Edit tour

Windows Analysis Report
BL 248436935 CNTR MRKU9180226.docx.doc

Overview

General Information

Sample name:BL 248436935 CNTR MRKU9180226.docx.doc
Analysis ID:1647704
MD5:d4409205b193e0790bb72cd954812833
SHA1:a96d542ec49c29e5c71a620ee61343075e53b96c
SHA256:8ffa58fc07d41fd5d0b67467cfe731ca8d05de3a075ed9f7e22fcd31b3339d61
Tags:docdocxuser-abuse_ch
Infos:

Detection

Score:60
Range:0 - 100
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Contains an external reference to another file
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Sigma detected: Suspicious Office Outbound Connections
Uses a known web browser user agent for HTTP communication

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w11x64_office
  • WINWORD.EXE (PID: 7576 cmdline: "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding MD5: A9F0EC89897AC6C878D217DFB64CA752)
  • appidpolicyconverter.exe (PID: 7988 cmdline: "C:\Windows\system32\appidpolicyconverter.exe" MD5: 6567D9CF2545FAAC60974D9D682700D4)
    • conhost.exe (PID: 8008 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 9698384842DA735D80D278A427A229AB)
  • cleanup
No configs have been found
No yara matches
Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.25, DestinationIsIpv6: false, DestinationPort: 49685, EventID: 3, Image: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE, Initiated: true, ProcessId: 7576, Protocol: tcp, SourceIp: 162.19.137.157, SourceIsIpv6: false, SourcePort: 443
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-03-25T07:35:50.459324+010018100041Potentially Bad Traffic192.168.2.2549691162.19.137.157443TCP
2025-03-25T07:35:51.189252+010018100041Potentially Bad Traffic192.168.2.2549693162.19.137.157443TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-03-25T07:35:48.078503+010018100051Potentially Bad Traffic192.168.2.2549686162.19.137.157443TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: BL 248436935 CNTR MRKU9180226.docx.docVirustotal: Detection: 16%Perma Link
Source: BL 248436935 CNTR MRKU9180226.docx.docReversingLabs: Detection: 19%
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEFile opened: C:\Program Files\Microsoft Office\root\vfs\System\MSVCR100.dllJump to behavior
Source: unknownHTTPS traffic detected: 162.19.137.157:443 -> 192.168.2.25:49685 version: TLS 1.2
Source: global trafficDNS query: name: t.emobility.energy
Source: global trafficTCP traffic: 192.168.2.25:49691 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49693 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49685 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49685 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49685 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49685 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49685 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49685 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49685 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49685 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49686 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49686 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49686 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49686 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49686 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49686 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49686 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49686 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49686 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49686 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49686 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49686 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49686 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49686 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49686 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49686 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49688 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49688 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49688 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49688 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49688 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49688 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49688 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49688 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49689 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49689 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49689 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49689 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49689 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49689 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49689 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49689 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49691 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49691 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49691 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49691 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49691 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49691 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49691 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49691 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49691 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49691 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49691 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49691 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49693 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49693 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49693 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49693 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49693 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49693 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49693 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49693 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49693 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49693 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49693 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49693 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49693 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49693 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49693 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49693 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49685 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49685
Source: global trafficTCP traffic: 192.168.2.25:49685 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49685 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49685
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49685
Source: global trafficTCP traffic: 192.168.2.25:49685 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49685 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49685
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49685
Source: global trafficTCP traffic: 192.168.2.25:49685 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49685
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49685
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49685
Source: global trafficTCP traffic: 192.168.2.25:49685 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49685 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49685
Source: global trafficTCP traffic: 192.168.2.25:49686 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49686
Source: global trafficTCP traffic: 192.168.2.25:49686 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49686 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49686
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49686
Source: global trafficTCP traffic: 192.168.2.25:49686 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49686 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49686
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49686
Source: global trafficTCP traffic: 192.168.2.25:49686 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49686 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49686
Source: global trafficTCP traffic: 192.168.2.25:49686 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49686
Source: global trafficTCP traffic: 192.168.2.25:49686 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49686 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49686
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49686
Source: global trafficTCP traffic: 192.168.2.25:49686 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49686
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49686
Source: global trafficTCP traffic: 192.168.2.25:49686 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49686 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49686 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49686
Source: global trafficTCP traffic: 192.168.2.25:49686 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49686 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49688 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49688
Source: global trafficTCP traffic: 192.168.2.25:49688 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49688 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49688
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49688
Source: global trafficTCP traffic: 192.168.2.25:49688 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49688
Source: global trafficTCP traffic: 192.168.2.25:49688 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49688
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49688
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49688
Source: global trafficTCP traffic: 192.168.2.25:49688 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49688 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49688
Source: global trafficTCP traffic: 192.168.2.25:49688 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49688
Source: global trafficTCP traffic: 192.168.2.25:49689 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49689
Source: global trafficTCP traffic: 192.168.2.25:49689 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49689 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49689
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49689
Source: global trafficTCP traffic: 192.168.2.25:49689 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49689
Source: global trafficTCP traffic: 192.168.2.25:49689 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49689
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49689
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49689
Source: global trafficTCP traffic: 192.168.2.25:49689 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49689 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49689
Source: global trafficTCP traffic: 192.168.2.25:49689 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49689
Source: global trafficTCP traffic: 192.168.2.25:49691 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49691
Source: global trafficTCP traffic: 192.168.2.25:49691 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49691 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49691
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49691
Source: global trafficTCP traffic: 192.168.2.25:49691 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49691 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49691
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49691
Source: global trafficTCP traffic: 192.168.2.25:49691 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49691 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49691
Source: global trafficTCP traffic: 192.168.2.25:49691 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49691 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49691
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49691
Source: global trafficTCP traffic: 192.168.2.25:49691 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49691
Source: global trafficTCP traffic: 192.168.2.25:49691 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49691 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49691
Source: global trafficTCP traffic: 192.168.2.25:49693 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49693
Source: global trafficTCP traffic: 192.168.2.25:49693 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49693 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49693
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49693
Source: global trafficTCP traffic: 192.168.2.25:49693 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49693 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49693
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49693
Source: global trafficTCP traffic: 192.168.2.25:49693 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49693 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49693
Source: global trafficTCP traffic: 192.168.2.25:49693 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49693 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49693
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49693
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49693
Source: global trafficTCP traffic: 192.168.2.25:49693 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49693
Source: global trafficTCP traffic: 192.168.2.25:49693 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49693
Source: global trafficTCP traffic: 192.168.2.25:49693 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49693 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49693 -> 162.19.137.157:443
Source: global trafficTCP traffic: 162.19.137.157:443 -> 192.168.2.25:49693
Source: global trafficTCP traffic: 192.168.2.25:49693 -> 162.19.137.157:443
Source: global trafficTCP traffic: 192.168.2.25:49693 -> 162.19.137.157:443
Source: winword.exeMemory has grown: Private usage: 1MB later: 79MB

