Windows
Analysis Report
BL 248436935 CNTR MRKU9180226.docx.doc
Overview
General Information
Detection
Score: | 60 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
WINWORD.EXE (PID: 7848 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \Root\Offi ce16\WINWO RD.EXE" /A utomation -Embedding MD5: 1A0C2C2E7D9C4BC18E91604E9B0C7678)
- cleanup
Source: | Author: X__Junior (Nextron Systems): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-25T07:30:37.171113+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49718 | 162.19.137.157 | 443 | TCP |
2025-03-25T07:30:38.726735+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49720 | 162.19.137.157 | 443 | TCP |
2025-03-25T07:30:39.469261+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49723 | 162.19.137.157 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-25T07:30:38.254723+0100 | 1810005 | 1 | Potentially Bad Traffic | 192.168.2.4 | 49719 | 162.19.137.157 | 443 | TCP |
- • AV Detection
- • Compliance
- • Software Vulnerabilities
- • Networking
- • System Summary
- • Persistence and Installation Behavior
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
Click to jump to signature section
AV Detection |
---|
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | File opened: | Jump to behavior |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | DNS query: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | Memory has grown: |
Networking |
---|
Source: | Suricata IDS: |
Source: | IP Address: |
Source: | JA3 fingerprint: | ||
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | OLE indicator, Word Document stream: |
Source: | OLE document summary: |
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Window detected: |
Source: | Initial sample: | ||
Source: | Initial sample: | ||
Source: | Initial sample: |
Source: | Key opened: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Initial sample: |
Source: | Initial sample: |
Persistence and Installation Behavior |
---|
Source: | Extracted files from sample: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | WMI Queries: |
Source: | Process information queried: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 11 Windows Management Instrumentation | Path Interception | 1 Process Injection | 1 Masquerading | OS Credential Dumping | 1 Security Software Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 3 Exploitation for Client Execution | Boot or Logon Initialization Scripts | 1 Extra Window Memory Injection | 1 Virtualization/Sandbox Evasion | LSASS Memory | 1 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | 3 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Process Injection | Security Account Manager | 1 Process Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Extra Window Memory Injection | NTDS | 1 File and Directory Discovery | Distributed Component Object Model | Input Capture | 14 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | 2 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
16% | Virustotal | Browse | ||
19% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
host1.emobility.energy | 162.19.137.157 | true | false | high | |
s-0005.dual-s-msedge.net | 52.123.128.14 | true | false | high | |
t.emobility.energy | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
true |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
162.19.137.157 | host1.emobility.energy | United States | 209 | CENTURYLINK-US-LEGACY-QWESTUS | false |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1647704 |
Start date and time: | 2025-03-25 07:29:26 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 35s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsofficecookbook.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 23 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | BL 248436935 CNTR MRKU9180226.docx.doc |
Detection: | MAL |
Classification: | mal60.evad.winDOC@2/1@1/1 |
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, a udiodg.exe, sppsvc.exe, Runtim eBroker.exe, ShellExperienceHo st.exe, WMIADAP.exe, SIHClient .exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, s vchost.exe - Excluded IPs from analysis (wh
itelisted): 52.109.0.91, 184.3 1.69.3, 52.109.16.112, 52.111. 251.19, 52.111.251.16, 52.111. 251.17, 52.111.251.18, 23.196. 3.185, 23.196.3.178, 52.123.12 8.14, 40.126.24.146, 20.109.21 0.53 - Excluded domains from analysis
(whitelisted): slscr.update.m icrosoft.com, templatesmetadat a.office.net.edgekey.net, fs-w ildcard.microsoft.com.edgekey. net, fs-wildcard.microsoft.com .edgekey.net.globalredir.akadn s.net, e16604.dscf.akamaiedge. net, osiprod-ncus-buff-azsc-00 0.northcentralus.cloudapp.azur e.com, ncus-azsc-000.roaming.o fficeapps.live.com, prod-canc- resolver.naturallanguageeditor service.osi.office.net.akadns. net, roaming.officeapps.live.c om, dual-s-0005-office.config. skype.com, ocsp.digicert.com, login.live.com, wus-azsc-confi g.officeapps.live.com, officec lient.microsoft.com, templates metadata.office.net, prod.fs.m icrosoft.com.akadns.net, c.pki .goog, ecs.office.com, fs.micr osoft.com, prod.configsvc1.liv e.com.akadns.net, ctldl.window supdate.com, prod-na.naturalla nguageeditorservice.osi.office .net.akadns.net, prod.roaming1 .live.com.akadns.net, fe3cr.de livery.mp.microsoft.com, us1.r oaming1.live.com.akadns.net, p rod1.naturallanguageeditorserv ice.osi.office.net.akadns.net, nleditor.osi.office.net, e267 69.d - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtQueryAttributesFile calls found. - Report size getting too big, t
oo many NtQueryValueKey calls found. - Report size getting too big, t
oo many NtReadVirtualMemory ca lls found.
