E4241BFE0C9F7B8F86A322E4396D893EF87EA1E29C74F47B6A22D
        SHA-512:F19FA3583668C3AF92A9CEF7010BD6ECEC7285F9C8665F2E9528DBA606F105D9AF9B1DB0CF6E7F77EF2E395943DC0D5CB37149E773319078688979E4024F9DD7
        Malicious:false
        Reputation:high, very likely benign file
        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.H.e.a.r.t.b.e.a.t.C.a.c.h.e./.>.
        Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
        File Type:data
        Category:dropped
        Size (bytes):20971520
        Entropy (8bit):8.112143835430977E-5
        Encrypted:false
        SSDEEP:3:Tuekk9NJtHFfs1XsExe/t:qeVJ8
        MD5:AFDEAC461EEC32D754D8E6017E845D21
        SHA1:5D0874C19B70638A0737696AEEE55BFCC80D7ED8
        SHA-256:3A96B02F6A09F6A6FAC2A44A5842FF9AEB17EB4D633E48ABF6ADDF6FB447C7E2
        SHA-512:CAB6B8F9FFDBD80210F42219BAC8F1124D6C0B6995C5128995F7F48CED8EF0F2159EA06A2CD09B1FDCD409719F94A7DB437C708D3B1FDA01FDC80141A4595FC7
        Malicious:false
        Reputation:moderate, very likely benign file
        Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
        File Type:data
        Category:dropped
        Size (bytes):20971520
        Entropy (8bit):0.0
        Encrypted:false
        SSDEEP:3::
        MD5:8F4E33F3DC3E414FF94E5FB6905CBA8C
        SHA1:9674344C90C2F0646F0B78026E127C9B86E3AD77
        SHA-256:CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC
        SHA-512:7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB
        Malicious:false
        Reputation:high, very likely benign file
        Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
        File Type:ASCII text, with very long lines (28928), with CRLF line terminators
        Category:dropped
        Size (bytes):20971520
        Entropy (8bit):0.19615273991668625
        Encrypted:false
        SSDEEP:3072:WIdBvfzCeU4blYwlwtOh3kVf/SKs+nyeNbq9KB0mI:5vfzCejlYwlwtOh3kVf/SKs+nyPc+m
        MD5:863D7C0BC91C27340864EAEF3F751D7C
        SHA1:91D9F16F9206F56B7AAA7F3AFDA6C69C415BF0AB
        SHA-256:44B3E5683040AA96E3C0EF484FD4F98B65A9A91FD567E488E5B2C80D0AD7505E
        SHA-512:C84CD6A31FD528A57EE17F1360B400D3D8D98188ED5A860FB30CCCF1975EE43FF50C56D0F79C0BF434BB485EDCFF0D9E43DF93A30A9656B850A83396FFCC8DA4
        Malicious:false
        Reputation:low
        Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation..01/15/2025 12:26:34.318.EXCEL (0x1EBC).0x1F50.Microsoft Excel.