Networking

barindex
Source: Network trafficSuricata IDS: 1810005 - Severity 1 - Joe Security ANOMALY Microsoft Office WebDAV Discovery : 192.168.2.25:49686 -> 162.19.137.157:443
Source: Network trafficSuricata IDS: 1810004 - Severity 1 - Joe Security ANOMALY Microsoft Office HTTP activity : 192.168.2.25:49691 -> 162.19.137.157:443
Source: Network trafficSuricata IDS: 1810004 - Severity 1 - Joe Security ANOMALY Microsoft Office HTTP activity : 192.168.2.25:49693 -> 162.19.137.157:443
Source: Joe Sandbox ViewIP Address: 162.19.137.157 162.19.137.157
Source: Joe Sandbox ViewJA3 fingerprint: 258a5a1e95b8a911872bae9081526644
Source: global trafficHTTP traffic detected: GET /NHVI4G?&squid=roasted HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; ms-office; MSOffice 16)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: t.emobility.energyConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /404 HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; ms-office; MSOffice 16)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: t.emobility.energyConnection: Keep-Alive
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /NHVI4G?&squid=roasted HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; ms-office; MSOffice 16)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: t.emobility.energyConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /404 HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; ms-office; MSOffice 16)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: t.emobility.energyConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: t.emobility.energy
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 25 Mar 2025 06:35:49 GMTServer: Apache/2.4.62 (Debian)X-DNS-Prefetch-Control: offX-Frame-Options: SAMEORIGINStrict-Transport-Security: max-age=15552000; includeSubDomainsX-Download-Options: noopenX-Content-Type-Options: nosniffX-XSS-Protection: 1; mode=blockX-Powered-By: Next.jsETag: "1225-4lR+8o8+z0M1Iq6OMuNgxAtPjT8"Content-Type: text/html; charset=utf-8Content-Length: 4645Vary: Accept-EncodingAccess-Control-Allow-Origin: *Access-Control-Allow-Headers: Origin, X-Requested-With, Content-Type, AcceptConnection: close
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 25 Mar 2025 06:35:51 GMTServer: Apache/2.4.62 (Debian)X-DNS-Prefetch-Control: offX-Frame-Options: SAMEORIGINStrict-Transport-Security: max-age=15552000; includeSubDomainsX-Download-Options: noopenX-Content-Type-Options: nosniffX-XSS-Protection: 1; mode=blockX-Powered-By: Next.jsETag: "1225-4lR+8o8+z0M1Iq6OMuNgxAtPjT8"Content-Type: text/html; charset=utf-8Content-Length: 4645Vary: Accept-EncodingAccess-Control-Allow-Origin: *Access-Control-Allow-Headers: Origin, X-Requested-With, Content-Type, AcceptConnection: close
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49689
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49688
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49686
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49685
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49693
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49691
Source: unknownNetwork traffic detected: HTTP traffic on port 49693 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49691 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49686 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49685 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49689 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49688 -> 443
Source: unknownHTTPS traffic detected: 162.19.137.157:443 -> 192.168.2.25:49685 version: TLS 1.2
Source: classification engineClassification label: mal60.evad.winDOC@4/1@1/1
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEFile created: C:\Users\user\Desktop\~$ 248436935 CNTR MRKU9180226.docx.docJump to behavior
Source: C:\Windows\System32\appidpolicyconverter.exeMutant created: PolicyMutex
Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:8008:120:WilError_03
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\{FC4BAAFD-A77D-40C9-8DE3-92942976735B} - OProcSessId.datJump to behavior
Source: BL 248436935 CNTR MRKU9180226.docx.docOLE indicator, Word Document stream: true
Source: BL 248436935 CNTR MRKU9180226.docx.docOLE document summary: title field not present or empty
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\appidpolicyconverter.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: BL 248436935 CNTR MRKU9180226.docx.docVirustotal: Detection: 16%
Source: BL 248436935 CNTR MRKU9180226.docx.docReversingLabs: Detection: 19%
Source: unknownProcess created: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding
Source: unknownProcess created: C:\Windows\System32\appidpolicyconverter.exe "C:\Windows\system32\appidpolicyconverter.exe"
Source: C:\Windows\System32\appidpolicyconverter.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\appidpolicyconverter.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\appidpolicyconverter.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\appidpolicyconverter.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\appidpolicyconverter.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Windows\System32\appidpolicyconverter.exeSection loaded: gpapi.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: BL 248436935 CNTR MRKU9180226.docx.docInitial sample: OLE zip file path = word/_rels/footer2.xml.rels
Source: BL 248436935 CNTR MRKU9180226.docx.docInitial sample: OLE zip file path = word/media/image2.emf
Source: BL 248436935 CNTR MRKU9180226.docx.docInitial sample: OLE zip file path = word/_rels/settings.xml.rels
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\CommonJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEFile opened: C:\Program Files\Microsoft Office\root\vfs\System\MSVCR100.dllJump to behavior
Source: BL 248436935 CNTR MRKU9180226.docx.docInitial sample: OLE summary lastprinted = 2020-10-16 02:53:17
Source: BL 248436935 CNTR MRKU9180226.docx.docInitial sample: OLE indicators vbamacros = False

Persistence and Installation Behavior

barindex
Source: settings.xml.relsExtracted files from sample: https://t.emobility.energy/nhvi4g?&squid=roasted
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information queried: ProcessInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
Windows Management Instrumentation
1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts3
Exploitation for Client Execution
Boot or Logon Initialization Scripts1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media3
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Extra Window Memory Injection
1
Process Injection
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput Capture14
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Extra Window Memory Injection
LSA Secrets3
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1647704 Sample: BL 248436935 CNTR MRKU91802... Startdate: 25/03/2025 Architecture: WINDOWS Score: 60 14 t.emobility.energy 2->14 16 res-stls-prod.edgesuite.net.globalredir.akadns88.net 2->16 18 3 other IPs or domains 2->18 22 Suricata IDS alerts for network traffic 2->22 24 Multi AV Scanner detection for submitted file 2->24 26 Contains an external reference to another file 2->26 7 WINWORD.EXE 504 114 2->7         started        10 appidpolicyconverter.exe 1 2->10         started        signatures3 process4 dnsIp5 20 host1.emobility.energy 162.19.137.157, 443, 49685, 49686 CENTURYLINK-US-LEGACY-QWESTUS United States 7->20 12 conhost.exe 10->12         started        process6

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
BL 248436935 CNTR MRKU9180226.docx.doc16%VirustotalBrowse
BL 248436935 CNTR MRKU9180226.docx.doc19%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://t.emobility.energy/NHVI4G?&squid=roasted0%Avira URL Cloudsafe
https://t.emobility.energy/4040%Avira URL Cloudsafe