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
162.19.137.157 | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
s-0005.dual-s-msedge.net | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher, Invisible JS, Tycoon2FA | Browse |
| ||
host1.emobility.energy | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CENTURYLINK-US-LEGACY-QWESTUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC Stealer, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
37f463bf4616ecd445d4a1937da06e19 | Get hash | malicious | Clipboard Hijacker | Browse |
| |
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | LummaC Stealer, Stealc, Vidar | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Remcos, GuLoader | Browse |
|
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 162 |
Entropy (8bit): | 4.7887095547632414 |
Encrypted: | false |
SSDEEP: | 3:KVGl/lilKlRAGlK8f/kHyr6f+qIUrXt59dWkkqlpOJEPRaaVfP:KVy/4KDJsY8IOqJ9JEP82P |
MD5: | 29F9C45CCA48299F08F9138AB94E69AD |
SHA1: | 849D952CDD6BDF11826791850C0746454C420B7B |
SHA-256: | C352AE2063C039092CC0B4C9E248FAC749D835F2DCB7C5B8DB7C1099E7DCD1FE |
SHA-512: | 8E75ADCCFC71427B7F28227427D51AF2C79D6BF24FDA94C19CE8E99AEBB5D2E39D567A688A3FCE18E11782EC44672DFAE0BB94203D4444CF9A6E341F7E6FA73B |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.963690696843289 |
TrID: |
|
File name: | BL 248436935 CNTR MRKU9180226.docx.doc |
File size: | 56'034 bytes |
MD5: | d4409205b193e0790bb72cd954812833 |
SHA1: | a96d542ec49c29e5c71a620ee61343075e53b96c |
SHA256: | 8ffa58fc07d41fd5d0b67467cfe731ca8d05de3a075ed9f7e22fcd31b3339d61 |
SHA512: | 60f5877e972415fee24b76e172412e3b7b416b667673459f0278bc4d15c1363474ed87e21b7e635648828db52f107c427f8b0dd7ed8a901686e92ac1bdee9e98 |
SSDEEP: | 768:mYqOqCBG0LSEbG2FVChvBQ78itcNjXxIqSSooFul1Yt9Nxk/EW7hwTP9VAnCA9EQ:mn7CfVChJucpXxpY1ubyZS38xuQ4NxQ |
TLSH: | B643F1799861481AE6CC43F9D1453A0EF631E7271EA330339F901F2DADF7AC9061266D |
File Content Preview: | PK.........UxZ+..0............[Content_Types].xmlUT....7.g.7.g.7.g.V.j.@.}/.....i..J)....c.h.....%.7v&......SL".../.bu.3s4hu.;[<A...Z,..(..`:.....o.GQ )o...j.......V...X0.c-Z..IJ.-8.U......)....Q..j..z.. u...J..b....Rg..S..+.:.9$#.......N...\.....vZ...O.. |
Icon Hash: | 35e1cc889a8a8599 |
Document Type: | OpenXML |
Number of OLE Files: | 1 |
Has Summary Info: | |
Application Name: | |
Encrypted Document: | False |
Contains Word Document Stream: | True |
Contains Workbook/Book Stream: | False |
Contains PowerPoint Document Stream: | False |
Contains Visio Document Stream: | False |
Contains ObjectPool Stream: | False |
Flash Objects Count: | 0 |
Contains VBA Macros: | False |
Code Page: | -535 |
Title: | |
Subject: | |
Author: | 91974 |
Keywords: | |
Template: | |
Last Saved By: | 91974 |
Revion Number: | 2 |
Total Edit Time: | 1 |
Last Printed: | 2020-10-16 02:53:17 |
Create Time: | 2025-03-21T06:52:00Z |
Last Saved Time: | 2025-03-21T06:53:00Z |
Number of Pages: | 1 |
Number of Words: | 0 |
Number of Characters: | 0 |
Thumbnail: | 'H.&" WMFC @l! EMF@"8X?F, EMF+@xxF\PEMF+"@@$@0@?!@@!"!"!"!"!"!'%&%(6(%Ld(((!??%6)%Ld((!??%M6)M%LdM(MM(!??%g6)g%Ldg(gg(!??%}6)}%Ld}(}}(!??%6)%Ld((!??%6)%Ld((!??%6)%Ld((!??%(6%Ld((!??%(6(%Ld(((!??%6%Ld!??%6%Ld!??'%Ld''!??%%6(%Ld''!??%6%Ld!??'%(&%6(%Ld'&!??%6%Ld!??'%(&%6(%Ld'&!??%'6'%Ld'''!??!bK!;$$==V(8X8h(h$$AA<C%'%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%(%""Rp[SOu#a#/#lu|0#aQlu%hhy`Qy/%hy%hy/y%hT yy{/yuyO/yyI/ y<I/-&Wa#/yu9y y%huy%hdv%'A>TT4GUUA&A4LP1TTReUUA&ARLP2TThzUUA&AgLh(}P3TTUUA&ALP4TTUUA&ALP5TTUUA&ALP6TTUUA&ALPATT^gUUA&A^LPB%%"!