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Experimentation.FeatureQueryBatched","Flags":33777005812056321,"InternalSequenceNumber":16,"Time":"2025-01-15T12:26:34.318Z","Data.Sequence":0,"Data.Count":128,"Data.Features":"[ { \"ID\" : 1, \"N\" : \"Microsoft.Office.Telemetry.TrackCPSWrites\", \"V\" : false, \"S\" : 1, \"P\" : 0, \"T\" : \"2025-01-15T12:26:34.0218681Z\", \"C\" : \"33\", \"Q\" : 0.0, \"M\" : 0, \"F\" : 5 }, { \"ID\" : 1, \"N\" : \"Microsoft.Office.Telemetry.CPSMaxWrites\", \"V\" : 2, \"S\" : 1, \"P\" : 0, \"T\" : \"2025-01-15T12:26:34.0218681Z\", \"C\" : \"33\", \"Q\" : 0.0, \"M\" : 0, \"F\" : 5 }, { \"ID\" : 1, \"N\" : \"Microsoft.Office.Word.UAEOnSafeModeEnabled\", \"V\" : true, \"S\" : 1, \"P\" : 0, \"T\" : \"2025-01-15T12:26:34.0218681Z\", \"C\" : \"\", \"Q\" : 7.0, \"M\" : 0, \"F\" : 5, \"G\" : \"Opt\" }, { \"ID\" : 1, \"
        Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
        File Type:data
        Category:dropped
        Size (bytes):20971520
        Entropy (8bit):0.0
        Encrypted:false
        SSDEEP:3::
        MD5:8F4E33F3DC3E414FF94E5FB6905CBA8C
        SHA1:9674344C90C2F0646F0B78026E127C9B86E3AD77
        SHA-256:CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC
        SHA-512:7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB
        Malicious:false
        Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
        File Type:data
        Category:dropped
        Size (bytes):165
        Entropy (8bit):1.4134958568691696
        Encrypted:false
        SSDEEP:3:D//nEwmM:DXEwmM
        MD5:8B6F49EF043D1AF562C216108A13E0F2
        SHA1:0106337F6D46E83B30CA7C1563C3FC3AF4209AF3
        SHA-256:C80D5433620A06CF252C9489F9A46BA091A5DAA239AAC3A98DB918627DEFF314
        SHA-512:241592FDA43D686AF92D22B2B451C51E70B742A5C33FA94307613155906396A53501E05719DD568C3D3C8088B95B83D7E98393B3692EB4B01907FE8BD927E896
        Malicious:true
        Preview:.user ..M.a.o.g.a. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
        File type:Microsoft Excel 2007+
        Entropy (8bit):7.998029966501083
        TrID:
        • Excel Microsoft Office Open XML Format document (35004/1) 81.40%
        • ZIP compressed archive (8000/1) 18.60%
        File name:RFQ # PC25-1301.xlsx
        File size:1'624'746 bytes
        MD5:e15cba1287fd9a0d755685df0c8d24e2
        SHA1:39be11722c3417a9e330dd265cae7d30c2b23c32
        SHA256:46bcde824114484f405e35827ddd2a1520ba1349644cd0bd7d9bead3f3d83730
        SHA512:e96d726f92d5de720cad1bae386999cabc588c72968cf824428ef853660fa839a6fdb1ff79ed78ae21a5a395f41556ce045a99c282508e30ab2517ee2770906e
        SSDEEP:49152:iwoULlGhp8mRgfzBMzlkc3PakctEXuS0EOrrb:JoULlGv+7Gp3BceXlL+f
        TLSH:BB7533C5B764950DE61784F08B20A2E2C73EF437AEB6069E8A6D56C1D09ED5F4A3F4C0
        File Content Preview:PK.........,/Z2.<o....c.......[Content_Types].xmlUT....I.g.I.g.I.g.U.J.1.}...!.2....tZp._\.~@...i3IH..........2.}.0$g..f..W.....v.d...2..)m.%{...g,.(...Y(.."................9.Q....p.,.L\...o.r/.BL..:.S..E..c.`..=..ZA. ....t..p$6.|.....r.L.%...-..s....j.&.