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.214.172
truefalse
    high
    host1.emobility.energy
    162.19.137.157
    truefalse
      high
      a726.dscd.akamai.net
      23.219.36.135
      truefalse
        high
        s-0005.dual-s-msedge.net
        52.123.129.14
        truefalse
          high
          t.emobility.energy
          unknown
          unknownfalse
            high
            NameMaliciousAntivirus DetectionReputation
            https://t.emobility.energy/NHVI4G?&squid=roastedtrue
            • Avira URL Cloud: safe
            unknown
            https://t.emobility.energy/404true
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            162.19.137.157
            host1.emobility.energyUnited States
            209CENTURYLINK-US-LEGACY-QWESTUSfalse
            Joe Sandbox version:42.0.0 Malachite
            Analysis ID:1647704
            Start date and time:2025-03-25 07:34:35 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 4m 44s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:defaultwindowsofficecookbook.jbs
            Analysis system description:Windows 11 23H2 with Office Professional Plus 2021, Chrome 131, Firefox 133, Adobe Reader DC 24, Java 8 Update 431, 7zip 24.09
            Run name:Potential for more IOCs and behavior
            Number of analysed new started processes analysed:26
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:BL 248436935 CNTR MRKU9180226.docx.doc
            Detection:MAL
            Classification:mal60.evad.winDOC@4/1@1/1
            EGA Information:Failed
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Found application associated with file extension: .doc
            • Found Word or Excel or PowerPoint or XPS Viewer
            • Attach to Office via COM
            • Scroll down
            • Close Viewer
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, SecurityHealthHost.exe, dllhost.exe, sppsvc.exe, WMIADAP.exe, SIHClient.exe, appidcertstorecheck.exe, conhost.exe, svchost.exe
            • Excluded IPs from analysis (whitelisted): 52.109.8.89, 52.109.16.52, 20.42.65.85, 52.109.16.112, 199.232.214.172, 52.111.251.19, 52.111.251.17, 52.111.251.18, 52.111.251.16, 23.33.42.76, 23.33.42.72, 23.219.82.136, 23.219.82.208, 52.123.129.14, 23.204.23.20, 20.190.163.20, 23.219.36.135, 4.245.163.56
            • Excluded domains from analysis (whitelisted): us1.odcsm1.live.com.akadns.net, odc.officeapps.live.com, slscr.update.microsoft.com, templatesmetadata.office.net.edgekey.net, cus-config.officeapps.live.com, res-1.cdn.office.net, osiprod-ncus-buff-azsc-000.northcentralus.cloudapp.azure.com, mobile.events.data.microsoft.com, ncus-azsc-000.roaming.officeapps.live.com, prod-canc-resolver.naturallanguageeditorservice.osi.office.net.akadns.net, roaming.officeapps.live.com, dual-s-0005-office.config.skype.com, login.live.com, ncus-000.odc.officeapps.live.com, officeclient.microsoft.com, templatesmetadata.office.net, osiprod-ncus-bronze-public-000.northcentralus.cloudapp.azure.com, c.pki.goog, wu-b-net.trafficmanager.net, ecs.office.com, fs.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, prod.configsvc1.live.com.akadns.net, onedscolprdeus05.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, prod-na.naturallanguageeditorservice.osi.office.net.akadns.net, prod.roaming1.live.com.akadns.net, res-stls-prod.e
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtQueryAttributesFile calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            • Report size getting too big, too many NtReadVirtualMemory calls found.
            • Report size getting too big, too many NtSetValueKey calls found.
            No simulations
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            162.19.137.157PURCHASE ORDER 5172025.xla.xlsxGet hashmaliciousUnknownBrowse
              SecuriteInfo.com.Other.Malware-gen.24773.2907.xlsxGet hashmaliciousUnknownBrowse
                SecuriteInfo.com.Other.Malware-gen.24773.2907.xlsxGet hashmaliciousUnknownBrowse
                  SecuriteInfo.com.Other.Malware-gen.24773.2907.xlsxGet hashmaliciousUnknownBrowse
                    CMR ReF 15200477813.docx.docGet hashmaliciousUnknownBrowse
                      CMR ReF 15200477813.docx.docGet hashmaliciousUnknownBrowse
                        PRE#U00c7O - RFQ 674441-76450.xla.xlsxGet hashmaliciousUnknownBrowse
                          PRE#U00c7O - RFQ 674441-76450.xla.xlsxGet hashmaliciousUnknownBrowse
                            PRE#U00c7O - RFQ 674441-76450.xla.xlsxGet hashmaliciousUnknownBrowse
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              a726.dscd.akamai.netSecuriteInfo.com.Other.Malware-gen.24773.2907.xlsxGet hashmaliciousUnknownBrowse
                              • 23.219.36.135
                              original (2).emlGet hashmaliciousUnknownBrowse
                              • 23.200.0.200
                              memebers.docGet hashmaliciousUnknownBrowse
                              • 23.40.179.68
                              CMR ReF 15200477813.docx.docGet hashmaliciousUnknownBrowse
                              • 23.40.179.57
                              memebers.docGet hashmaliciousUnknownBrowse
                              • 23.200.0.32
                              https://postureshift-my.sharepoint.com/:f:/p/securedocument/EtRlfSUr3KtLjXgAbIYheZQBZ7nG7Jc2JIN2pqruKYsodA?e=SjlcA6Get hashmaliciousUnknownBrowse
                              • 23.219.161.144
                              PRE#U00c7O - RFQ 674441-76450.xla.xlsxGet hashmaliciousUnknownBrowse
                              • 23.40.179.191
                              1208_37832604.docGet hashmaliciousUnknownBrowse
                              • 23.40.179.46
                              Medical GmbH Order.xlsGet hashmaliciousUnknownBrowse
                              • 23.44.136.147
                              sample.docGet hashmaliciousUnknownBrowse
                              • 23.44.136.150
                              s-0005.dual-s-msedge.netOrdersheet_NanshaGA-012.docxGet hashmaliciousUnknownBrowse
                              • 52.123.129.14
                              PURCHASE ORDER 5172025.xla.xlsxGet hashmaliciousUnknownBrowse
                              • 52.123.129.14
                              SecuriteInfo.com.Other.Malware-gen.24773.2907.xlsxGet hashmaliciousUnknownBrowse
                              • 52.123.128.14