%'A>)Rp0wiSO_GB2312ua#/lu|0aQlu&hXy`Qpy/&h y&hy/ y&hD!yy{/ yuyO/ yx yI/ yl>I/-&W"a#/yu9 yy&huy&hdv%Rp Verdanayupy-&lu&&" WMFC @aQlu'hXy`Qpy/'h y'hy/ y'hD!yy{/ yuyO/ yx yI/ ydcaI/-&Wa#/yu9 yy'huy'hdv%RpTimes New Romanyupy-&lu+aQlu(hXy`Qpy/(h y(hy/ y(hD!yy{/ yuyO/ yx yI/ ycaI/-&Wa#/yu9 yy(huy(hdv%T,i{UUA&A,itL4 TEL: 0086-512-82558856 FAX: 0086-512-58268319Rp[SOyupya#/D!yluunaQlu)hXy`Qpy/)h y)hy/ y)hD!yy{/ yuyO/ yx yI/ yTeaI/-&Wa#/yu9 yy)huy)hdv%RpTimes New RomanyupyD!ylu)aQlugXy`Qpy/g ygy/ ygD!yy{/ yuyO/ yx yI/ ypI/-&Wa#/yu9 yyguygdv%%%%%%%%"!%)MT-#JUUA&A-#Ld_ln~v[8fgPlQS))))))))))))%%"!%)NgTReUUA&ARLxJIANGSU SOIPOI CO.,LTD%"!%)TLUUA&A,LL%%%%%%%%"!%)%%%%%%%%TTUUA&ALP'%Ld!??%%TTUUA&ALP %Ld!??%%TTUUA&ALP'%Ld!??%%TTUUA&ALP %Ld!??%%TTUUA&ALPUS%Ld!??%%TUUA&ALp / DELIVERY ORDER%Ld!??%%%%"!%)%"!%'%(&%6%Ld!??%6%Ld!??%~6%Ld~~!??%~6%Ld~~!??%(6(%Ld(((!??%6%Ld!??%6%Ld!??%(6%Ld((!??%(M6M%Ld(MM(M!??%(g6g%Ld(gg(g!??%(}6}%Ld(}}(}!??%(6%Ld((!??%(6%Ld((!??%(6%Ld((!??%%"!%))%"!%'%(&%6%Ld!??%6%Ld!??%("Q|P(x( F4(EMF+*@$??FEMF+@ &6WMFC@''',',',--((-@!(-)-@!(-MM)-@!(M-gg)-@!(g-}})-@!(}-)-@!(-)-@!(-)-@!(-(-@!(-((-@!(--@!--@!-@!'--(-@!'--@!--(-@!&--@!--(-@!&-''-@!',$#"! ---$$$----$$$----$$$----$$$----$$$----$$$----$$$----$$$----$$$----$$$----$$$----$$$----$$$----$$$----$$$----$$$----$$$----$$$---''??-'A>2412R22gh(}32425262A2^B-"System-'-'A>,)0??_GB2312- Verdana-Times New Roman-2i,t TEL: 0086-512-82558856 FAX: 0086-512-58268319??-Times New Roman--------'-,M)+2#-))))))))))))--'-,gN)(2RJIANGSU SOIPOI CO.,LTD-'-,)2,--------'-,)--------2-@!--2 -@!--2-@!--2 -@!--2-@!--!2 / DELIVERY ORDER-@!----'-,)-'-,---@!--@!-~-@!~-~-@!~-((-@!(--@!--@!-(-@!(-M(M-@!M(-g(g-@!g(-}(}-@!}(-(-@!(-(-@!(-(-@!(--'-,),)-'-,---@!--@!-'#A( |
Creating Application: | |
Security: | 0 |
Document Code Page: | 1252 |
Presentation Target Format: | |
Number of Lines: | 1 |
Number of Paragraphs: | 1 |
Number of Slides: | 0 |
Number of Pages with Notes: | 0 |
Number of Hidden Slides: | 0 |
Number of Sound/Video Clips: | 0 |
Thumbnail Scaling Desired: | false |
Company: | |
Contains Dirty Links: | false |
Shared Document: | false |
Changed Hyperlinks: | false |
Application Version: | 12.0000 |
General | |
Stream Path: | \x1CompObj |
CLSID: | |
File Type: | data |
Stream Size: | 114 |
Entropy: | 4.25248375192737 |
Base64 Encoded: | True |
Data ASCII: | . . . . . . . . . . . . . . . . . . . F & . . . M i c r o s o f t O f f i c e E x c e l 2 0 0 3 W o r k s h e e t . . . . . B i f f 8 . . . . . E x c e l . S h e e t . 8 . 9 q . . . . . . . . . . . . |
Data Raw: | 01 00 fe ff 03 0a 00 00 ff ff ff ff 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 26 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 32 30 30 33 20 57 6f 72 6b 73 68 65 65 74 00 06 00 00 00 42 69 66 66 38 00 0e 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00 |
General | |
Stream Path: | \x1Ole |
CLSID: | |
File Type: | data |
Stream Size: | 20 |
Entropy: | 0.5689955935892812 |
Base64 Encoded: | False |
Data ASCII: | . . . . . . . . . . . . . . . . . . . . |
Data Raw: | 01 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |
General | |
Stream Path: | \x3EPRINT |
CLSID: | |
File Type: | Windows Enhanced Metafile (EMF) image data version 0x10000 |
Stream Size: | 36988 |
Entropy: | 3.2497681809626355 |
Base64 Encoded: | False |
Data ASCII: | . . . . l . . . . . . . . . . . . . . . . . . . . . . . . . J [ . . ( W . . E M F . . . . | . . k . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . \\ K . . h C . . F . . . , . . . . . . E M F + . @ . . . . . . . . . . . . . . . . X . . . X . . . F . . . \\ . . . P . . . E M F + " @ . . . . . . . . . . . @ . . . . . . . . . . $ @ . . . . . . . . . . 0 @ . . . . . . . . . . . . ? ! @ . . . . . . . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
Data Raw: | 01 00 00 00 6c 00 00 00 00 00 00 00 20 00 00 00 0a 14 00 00 f1 13 00 00 00 00 00 00 00 00 00 00 4a 5b 00 00 28 57 00 00 20 45 4d 46 00 00 01 00 7c 90 00 00 6b 04 00 00 0e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ec 13 00 00 c8 19 00 00 d8 00 00 00 17 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5c 4b 03 00 68 43 04 00 46 00 00 00 2c 00 00 00 20 00 00 00 45 4d 46 2b 01 40 01 00 |