        Icon Hash:35e58a8c0c8a85b9
        Document Type:OpenXML
        Number of OLE Files:1
        Has Summary Info:
        Application Name:
        Encrypted Document:False
        Contains Word Document Stream:False
        Contains Workbook/Book Stream:True
        Contains PowerPoint Document Stream:False
        Contains Visio Document Stream:False
        Contains ObjectPool Stream:False
        Flash Objects Count:0
        Contains VBA Macros:False
        Author:ctrl
        Last Saved By:ctrl
        Create Time:2022-11-18T02:05:27Z
        Last Saved Time:2022-11-18T02:07:12Z
        Creating Application:Microsoft Excel
        Security:0
        Thumbnail Scaling Desired:false
        Contains Dirty Links:false
        Shared Document:false
        Changed Hyperlinks:false
        Application Version:12.0000
        General
        Stream Path:\x1OLE10naTiVE
        CLSID:
        File Type:data
        Stream Size:1892483
        Entropy:7.516451671309975
        Base64 Encoded:True
        Data ASCII:. . . U . . R . . S . . . . v ~ N . . S . ! - . X ! K + @ . . . . y e X < T 9 c S . . O . Z X b . . @ d R h E . d Z _ q . . T - 0 . P { D . C . . . O ( . \\ w i ? . ] . . | . $ . . h . . x . l U S ) . f v C . p . c Z . U m n \\ ! # . { E . ] P U U n % 4 ` T . A F 1 3 . 8 I 9 P 1 _ A Y . . l u . a \\ P k 5 . \\ ! . h ^ . t O [ j U _ B : = C @ ` . : . Q . Y ; . 2 \\ . 3 S ] i c h . W e . m d . . . . . V o . R 7 . S | . . l . p . H 1 M . ) . w ! . + # . . 9 y . B L M . f Z 5 | M . W 2 5 i " . ] . . / . . } Q . I N
        Data Raw:a5 b6 9d 05 03 1e f6 ab 83 55 01 08 ab c0 bb a5 52 16 0d 81 f3 99 ef 53 0d 8b 0b 8b 19 be b3 7f 76 7e 81 e6 bc e7 4e 01 8b 06 53 ff d0 05 9a f7 ef 21 2d 16 58 e1 21 ff e0 4b 9b 2b 40 00 0f de ab cf 9e f7 79 65 92 ad 58 94 fc d4 cb 3c 54 c0 80 39 e4 63 53 ef ba 03 82 19 4f e1 80 9c 5a 86 58 62 1f 99 04 8a f4 40 64 52 68 ac f9 ab db 45 19 64 5a 5f 71 1b 17 b3 54 2d af f6 c5 30 e5 12
        General
        Stream Path:Gkz8Fhdwr0V2bxPPY6A
        CLSID:
        File Type:empty
        Stream Size:0
        Entropy:0.0
        Base64 Encoded:False
        Data ASCII:
        Data Raw:
        TimestampSource PortDest PortSource IPDest IP
        Jan 15, 2025 13:27:41.974406958 CET49753443192.168.2.2413.107.246.45
        Jan 15, 2025 13:27:41.974457026 CET4434975313.107.246.45192.168.2.24
        Jan 15, 2025 13:27:41.974524021 CET49753443192.168.2.2413.107.246.45
        Jan 15, 2025 13:27:41.974872112 CET49753443192.168.2.2413.107.246.45
        Jan 15, 2025 13:27:41.974884033 CET4434975313.107.246.45192.168.2.24
        Jan 15, 2025 13:27:42.638937950 CET4434975313.107.246.45192.168.2.24
        Jan 15, 2025 13:27:42.639005899 CET49753443192.168.2.2413.107.246.45
        Jan 15, 2025 13:27:42.641999006 CET49753443192.168.2.2413.107.246.45
        Jan 15, 2025 13:27:42.642011881 CET4434975313.107.246.45192.168.2.24
        Jan 15, 2025 13:27:42.642410040 CET4434975313.107.246.45192.168.2.24
        Jan 15, 2025 13:27:42.656529903 CET49753443192.168.2.2413.107.246.45
        Jan 15, 2025 13:27:42.703336000 CET4434975313.107.246.45192.168.2.24
        Jan 15, 2025 13:27:42.771050930 CET4434975313.107.246.45192.168.2.24
        Jan 15, 2025 13:27:42.771203041 CET4434975313.107.246.45192.168.2.24
        Jan 15, 2025 13:27:42.771827936 CET49753443192.168.2.2413.107.246.45
        Jan 15, 2025 13:27:42.771954060 CET49753443192.168.2.2413.107.246.45
        Jan 15, 2025 13:27:42.771970987 CET4434975313.107.246.45192.168.2.24
        Jan 15, 2025 13:27:42.771997929 CET49753443192.168.2.2413.107.246.45
        Jan 15, 2025 13:27:42.772006035 CET4434975313.107.246.45192.168.2.24