                              Invoice#1427743190.emlGet hashmaliciousUnknownBrowse
                              • 52.123.129.14
                              SecuriteInfo.com.Other.Malware-gen.24773.2907.xlsxGet hashmaliciousUnknownBrowse
                              • 52.123.128.14
                              SecuriteInfo.com.Other.Malware-gen.24773.2907.xlsxGet hashmaliciousUnknownBrowse
                              • 52.123.128.14
                              Sbafla response to shift in trend.msgGet hashmaliciousUnknownBrowse
                              • 52.123.129.14
                              original (2).emlGet hashmaliciousUnknownBrowse
                              • 52.123.129.14
                              702cb6e..emlGet hashmaliciousHTMLPhisherBrowse
                              • 52.123.128.14
                              host1.emobility.energyPURCHASE ORDER 5172025.xla.xlsxGet hashmaliciousUnknownBrowse
                              • 162.19.137.157
                              SecuriteInfo.com.Other.Malware-gen.24773.2907.xlsxGet hashmaliciousUnknownBrowse
                              • 162.19.137.157
                              SecuriteInfo.com.Other.Malware-gen.24773.2907.xlsxGet hashmaliciousUnknownBrowse
                              • 162.19.137.157
                              SecuriteInfo.com.Other.Malware-gen.24773.2907.xlsxGet hashmaliciousUnknownBrowse
                              • 162.19.137.157
                              CMR ReF 15200477813.docx.docGet hashmaliciousUnknownBrowse
                              • 162.19.137.157
                              CMR ReF 15200477813.docx.docGet hashmaliciousUnknownBrowse
                              • 162.19.137.157
                              PRE#U00c7O - RFQ 674441-76450.xla.xlsxGet hashmaliciousUnknownBrowse
                              • 162.19.137.157
                              PRE#U00c7O - RFQ 674441-76450.xla.xlsxGet hashmaliciousUnknownBrowse
                              • 162.19.137.157
                              PRE#U00c7O - RFQ 674441-76450.xla.xlsxGet hashmaliciousUnknownBrowse
                              • 162.19.137.157
                              bg.microsoft.map.fastly.netPURCHASE ORDER 5172025.xla.xlsxGet hashmaliciousUnknownBrowse
                              • 199.232.214.172
                              0064_QB_Payment_Statemnt87T.svgGet hashmaliciousHTMLPhisher, Invisible JS, Tycoon2FABrowse
                              • 199.232.210.172
                              Ipsen USA RFP.pdfGet hashmaliciousUnknownBrowse
                              • 199.232.214.172
                              general.ps1Get hashmaliciousKdot StealerBrowse
                              • 199.232.214.172
                              Final-Payment-Doc#243414512.pdfGet hashmaliciousUnknownBrowse
                              • 199.232.210.172
                              2xHGY40ElK.exeGet hashmaliciousIris StealerBrowse
                              • 199.232.214.172
                              JpPY0mRA9f.exeGet hashmaliciousVidarBrowse
                              • 199.232.210.172
                              jn8DY8kfrM.msiGet hashmaliciousUnknownBrowse
                              • 199.232.214.172
                              MM-7925-0224_110_AD.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                              • 199.232.214.172
                              1208_37832604.docGet hashmaliciousUnknownBrowse
                              • 199.232.214.172
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              CENTURYLINK-US-LEGACY-QWESTUSPURCHASE ORDER 5172025.xla.xlsxGet hashmaliciousUnknownBrowse
                              • 162.19.137.157
                              SecuriteInfo.com.Other.Malware-gen.24773.2907.xlsxGet hashmaliciousUnknownBrowse
                              • 162.19.137.157
                              SecuriteInfo.com.Other.Malware-gen.24773.2907.xlsxGet hashmaliciousUnknownBrowse
                              • 162.19.137.157
                              SecuriteInfo.com.Other.Malware-gen.24773.2907.xlsxGet hashmaliciousUnknownBrowse
                              • 162.19.137.157
                              https://tinyurl.com/SA-RecyclingGet hashmaliciousUnknownBrowse
                              • 162.19.138.82
                              CMR ReF 15200477813.docx.docGet hashmaliciousUnknownBrowse
                              • 162.19.137.157
                              CMR ReF 15200477813.docx.docGet hashmaliciousUnknownBrowse
                              • 162.19.137.157
                              https://tinyurl.com/2x5dks36__;!!KtM2tloZCg!t4Gwb4Io82PLGf5Ziyn1ynf2MK2R8tVwoHlt6AQrinUFsCCwJRl23VZd9oJ2PaWibwt0lcEQuPw3Iyz8vMIkjw$Get hashmaliciousUnknownBrowse
                              • 162.19.138.116
                              PRE#U00c7O - RFQ 674441-76450.xla.xlsxGet hashmaliciousUnknownBrowse
                              • 162.19.137.157
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              258a5a1e95b8a911872bae9081526644SecuriteInfo.com.Other.Malware-gen.24773.2907.xlsxGet hashmaliciousUnknownBrowse
                              • 162.19.137.157
                              CMR ReF 15200477813.docx.docGet hashmaliciousUnknownBrowse
                              • 162.19.137.157
                              PRE#U00c7O - RFQ 674441-76450.xla.xlsxGet hashmaliciousUnknownBrowse
                              • 162.19.137.157
                              PURCHASE ORDER - PO#267759.xlam.xlsxGet hashmaliciousUnknownBrowse
                              • 162.19.137.157
                              Medical GmbH Order.xlsGet hashmaliciousUnknownBrowse
                              • 162.19.137.157
                              Quotation.xlsGet hashmaliciousUnknownBrowse
                              • 162.19.137.157
                              ENQUIRY - RFQ 674441-76450.xla.xlsxGet hashmaliciousUnknownBrowse
                              • 162.19.137.157
                              Payment Advice 24-03-2025.docx.docGet hashmaliciousUnknownBrowse
                              • 162.19.137.157
                              solicitud de cotizaci#U00f3n.xlam.xlsxGet hashmaliciousUnknownBrowse
                              • 162.19.137.157
                              VAT3_Return_P051671333W.xlsGet hashmaliciousUnknownBrowse
                              • 162.19.137.157
                              No context