General | |
Stream Path: | \x3ObjInfo |
CLSID: | |
File Type: | data |
Stream Size: | 6 |
Entropy: | 1.2516291673878228 |
Base64 Encoded: | False |
Data ASCII: | . . . . . . |
Data Raw: | 00 00 03 00 0d 00 |
General | |
Stream Path: | \x5DocumentSummaryInformation |
CLSID: | |
File Type: | data |
Stream Size: | 560 |
Entropy: | 3.3879366798911743 |
Base64 Encoded: | True |
Data ASCII: | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , D . . . . . . . . . . + , . . . H . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . % . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
Data Raw: | fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 44 00 00 00 05 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 8c 01 00 00 48 01 00 00 10 00 00 00 01 00 00 00 88 00 00 00 03 00 00 00 90 00 00 00 05 00 00 00 9c 00 00 00 06 00 00 00 a4 00 00 00 07 00 00 00 ac 00 00 00 08 00 00 00 b4 00 00 00 09 00 00 00 |
General | |
Stream Path: | \x5SummaryInformation |
CLSID: | |
File Type: | data |
Stream Size: | 24184 |
Entropy: | 3.1945226555165376 |
Base64 Encoded: | True |
Data ASCII: | . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . + ' 0 . . . H ^ . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 1 9 7 4 . . . . . . . . . . . 1 . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . . . g . @ . . . . . . Q < . . @ . . . |
Data Raw: | fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 48 5e 00 00 0e 00 00 00 01 00 00 00 78 00 00 00 04 00 00 00 80 00 00 00 07 00 00 00 94 00 00 00 08 00 00 00 a0 00 00 00 09 00 00 00 b0 00 00 00 12 00 00 00 bc 00 00 00 0b 00 00 00 d4 00 00 00 0c 00 00 00 e0 00 00 00 0d 00 00 00 ec 00 00 00 |
General | |
Stream Path: | Workbook |
CLSID: | |
File Type: | Applesoft BASIC program data, first line number 16 |
Stream Size: | 17006 |
Entropy: | 4.28640454300865 |
Base64 Encoded: | True |
Data ASCII: | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . 9 1 9 7 4 B . . . . a . . . . . . . . = . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . . . . . Z T 0 9 . . . . . . . X . @ . . . . . . . . . . " . . . . . . . . . . . |
Data Raw: | 09 08 10 00 00 06 05 00 ab 1f cd 07 c9 80 01 00 06 04 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 05 00 00 39 31 39 37 34 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 |
Download Network PCAP: filtered – full
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-25T07:30:37.171113+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49718 | 162.19.137.157 | 443 | TCP |
2025-03-25T07:30:38.254723+0100 | 1810005 | Joe Security ANOMALY Microsoft Office WebDAV Discovery | 1 | 192.168.2.4 | 49719 | 162.19.137.157 | 443 | TCP |
2025-03-25T07:30:38.726735+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49720 | 162.19.137.157 | 443 | TCP |
2025-03-25T07:30:39.469261+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49723 | 162.19.137.157 | 443 | TCP |
- Total Packets: 59
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 25, 2025 07:30:36.801523924 CET | 49718 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:36.801570892 CET | 443 | 49718 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:36.801698923 CET | 49718 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:36.802357912 CET | 49718 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:36.802372932 CET | 443 | 49718 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:37.171044111 CET | 443 | 49718 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:37.171113014 CET | 49718 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:37.174312115 CET | 49718 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:37.174324036 CET | 443 | 49718 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:37.174565077 