        TimestampSource PortDest PortSource IPDest IP
        Jan 15, 2025 13:27:41.966085911 CET5759053192.168.2.241.1.1.1
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Jan 15, 2025 13:27:41.966085911 CET192.168.2.241.1.1.10xf1aeStandard query (0)otelrules.svc.static.microsoftA (IP address)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Jan 15, 2025 13:27:41.973804951 CET1.1.1.1192.168.2.240xf1aeNo error (0)otelrules.svc.static.microsoftotelrules.azureedge.netCNAME (Canonical name)IN (0x0001)false
        Jan 15, 2025 13:27:41.973804951 CET1.1.1.1192.168.2.240xf1aeNo error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
        Jan 15, 2025 13:27:41.973804951 CET1.1.1.1192.168.2.240xf1aeNo error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
        • otelrules.svc.static.microsoft
        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        0192.168.2.244975313.107.246.454437868C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
        TimestampBytes transferredDirectionData
        2025-01-15 12:27:42 UTC214OUTGET /rules/rule170146v0s19.xml HTTP/1.1
        Connection: Keep-Alive
        Accept-Encoding: gzip
        User-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.18129; Pro)
        Host: otelrules.svc.static.microsoft
        2025-01-15 12:27:42 UTC498INHTTP/1.1 200 OK
        Date: Wed, 15 Jan 2025 12:27:42 GMT
        Content-Type: text/xml
        Content-Length: 461
        Connection: close
        Cache-Control: public, max-age=604800, immutable
        Last-Modified: Thu, 14 Nov 2024 16:14:57 GMT
        ETag: "0x8DD04C77BDE7614"
        x-ms-request-id: 699a35e1-a01e-0021-3342-67814c000000
        x-ms-version: 2018-03-28
        x-azure-ref: 20250115T122742Z-15fdc555dfffw2tchC1EWR5hpw00000001y0000000005b8h
        x-fd-int-roxy-purgeid: 0
        X-Cache-Info: L2_T2
        X-Cache: TCP_REMOTE_HIT
        Accept-Ranges: bytes
        2025-01-15 12:27:42 UTC461INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 37 30 31 34 36 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 47 72 61 70 68 69 63 73 2e 45 78 70 6f 72 74 42 75 6c 6c 65 74 42 6c 69 70 43 45 78 63 65 70 74 69 6f 6e 22 20 41 54 54 3d 22 63 66 63 66 64 62 39 31 63 36 38 63 34 33 32 39 62 62 38 62 37 63 62 37 62 61 62 62 33 63 66 37 2d 65 30 38 32 63 32 66 32 2d 65 66 31 64 2d 34 32 37 61 2d 61 63 34 64 2d 62 30 62 37 30 30 61 66 65 37 61 37 2d 37 36 35 35 22 20 44 43 61 3d 22 50 53 55 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 54 53 20 54 3d 22 31 22 20 49 64 3d 22 34 38 39 66 34 22 20
        Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="170146" V="0" DC="SM" EN="Office.Graphics.ExportBulletBlipCException" ATT="cfcfdb91c68c4329bb8b7cb7babb3cf7-e082c2f2-ef1d-427a-ac4d-b0b700afe7a7-7655" DCa="PSU" xmlns=""> <S> <UTS T="1" Id="489f4"


        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:07:26:33
        Start date:15/01/2025
        Path:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
        Wow64 process (32bit):false
        Commandline:"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
        Imagebase:0x7ff7a90e0000
        File size:70'082'712 bytes
        MD5 hash:F9F7B6C42211B06E7AC3E4B60AA8FB77
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:moderate
        Has exited:false

        Target ID:9
        Start time:07:27:36
        Start date:15/01/2025
        Path:C:\Windows\splwow64.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\splwow64.exe 12288
        Imagebase:0x7ff626b90000
        File size:192'512 bytes
        MD5 hash:AF4A7EBF6114EE9E6FBCC910EC3C96E6
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:moderate
        Has exited:false

        No disassembly