                              Process:C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):162
                              Entropy (8bit):2.929483584625789
                              Encrypted:false
                              SSDEEP:3:M//PlyFXlZovGvefGd/lBbpO8/l9llDx1n:s/PK1Zo+15bpOcrlV
                              MD5:F3672E2135FC9264F15B524DF9F60478
                              SHA1:AA8FA4AA3611AC528A70F3E607DE74403445B725
                              SHA-256:0250D3A7E382149558B7B11172000279DF8DD9988302AFC6D2E8ED240CCB1612
                              SHA-512:99DCCF826F86BF7EB1E6F8D780A23A3F7ACAB91D0AC048A39DCB12738AB77D11FE8DA72B346B9FF73CC95D66D28507DDACA1CDD6325800D9828F136C01E5FE57
                              Malicious:false
                              Reputation:low
                              Preview:.user..................................................M.e.r.c.y........Y.....;R......;R....................................... P......,......4#P...........6..'
                              File type:Microsoft Word 2007+
                              Entropy (8bit):7.963690696843289
                              TrID:
                              • Word Microsoft Office Open XML Format document (49504/1) 58.23%
                              • Word Microsoft Office Open XML Format document (27504/1) 32.35%
                              • ZIP compressed archive (8000/1) 9.41%
                              File name:BL 248436935 CNTR MRKU9180226.docx.doc
                              File size:56'034 bytes
                              MD5:d4409205b193e0790bb72cd954812833
                              SHA1:a96d542ec49c29e5c71a620ee61343075e53b96c
                              SHA256:8ffa58fc07d41fd5d0b67467cfe731ca8d05de3a075ed9f7e22fcd31b3339d61
                              SHA512:60f5877e972415fee24b76e172412e3b7b416b667673459f0278bc4d15c1363474ed87e21b7e635648828db52f107c427f8b0dd7ed8a901686e92ac1bdee9e98
                              SSDEEP:768:mYqOqCBG0LSEbG2FVChvBQ78itcNjXxIqSSooFul1Yt9Nxk/EW7hwTP9VAnCA9EQ:mn7CfVChJucpXxpY1ubyZS38xuQ4NxQ
                              TLSH:B643F1799861481AE6CC43F9D1453A0EF631E7271EA330339F901F2DADF7AC9061266D
                              File Content Preview:PK.........UxZ+..0............[Content_Types].xmlUT....7.g.7.g.7.g.V.j.@.}/.....i..J)....c.h.....%.7v&......SL".../.bu.3s4hu.;[<A...Z,..(..`:.....o.GQ )o...j.......V...X0.c-Z..IJ.-8.U......)....Q..j..z.. u...J..b....Rg..S..+.:.9$#.......N...\.....vZ...O..
                              Icon Hash:35e1cc889a8a8599
                              Document Type:OpenXML
                              Number of OLE Files:1
                              Has Summary Info:
                              Application Name:
                              Encrypted Document:False
                              Contains Word Document Stream:True
                              Contains Workbook/Book Stream:False
                              Contains PowerPoint Document Stream:False
                              Contains Visio Document Stream:False
                              Contains ObjectPool Stream:False
                              Flash Objects Count:0
                              Contains VBA Macros:False
                              Code Page:-535
                              Title:
                              Subject:
                              Author:91974
                              Keywords:
                              Template:Normal.dotm
                              Last Saved By:91974
                              Revion Number:2
                              Total Edit Time:1
                              Last Printed:2020-10-16 02:53:17
                              Create Time:2025-03-21T06:52:00Z
                              Last Saved Time:2025-03-21T06:53:00Z
                              Number of Pages:1
                              Number of Words:0
                              Number of Characters:0
                              Thumbnail:'H.&" WMFC @l! EMF@"8X?F, EMF+@xxF\PEMF+"@@$@0@?!@@!"!"!"!"!"!'%&%(6(%Ld(((!??%6)%Ld((!??%M6)M%LdM(MM(!??%g6)g%Ldg(gg(!??%}6)}%Ld}(}}(!??%6)%Ld((!??%6)%Ld((!??%6)%Ld((!??%(6%Ld((!??%(6(%Ld(((!??%6%Ld!??%6%Ld!??'%Ld''!??%%6(%Ld''!??%6%Ld!??'%(&%6(%Ld'&!??%6%Ld!??'%(&%6(%Ld'&!??%'6'%Ld'''!??!bK!;$$==V(8X8h(h$$AA<C%'%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%(%""Rp[SOu#a#/#lu|0#aQlu%hhy`Qy/%hy%hy/y%hT yy{/yuyO/yyI/ y<I/-&Wa#/yu9y y%huy%hdv%'A>TT4GUUA&A4LP1TTReUUA&ARLP2TThzUUA&AgLh(}P3TTUUA&ALP4TTUUA&ALP5TTUUA&ALP6TTUUA&ALPATT^gUUA&A^LPB%%"!%'A>)Rp0wiSO_GB2312ua#/lu|0aQlu&hXy`Qpy/&h y&hy/ y&hD!yy{/ yuyO/ yx yI/ yl>I/-&W"a#/yu9 yy&huy&hdv%Rp Verdanayupy-&lu&&" WMFC @aQlu'hXy`Qpy/'h y'hy/ y'hD!yy{/ yuyO/ yx yI/ ydcaI/-&Wa#/yu9 yy'huy'hdv%RpTimes New Romanyupy-&lu+aQlu(hXy`Qpy/(h y(hy/ y(hD!yy{/ yuyO/ yx yI/ ycaI/-&Wa#/yu9 yy(huy(hdv%T,i{UUA&A,itL4 TEL: 0086-512-82558856 FAX: 0086-512-58268319Rp[SOyupya#/D!yluunaQlu)hXy`Qpy/)h y)hy/ y)hD!yy{/ yuyO/ yx yI/ yTeaI/-&Wa#/yu9 yy)huy)hdv%RpTimes New RomanyupyD!ylu)aQlugXy`Qpy/g ygy/ ygD!yy{/ yuyO/ yx yI/ ypI/-&Wa#/yu9 yyguygdv%%%%%%%%"!%)MT-#JUUA&A-#Ld_ln~v[8fgPlQS))))))))))))%%"!%)NgTReUUA&ARLxJIANGSU SOIPOI CO.,LTD%"!%)TLUUA&A,LL%%%%%%%%"!%)%%%%%%%%TTUUA&ALP'%Ld!??%%TTUUA&ALP %Ld!??%%TTUUA&ALP'%Ld!??%%TTUUA&ALP %Ld!??%%TTUUA&ALPUS%Ld!??%%TUUA&ALp / DELIVERY ORDER%Ld!??%%%%"!%)%"!%'%(&%6%Ld!??%6%Ld!??%~6%Ld~~!??%~6%Ld~~!??%(6(%Ld(((!??%6%Ld!??%6%Ld!??%(6%Ld((!??%(M6M%Ld(MM(M!??%(g6g%Ld(gg(g!??%(}6}%Ld(}}(}!??%(6%Ld((!??%(6%Ld((!??%(6%Ld((!??%%"!%))%"!%'%(&%6%Ld!??%6%Ld!??%("Q|P(x( F4(EMF+*@$??FEMF+@ &6WMFC@''',',',--((-@!(-)-@!(-MM)-@!(M-gg)-@!(g-}})-@!(}-)-@!(-)-@!(-)-@!(-(-@!(-((-@!(--@!--@!-@!'--(-@!'--@!--(-@!&--@!--(-@!&-''-@!',$#"! ---$$$----$$$----$$$----$$$----$$$----$$$----$$$----$$$----$$$----$$$----$$$----$$$----$$$----$$$----$$$----$$$----$$$----$$$---''??-'A>2412R22gh(}32425262A2^B-"System-'-'A>,)0??_GB2312- Verdana-Times New Roman-2i,t TEL: 0086-512-82558856 FAX: 0086-512-58268319??-Times New Roman--------'-,M)+2#-))))))))))))--'-,gN)(2RJIANGSU SOIPOI CO.,LTD-'-,)2,--------'-,)--------2-@!--2 -@!--2-@!--2 -@!--2-@!--!2 / DELIVERY ORDER-@!----'-,)-'-,---@!--@!-~-@!~-~-@!~-((-@!(--@!--@!-(-@!(-M(M-@!M(-g(g-@!g(-}(}-@!}(-(-@!(-(-@!(-(-@!(--'-,),)-'-,---@!--@!-'#A(
                              Creating Application:Microsoft Office Word
                              Security:0
                              Document Code Page:1252