CET | 443 | 49718 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:37.176317930 CET | 49718 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:37.220376015 CET | 443 | 49718 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:37.521262884 CET | 443 | 49718 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:37.521338940 CET | 443 | 49718 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:37.521511078 CET | 49718 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:37.524086952 CET | 49718 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:37.524147034 CET | 443 | 49718 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:37.540579081 CET | 49719 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:37.540626049 CET | 443 | 49719 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:37.540712118 CET | 49719 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:37.541263103 CET | 49719 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:37.541275024 CET | 443 | 49719 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:37.899051905 CET | 443 | 49719 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:37.899209976 CET | 49719 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:37.909440994 CET | 49719 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:37.909492970 CET | 443 | 49719 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:37.909823895 CET | 443 | 49719 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:37.909888029 CET | 49719 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:37.911003113 CET | 49719 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:37.956324100 CET | 443 | 49719 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:38.254750013 CET | 443 | 49719 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:38.254821062 CET | 443 | 49719 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:38.254914045 CET | 49719 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:38.270998955 CET | 49719 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:38.270999908 CET | 49719 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:38.271055937 CET | 443 | 49719 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:38.274424076 CET | 49719 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:38.363456011 CET | 49720 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:38.363583088 CET | 443 | 49720 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:38.363815069 CET | 49720 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:38.364021063 CET | 49720 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:38.364058018 CET | 443 | 49720 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:38.726196051 CET | 443 | 49720 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:38.726735115 CET | 49720 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:38.726793051 CET | 443 | 49720 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:38.727637053 CET | 49720 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:38.727650881 CET | 443 | 49720 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:39.099966049 CET | 443 | 49720 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:39.100038052 CET | 443 | 49720 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:39.100178003 CET | 49720 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:39.100266933 CET | 443 | 49720 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:39.100320101 CET | 49720 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:39.100320101 CET | 49720 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:39.100346088 CET | 443 | 49720 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:39.100366116 CET | 443 | 49720 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:39.101895094 CET | 49723 