                              Presentation Target Format:
                              Number of Lines:1
                              Number of Paragraphs:1
                              Number of Slides:0
                              Number of Pages with Notes:0
                              Number of Hidden Slides:0
                              Number of Sound/Video Clips:0
                              Thumbnail Scaling Desired:false
                              Company:Grizli777
                              Contains Dirty Links:false
                              Shared Document:false
                              Changed Hyperlinks:false
                              Application Version:12.0000
                              General
                              Stream Path:\x1CompObj
                              CLSID:
                              File Type:data
                              Stream Size:114
                              Entropy:4.25248375192737
                              Base64 Encoded:True
                              Data ASCII:. . . . . . . . . . . . . . . . . . . F & . . . M i c r o s o f t O f f i c e E x c e l 2 0 0 3 W o r k s h e e t . . . . . B i f f 8 . . . . . E x c e l . S h e e t . 8 . 9 q . . . . . . . . . . . .
                              Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 26 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 32 30 30 33 20 57 6f 72 6b 73 68 65 65 74 00 06 00 00 00 42 69 66 66 38 00 0e 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                              General
                              Stream Path:\x1Ole
                              CLSID:
                              File Type:data
                              Stream Size:20
                              Entropy:0.5689955935892812
                              Base64 Encoded:False
                              Data ASCII:. . . . . . . . . . . . . . . . . . . .
                              Data Raw:01 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                              General
                              Stream Path:\x3EPRINT
                              CLSID:
                              File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                              Stream Size:36988
                              Entropy:3.2497681809626355
                              Base64 Encoded:False
                              Data ASCII:. . . . l . . . . . . . . . . . . . . . . . . . . . . . . . J [ . . ( W . . E M F . . . . | . . k . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . \\ K . . h C . . F . . . , . . . . . . E M F + . @ . . . . . . . . . . . . . . . . X . . . X . . . F . . . \\ . . . P . . . E M F + " @ . . . . . . . . . . . @ . . . . . . . . . . $ @ . . . . . . . . . . 0 @ . . . . . . . . . . . . ? ! @ . . . . . . . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                              Data Raw:01 00 00 00 6c 00 00 00 00 00 00 00 20 00 00 00 0a 14 00 00 f1 13 00 00 00 00 00 00 00 00 00 00 4a 5b 00 00 28 57 00 00 20 45 4d 46 00 00 01 00 7c 90 00 00 6b 04 00 00 0e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ec 13 00 00 c8 19 00 00 d8 00 00 00 17 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5c 4b 03 00 68 43 04 00 46 00 00 00 2c 00 00 00 20 00 00 00 45 4d 46 2b 01 40 01 00
                              General
                              Stream Path:\x3ObjInfo
                              CLSID:
                              File Type:data
                              Stream Size:6
                              Entropy:1.2516291673878228
                              Base64 Encoded:False
                              Data ASCII:. . . . . .
                              Data Raw:00 00 03 00 0d 00
                              General
                              Stream Path:\x5DocumentSummaryInformation
                              CLSID:
                              File Type:data
                              Stream Size:560
                              Entropy:3.3879366798911743
                              Base64 Encoded:True
                              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , D . . . . . . . . . . + , . . . H . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . % . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                              Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 44 00 00 00 05 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 8c 01 00 00 48 01 00 00 10 00 00 00 01 00 00 00 88 00 00 00 03 00 00 00 90 00 00 00 05 00 00 00 9c 00 00 00 06 00 00 00 a4 00 00 00 07 00 00 00 ac 00 00 00 08 00 00 00 b4 00 00 00 09 00 00 00
                              General
                              Stream Path:\x5SummaryInformation
                              CLSID:
                              File Type:data
                              Stream Size:24184
                              Entropy:3.1945226555165376
                              Base64 Encoded:True
                              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . + ' 0 . . . H ^ . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 1 9 7 4 . . . . . . . . . . . 1 . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . . . g . @ . . . . . . Q < . . @ . . .
                              Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 48 5e 00 00 0e 00 00 00 01 00 00 00 78 00 00 00 04 00 00 00 80 00 00 00 07 00 00 00 94 00 00 00 08 00 00 00 a0 00 00 00 09 00 00 00 b0 00 00 00 12 00 00 00 bc 00 00 00 0b 00 00 00 d4 00 00 00 0c 00 00 00 e0 00 00 00 0d 00 00 00 ec 00 00 00
                              General
                              Stream Path:Workbook
                              CLSID:
                              File Type:Applesoft BASIC program data, first line number 16
                              Stream Size:17006
                              Entropy:4.28640454300865
                              Base64 Encoded:True
                              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . 9 1 9 7 4 B . . . . a . . . . . . . . = . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . . . . . Z T 0 9 . . . . . . . X . @ . . . . . . . . . . " . . . . . . . . . . .
                              Data Raw:09 08 10 00 00 06 05 00 ab 1f cd 07 c9 80 01 00 06 04 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 05 00 00 39 31 39 37 34 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20

                              Download Network PCAP: filteredfull

                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                              2025-03-25T07:35:48.078503+01001810005Joe Security ANOMALY Microsoft Office WebDAV Discovery1192.168.2.2549686162.19.137.157443TCP
                              2025-03-25T07:35:50.459324+01001810004Joe Security ANOMALY Microsoft Office HTTP activity1192.168.2.2549691162.19.137.157443TCP
                              2025-03-25T07:35:51.189252+01001810004Joe Security ANOMALY Microsoft Office HTTP activity1192.168.2.2549693162.19.137.157443TCP
                              • Total Packets: 69
                              • 443 (HTTPS)
                              • 53 (DNS)
                              TimestampSource PortDest PortSource IPDest IP
                              Mar 25, 2025 07:35:46.529123068 CET49685443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:46.529169083 CET44349685162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:46.529588938 CET49685443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:46.530267954 CET49685443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:46.530288935 CET44349685162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:46.891419888 CET44349685162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:46.891499996 CET49685443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:46.915294886 CET49685443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:46.915323973 CET44349685162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:46.915702105 CET44349685162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:46.916508913 CET49685443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:46.964322090 CET44349685162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:47.240477085 CET44349685162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:47.240550995 CET44349685162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:47.240639925 CET49685443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:47.326409101 CET49685443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:47.326431990 CET44349685162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:47.368043900 CET49686443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:47.368076086 CET44349686162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:47.368164062 CET49686443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:47.370333910 CET49686443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:47.370347977 CET44349686162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:47.725646019 CET44349686162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:47.725708008 CET49686443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:47.727088928 CET49686443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:47.727096081 CET44349686162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:47.728169918 CET44349686162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:47.728239059 CET49686443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:47.729568005 CET49686443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:47.729641914 CET44349686162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:47.729784966 CET49686443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:47.729793072 CET44349686162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:47.729830980 CET49686443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:47.733886957 CET49686443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:47.780332088 CET44349686162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:48.078521013 CET44349686162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:48.078600883 CET49686443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:48.078610897 CET44349686162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:48.078633070 CET44349686162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:48.078650951 CET49686443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:48.078672886 CET49686443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:48.081890106 CET49686443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:48.081898928 CET44349686162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:48.081908941 CET49686443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:48.081942081 CET49686443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:48.099859953 CET49688443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:48.099912882 CET44349688162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:48.100003004 CET49688443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:48.100258112 CET49688443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:48.100276947 CET44349688162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:48.455914974 CET44349688162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:48.456770897 CET49688443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:48.456789017 CET44349688162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:48.457319021 CET49688443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:48.457325935 CET44349688162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:48.826482058 CET44349688162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:48.826549053 CET44349688162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:48.826745987 CET49688443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:48.827780008 CET49688443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:48.827811956 CET44349688162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:48.827836037 CET49688443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:48.827846050 CET44349688162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:48.830703020 CET49689443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:48.830759048 CET44349689162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:48.831104040 CET49689443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:48.831381083 CET49689443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:48.831398010 CET44349689162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:49.194883108 CET44349689162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:49.196647882 CET49689443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:49.196676016 CET44349689162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:49.197468996 CET49689443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:49.197485924 CET44349689162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:49.556247950 CET44349689162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:49.556324005 CET44349689162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:49.556468964 CET49689443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:49.556744099 CET49689443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:49.556759119 CET44349689162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:49.556771994 CET49689443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:49.556777954 CET44349689162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:49.728569031 CET49691443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:49.728629112 CET44349691162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:49.728734970 CET49691443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:49.730504990 CET49691443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:49.730524063 CET44349691162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:50.088992119 CET44349691162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:50.089065075 CET49691443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:50.091209888 CET49691443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:50.091227055 CET44349691162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:50.091634035 CET44349691162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:50.091680050 CET49691443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:50.092709064 CET49691443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:50.092791080 CET44349691162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:50.092848063 CET49691443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:50.093112946 CET49691443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:50.136326075 CET44349691162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:50.459352970 CET44349691162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:50.459422112 CET49691443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:50.459431887 CET44349691162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:50.459479094 CET49691443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:50.465423107 CET49691443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:50.465451002 CET44349691162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:50.467130899 CET49693443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:50.467178106 CET44349693162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:50.467238903 CET49693443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:50.468374014 CET49693443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:50.468385935 CET44349693162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:50.826597929 CET44349693162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:50.826663971 CET49693443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:50.828385115 CET49693443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:50.828396082 CET44349693162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:50.828815937 CET44349693162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:50.828866005 CET49693443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:50.830131054 CET49693443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:50.830210924 CET44349693162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:50.830250978 CET49693443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:50.830902100 CET49693443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:50.872334003 CET44349693162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:51.189284086 CET44349693162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:51.189311028 CET44349693162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:51.189349890 CET49693443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:51.189380884 CET44349693162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:51.189394951 CET49693443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:51.189399958 CET44349693162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:51.189419985 CET49693443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:51.189451933 CET49693443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:51.190725088 CET49693443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:51.190737963 CET44349693162.19.137.157192.168.2.25
                              Mar 25, 2025 07:35:51.190754890 CET49693443192.168.2.25162.19.137.157
                              Mar 25, 2025 07:35:51.190779924 CET49693443192.168.2.25162.19.137.157
                              TimestampSource PortDest PortSource IPDest IP
                              Mar 25, 2025 07:35:46.401302099 CET5665053192.168.2.251.1.1.1
                              Mar 25, 2025 07:35:46.528258085 CET53566501.1.1.1192.168.2.25
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Mar 25, 2025 07:35:46.401302099 CET192.168.2.251.1.1.10x418fStandard query (0)t.emobility.energyA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Mar 25, 2025 07:35:45.979171991 CET1.1.1.1192.168.2.250x74c0No error (0)ecs-office.s-0005.dual-s-msedge.nets-0005.dual-s-msedge.netCNAME (Canonical name)IN (0x0001)false
                              Mar 25, 2025 07:35:45.979171991 CET1.1.1.1192.168.2.250x74c0No error (0)s-0005.dual-s-msedge.net52.123.129.14A (IP address)IN (0x0001)false
                              Mar 25, 2025 07:35:45.979171991 CET1.1.1.1192.168.2.250x74c0No error (0)s-0005.dual-s-msedge.net52.123.128.14A (IP address)IN (0x0001)false
                              Mar 25, 2025 07:35:46.528258085 CET1.1.1.1192.168.2.250x418fNo error (0)t.emobility.energyhost1.emobility.energyCNAME (Canonical name)IN (0x0001)false
                              Mar 25, 2025 07:35:46.528258085 CET1.1.1.1192.168.2.250x418fNo error (0)host1.emobility.energy162.19.137.157A (IP address)IN (0x0001)false
                              Mar 25, 2025 07:35:51.240360975 CET1.1.1.1192.168.2.250x68fcNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                              Mar 25, 2025 07:35:51.240360975 CET1.1.1.1192.168.2.250x68fcNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                              Mar 25, 2025 07:35:52.859875917 CET1.1.1.1192.168.2.250x6bc8No error (0)res-stls-prod.edgesuite.net.globalredir.akadns88.neta726.dscd.akamai.netCNAME (Canonical name)IN (0x0001)false
                              Mar 25, 2025 07:35:52.859875917 CET1.1.1.1192.168.2.250x6bc8No error (0)a726.dscd.akamai.net23.219.36.135A (IP address)IN (0x0001)false
                              Mar 25, 2025 07:35:52.859875917 CET1.1.1.1192.168.2.250x6bc8No error (0)a726.dscd.akamai.net23.219.36.134A (IP address)IN (0x0001)false
                              Mar 25, 2025 07:36:52.754081011 CET1.1.1.1192.168.2.250x65c0No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                              Mar 25, 2025 07:36:52.754081011 CET1.1.1.1192.168.2.250x65c0No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                              • t.emobility.energy
                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              0192.168.2.2549685162.19.137.1574437576C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
                              TimestampBytes transferredDirectionData
                              2025-03-25 06:35:46 UTC331OUTOPTIONS / HTTP/1.1
                              Connection: Keep-Alive
                              Authorization: Bearer
                              User-Agent: Microsoft Office Word 2014
                              X-Office-Major-Version: 16
                              X-MS-CookieUri-Requested: t
                              X-FeatureVersion: 1
                              Accept-Auth: badger,Wlid1.1,Bearer,Basic,NTLM,Digest,Kerberos,Negotiate,Nego2
                              X-MSGETWEBURL: t
                              X-IDCRL_ACCEPTED: t
                              Host: t.emobility.energy
                              2025-03-25 06:35:47 UTC550INHTTP/1.1 200 OK
                              Date: Tue, 25 Mar 2025 06:35:47 GMT
                              Server: Apache/2.4.62 (Debian)
                              X-DNS-Prefetch-Control: off
                              X-Frame-Options: SAMEORIGIN
                              Strict-Transport-Security: max-age=15552000; includeSubDomains
                              X-Download-Options: noopen
                              X-Content-Type-Options: nosniff
                              X-XSS-Protection: 1; mode=block
                              Allow: GET,HEAD
                              Content-Type: text/html; charset=utf-8
                              Content-Length: 8
                              ETag: W/"8-ZRAf8oNBS3Bjb/SU2GYZCmbtmXg"
                              Access-Control-Allow-Origin: *
                              Access-Control-Allow-Headers: Origin, X-Requested-With, Content-Type, Accept
                              Connection: close
                              2025-03-25 06:35:47 UTC8INData Raw: 47 45 54 2c 48 45 41 44
                              Data Ascii: GET,HEAD


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              1192.168.2.2549686162.19.137.1574437576C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
                              TimestampBytes transferredDirectionData
                              2025-03-25 06:35:47 UTC234OUTOPTIONS / HTTP/1.1
                              Authorization: Bearer
                              X-MS-CookieUri-Requested: t
                              X-FeatureVersion: 1
                              X-IDCRL_ACCEPTED: t
                              User-Agent: Microsoft Office Protocol Discovery
                              Host: t.emobility.energy
                              Content-Length: 0
                              Connection: Keep-Alive
                              2025-03-25 06:35:48 UTC550INHTTP/1.1 200 OK
                              Date: Tue, 25 Mar 2025 06:35:47 GMT
                              Server: Apache/2.4.62 (Debian)
                              X-DNS-Prefetch-Control: off
                              X-Frame-Options: SAMEORIGIN
                              Strict-Transport-Security: max-age=15552000; includeSubDomains
                              X-Download-Options: noopen
                              X-Content-Type-Options: nosniff
                              X-XSS-Protection: 1; mode=block
                              Allow: GET,HEAD
                              Content-Type: text/html; charset=utf-8
                              Content-Length: 8
                              ETag: W/"8-ZRAf8oNBS3Bjb/SU2GYZCmbtmXg"
                              Access-Control-Allow-Origin: *
                              Access-Control-Allow-Headers: Origin, X-Requested-With, Content-Type, Accept
                              Connection: close
                              2025-03-25 06:35:48 UTC8INData Raw: 47 45 54 2c 48 45 41 44
                              Data Ascii: GET,HEAD


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              2192.168.2.2549688162.19.137.1574437576C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
                              TimestampBytes transferredDirectionData
                              2025-03-25 06:35:48 UTC331OUTHEAD /NHVI4G?&squid=roasted HTTP/1.1
                              Connection: Keep-Alive
                              Authorization: Bearer
                              User-Agent: Microsoft Office Word 2014
                              X-Office-Major-Version: 16
                              X-MS-CookieUri-Requested: t
                              X-FeatureVersion: 1
                              Accept-Auth: badger,Wlid1.1,Bearer,Basic,NTLM,Digest,Kerberos,Negotiate,Nego2
                              X-IDCRL_ACCEPTED: t
                              Host: t.emobility.energy
                              2025-03-25 06:35:48 UTC539INHTTP/1.1 301 Moved Permanently
                              Date: Tue, 25 Mar 2025 06:35:48 GMT
                              Server: Apache/2.4.62 (Debian)
                              X-DNS-Prefetch-Control: off
                              X-Frame-Options: SAMEORIGIN
                              Strict-Transport-Security: max-age=15552000; includeSubDomains
                              X-Download-Options: noopen
                              X-Content-Type-Options: nosniff
                              X-XSS-Protection: 1; mode=block
                              Location: /404
                              Vary: Accept
                              Content-Type: text/plain; charset=utf-8
                              Content-Length: 38
                              Access-Control-Allow-Origin: *
                              Access-Control-Allow-Headers: Origin, X-Requested-With, Content-Type, Accept
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              3192.168.2.2549689162.19.137.1574437576C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
                              TimestampBytes transferredDirectionData
                              2025-03-25 06:35:49 UTC313OUTHEAD /404 HTTP/1.1
                              Connection: Keep-Alive
                              Authorization: Bearer
                              User-Agent: Microsoft Office Word 2014
                              X-Office-Major-Version: 16
                              X-MS-CookieUri-Requested: t
                              X-FeatureVersion: 1
                              Accept-Auth: badger,Wlid1.1,Bearer,Basic,NTLM,Digest,Kerberos,Negotiate,Nego2
                              X-IDCRL_ACCEPTED: t
                              Host: t.emobility.energy
                              2025-03-25 06:35:49 UTC590INHTTP/1.1 404 Not Found
                              Date: Tue, 25 Mar 2025 06:35:49 GMT
                              Server: Apache/2.4.62 (Debian)
                              X-DNS-Prefetch-Control: off
                              X-Frame-Options: SAMEORIGIN
                              Strict-Transport-Security: max-age=15552000; includeSubDomains
                              X-Download-Options: noopen
                              X-Content-Type-Options: nosniff
                              X-XSS-Protection: 1; mode=block
                              X-Powered-By: Next.js
                              ETag: "1225-4lR+8o8+z0M1Iq6OMuNgxAtPjT8"
                              Content-Type: text/html; charset=utf-8
                              Content-Length: 4645
                              Vary: Accept-Encoding
                              Access-Control-Allow-Origin: *
                              Access-Control-Allow-Headers: Origin, X-Requested-With, Content-Type, Accept
                              Connection: close


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              4192.168.2.2549691162.19.137.1574437576C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
                              TimestampBytes transferredDirectionData
                              2025-03-25 06:35:50 UTC211OUTGET /NHVI4G?&squid=roasted HTTP/1.1
                              Accept: */*
                              User-Agent: Mozilla/4.0 (compatible; ms-office; MSOffice 16)
                              UA-CPU: AMD64
                              Accept-Encoding: gzip, deflate
                              Host: t.emobility.energy
                              Connection: Keep-Alive
                              2025-03-25 06:35:50 UTC539INHTTP/1.1 301 Moved Permanently
                              Date: Tue, 25 Mar 2025 06:35:50 GMT
                              Server: Apache/2.4.62 (Debian)
                              X-DNS-Prefetch-Control: off
                              X-Frame-Options: SAMEORIGIN
                              Strict-Transport-Security: max-age=15552000; includeSubDomains
                              X-Download-Options: noopen
                              X-Content-Type-Options: nosniff
                              X-XSS-Protection: 1; mode=block
                              Location: /404
                              Vary: Accept
                              Content-Type: text/plain; charset=utf-8
                              Content-Length: 38
                              Access-Control-Allow-Origin: *
                              Access-Control-Allow-Headers: Origin, X-Requested-With, Content-Type, Accept
                              Connection: close
                              2025-03-25 06:35:50 UTC38INData Raw: 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 2e 20 52 65 64 69 72 65 63 74 69 6e 67 20 74 6f 20 2f 34 30 34
                              Data Ascii: Moved Permanently. Redirecting to /404


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              5192.168.2.2549693162.19.137.1574437576C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
                              TimestampBytes transferredDirectionData
                              2025-03-25 06:35:50 UTC193OUTGET /404 HTTP/1.1
                              Accept: */*
                              User-Agent: Mozilla/4.0 (compatible; ms-office; MSOffice 16)
                              UA-CPU: AMD64
                              Accept-Encoding: gzip, deflate
                              Host: t.emobility.energy
                              Connection: Keep-Alive
                              2025-03-25 06:35:51 UTC590INHTTP/1.1 404 Not Found
                              Date: Tue, 25 Mar 2025 06:35:51 GMT
                              Server: Apache/2.4.62 (Debian)
                              X-DNS-Prefetch-Control: off
                              X-Frame-Options: SAMEORIGIN
                              Strict-Transport-Security: max-age=15552000; includeSubDomains
                              X-Download-Options: noopen
                              X-Content-Type-Options: nosniff
                              X-XSS-Protection: 1; mode=block
                              X-Powered-By: Next.js
                              ETag: "1225-4lR+8o8+z0M1Iq6OMuNgxAtPjT8"
                              Content-Type: text/html; charset=utf-8
                              Content-Length: 4645
                              Vary: Accept-Encoding
                              Access-Control-Allow-Origin: *
                              Access-Control-Allow-Headers: Origin, X-Requested-With, Content-Type, Accept
                              Connection: close
                              2025-03-25 06:35:51 UTC4645INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 53 65 74 3d 22 75 74 66 2d 38 22 2f 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 76 69 65 77 70 6f 72 74 2d 66 69 74 3d 63 6f 76 65 72 22 2f 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 75 6e 64 65 66 69 6e 65 64 20 69 73 20 61 20 66 72 65 65 20 61 6e 64 20 6f 70 65 6e 20 73 6f 75 72 63 65 20 55 52 4c 20 73 68 6f 72 74 65 6e 65 72 20 77 69 74 68 20 63 75 73 74 6f 6d 20 64 6f 6d 61 69 6e 73 20 61 6e
                              Data Ascii: <!DOCTYPE html><html lang="en"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1, viewport-fit=cover"/><meta name="description" content="undefined is a free and open source URL shortener with custom domains an


                              Click to jump to process

                              050100s0.0050100150200MB

                              Click to jump to process

                              • File
                              • Registry

                              Click to dive into process behavior distribution

                              Target ID:0
                              Start time:02:35:41
                              Start date:25/03/2025
                              Path:C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
                              Wow64 process (32bit):false
                              Commandline:"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding
                              Imagebase:0x7ff689250000
                              File size:1'637'952 bytes
                              MD5 hash:A9F0EC89897AC6C878D217DFB64CA752
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate
                              Has exited:false
                              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                              Target ID:4
                              Start time:02:35:48
                              Start date:25/03/2025
                              Path:C:\Windows\System32\appidpolicyconverter.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Windows\system32\appidpolicyconverter.exe"
                              Imagebase:0x7ff742450000
                              File size:155'648 bytes
                              MD5 hash:6567D9CF2545FAAC60974D9D682700D4
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate
                              Has exited:true

                              Target ID:5
                              Start time:02:35:48
                              Start date:25/03/2025
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff729690000
                              File size:1'040'384 bytes
                              MD5 hash:9698384842DA735D80D278A427A229AB
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate
                              Has exited:true

                              No disassembly