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:39.101932049 CET | 443 | 49723 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:39.102315903 CET | 49723 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:39.102686882 CET | 49723 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:39.102699041 CET | 443 | 49723 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:39.468676090 CET | 443 | 49723 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:39.469260931 CET | 49723 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:39.469270945 CET | 443 | 49723 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:39.477427959 CET | 49723 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:39.477435112 CET | 443 | 49723 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:39.829046965 CET | 443 | 49723 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:39.829118013 CET | 443 | 49723 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:39.829188108 CET | 49723 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:39.831332922 CET | 49723 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:39.831332922 CET | 49723 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:39.831352949 CET | 443 | 49723 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:39.831362009 CET | 443 | 49723 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:39.883915901 CET | 49727 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:39.883963108 CET | 443 | 49727 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:39.884027958 CET | 49727 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:39.885628939 CET | 49727 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:39.885654926 CET | 443 | 49727 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:40.244275093 CET | 443 | 49727 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:40.244374037 CET | 49727 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:40.244901896 CET | 49727 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:40.244919062 CET | 443 | 49727 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:40.246750116 CET | 49727 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:40.246772051 CET | 443 | 49727 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:40.622283936 CET | 443 | 49727 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:40.622337103 CET | 49727 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:40.622358084 CET | 443 | 49727 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:40.622380972 CET | 443 | 49727 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:40.622419119 CET | 49727 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:40.622419119 CET | 49727 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:40.635885954 CET | 49727 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:40.635910988 CET | 443 | 49727 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:40.637770891 CET | 49728 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:40.637804985 CET | 443 | 49728 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:40.637969017 CET | 49728 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:40.661346912 CET | 49728 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:40.661367893 CET | 443 | 49728 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:41.024202108 CET | 443 | 49728 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:41.024315119 CET | 49728 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:41.024707079 CET | 49728 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:41.024713993 CET | 443 | 49728 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:41.025064945 CET | 49728 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:41.025068998 CET | 443 | 49728 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:41.381094933 CET | 443 | 49728 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:41.381155968 CET | 443 | 49728 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:41.381174088 CET | 49728 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:41.381210089 CET | 443 | 49728 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:41.381225109 CET | 49728 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:41.381258965 CET | 49728 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:41.381267071 CET | 443 | 49728 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:41.381311893 CET | 443 | 49728 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:41.381367922 CET | 49728 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:41.382579088 CET | 49728 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:41.382594109 CET | 443 | 49728 | 162.19.137.157 | 192.168.2.4 |
Mar 25, 2025 07:30:41.382602930 CET | 49728 | 443 | 192.168.2.4 | 162.19.137.157 |
Mar 25, 2025 07:30:41.383328915 CET | 49728 | 443 | 192.168.2.4 | 162.19.137.157 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 25, 2025 07:30:36.655877113 CET | 60033 | 53 | 192.168.2.4 | 1.1.1.1 |
Mar 25, 2025 07:30:36.800323963 CET | 53 | 60033 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Mar 25, 2025 07:30:36.655877113 CET | 192.168.2.4 | 1.1.1.1 | 0x3450 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Mar 25, 2025 07:30:31.891232014 CET | 1.1.1.1 | 192.168.2.4 | 0x5b25 | No error (0) | s-0005.dual-s-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Mar 25, 2025 07:30:31.891232014 CET | 1.1.1.1 | 192.168.2.4 | 0x5b25 | No error (0) | 52.123.128.14 | A (IP address) | IN (0x0001) | false | ||
Mar 25, 2025 07:30:31.891232014 CET | 1.1.1.1 | 192.168.2.4 | 0x5b25 | No error (0) | 52.123.129.14 | A (IP address) | IN (0x0001) | false | ||
Mar 25, 2025 07:30:36.800323963 CET | 1.1.1.1 | 192.168.2.4 | 0x3450 | No error (0) | host1.emobility.energy | CNAME (Canonical name) | IN (0x0001) | false | ||
Mar 25, 2025 07:30:36.800323963 CET | 1.1.1.1 | 192.168.2.4 | 0x3450 | No error (0) | 162.19.137.157 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49718 | 162.19.137.157 | 443 | 7848 | C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-25 06:30:37 UTC | 331 | OUT | |
2025-03-25 06:30:37 UTC | 550 | IN | |
2025-03-25 06:30:37 UTC | 8 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49719 | 162.19.137.157 | 443 | 7848 | C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-25 06:30:37 UTC | 234 | OUT | |
2025-03-25 06:30:38 UTC | 550 | IN | |
2025-03-25 06:30:38 UTC | 8 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49720 | 162.19.137.157 | 443 | 7848 | C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-25 06:30:38 UTC | 331 | OUT | |
2025-03-25 06:30:39 UTC | 539 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49723 | 162.19.137.157 | 443 | 7848 | C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-25 06:30:39 UTC | 313 | OUT | |
2025-03-25 06:30:39 UTC | 590 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49727 | 162.19.137.157 | 443 | 7848 | C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-25 06:30:40 UTC | 196 | OUT | |
2025-03-25 06:30:40 UTC | 539 | IN | |
2025-03-25 06:30:40 UTC | 38 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49728 | 162.19.137.157 | 443 | 7848 | C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-25 06:30:41 UTC | 178 | OUT | |
2025-03-25 06:30:41 UTC | 590 | IN | |
2025-03-25 06:30:41 UTC | 4645 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 02:30:26 |
Start date: | 25/03/2025 |
Path: | C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x780000 |
File size: | 1'620'872 bytes |
MD5 hash: | 1A0C2C2E7D9C4BC18E91604E9B0C7678 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |