Windows
Analysis Report
Payment Advice 24-03-2025.docx
Overview
General Information
Detection
Score: | 68 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
WINWORD.EXE (PID: 4836 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \Root\Offi ce16\WINWO RD.EXE" /A utomation -Embedding MD5: 1A0C2C2E7D9C4BC18E91604E9B0C7678)
- cleanup
Source: | Author: X__Junior (Nextron Systems): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-26T03:29:45.705197+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49721 | 162.19.137.157 | 443 | TCP |
2025-03-26T03:29:47.172706+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49723 | 162.19.137.157 | 443 | TCP |
2025-03-26T03:29:47.947558+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49725 | 162.19.137.157 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-26T03:29:46.796737+0100 | 1810005 | 1 | Potentially Bad Traffic | 192.168.2.5 | 49722 | 162.19.137.157 | 443 | TCP |
- • AV Detection
- • Compliance
- • Software Vulnerabilities
- • Networking
- • System Summary
- • Persistence and Installation Behavior
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | File opened: | Jump to behavior |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | DNS query: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | Memory has grown: |
Networking |
---|
Source: | Suricata IDS: |
Source: | IP Address: |
Source: | JA3 fingerprint: | ||
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | OLE indicator, Word Document stream: |
Source: | OLE document summary: |
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Window detected: |
Source: | Initial sample: | ||
Source: | Initial sample: | ||
Source: | Initial sample: |
Source: | Key opened: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Initial sample: |
Source: | Initial sample: |
Persistence and Installation Behavior |
---|
Source: | Extracted files from sample: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | WMI Queries: |
Source: | Process information queried: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 11 Windows Management Instrumentation | Path Interception | 1 Process Injection | 1 Masquerading | OS Credential Dumping | 1 Security Software Discovery | Remote Services | Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 3 Exploitation for Client Execution | Boot or Logon Initialization Scripts | 1 Extra Window Memory Injection | 1 Virtualization/Sandbox Evasion | LSASS Memory | 1 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | 3 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Process Injection | Security Account Manager | 1 Process Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Extra Window Memory Injection | NTDS | 1 File and Directory Discovery | Distributed Component Object Model | Input Capture | 14 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | 2 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
25% | Virustotal | Browse | ||
24% | ReversingLabs | Document-Word.Trojan.Heuristic | ||
100% | Avira | W2000/AVI.Agent.wsqfh |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
host1.emobility.energy | 162.19.137.157 | true | false | high | |
s-0005.dual-s-msedge.net | 52.123.128.14 | true | false | high | |
t.emobility.energy | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
162.19.137.157 | host1.emobility.energy | United States | 209 | CENTURYLINK-US-LEGACY-QWESTUS | false |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1648649 |
Start date and time: | 2025-03-26 03:28:49 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 27s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsofficecookbook.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 18 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Payment Advice 24-03-2025.docx |
Detection: | MAL |
Classification: | mal68.evad.winDOCX@2/1@1/1 |
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, B ackgroundTransferHost.exe, WMI ADAP.exe, SIHClient.exe, SgrmB roker.exe, backgroundTaskHost. exe, conhost.exe, WmiPrvSE.exe , svchost.exe - Excluded IPs from analysis (wh
itelisted): 23.204.23.20, 52.1 09.8.89, 52.109.6.63, 51.132.1 93.105, 52.111.251.16, 52.111. 251.18, 52.111.251.17, 52.111. 251.19, 23.33.42.76, 23.33.42. 72, 52.123.128.14, 40.126.16.1 67, 20.109.210.53, 20.223.35.2 6, 150.171.28.10, 23.219.82.82 - Excluded domains from analysis
(whitelisted): slscr.update.m icrosoft.com, templatesmetadat a.office.net.edgekey.net, cus- config.officeapps.live.com, g. bing.com, fs-wildcard.microsof t.com.edgekey.net, fs-wildcard .microsoft.com.edgekey.net.glo balredir.akadns.net, e16604.ds cf.akamaiedge.net, eus2-azsc-0 00.roaming.officeapps.live.com , arc.msn.com, osiprod-eus2-bu ff-azsc-000.eastus2.cloudapp.a zure.com, prod-canc-resolver.n aturallanguageeditorservice.os i.office.net.akadns.net, roami ng.officeapps.live.com, dual-s -0005-office.config.skype.com, login.live.com, officeclient. microsoft.com, templatesmetada ta.office.net, prod.fs.microso ft.com.akadns.net, www.bing.co m, ecs.office.com, self-events -data.trafficmanager.net, fs.m icrosoft.com, prod.configsvc1. live.com.akadns.net, self.even ts.data.microsoft.com, ctldl.w indowsupdate.com, prod-na.natu rallanguageeditorservice.osi.o ffice.net.akadns.net, prod.roa ming1.live.com.akadns.net, fe3 cr.delivery.mp.microsoft.com, us1.roaming1.live.com.akadns.n et, prod1.naturallanguageedito rser - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtQueryAttributesFile calls found. - Report size getting too big, t
oo many NtQueryValueKey calls found. - Report size getting too big, t
oo many NtReadVirtualMemory ca lls found.
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
162.19.137.157 | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
s-0005.dual-s-msedge.net | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher, Invisible JS, Tycoon2FA | Browse |
| ||
Get hash | malicious | HTMLPhisher, Invisible JS, Tycoon2FA | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
host1.emobility.energy | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CENTURYLINK-US-LEGACY-QWESTUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Okiru | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | CryptOne, LummaC Stealer, Socks5Systemz | Browse |
| ||
Get hash | malicious | GO Backdoor, LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
37f463bf4616ecd445d4a1937da06e19 | Get hash | malicious | GuLoader | Browse |
| |
Get hash | malicious | GuLoader, Remcos | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | GuLoader | Browse |
|
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 162 |
Entropy (8bit): | 4.825746591800279 |
Encrypted: | false |
SSDEEP: | 3:klt+lllOTh8f/kHyr6f+qIUrXt59dWkUTRnYtPdZM:7tOysY8IOqz2PdZM |
MD5: | B18EBB417274F8980FB3A6B4FD487FD1 |
SHA1: | E5282855DBDF313A748D52FF6308137B066102DD |
SHA-256: | 25C88F26E7A422F0D818E80B2ACC1E20D3B32C57D6549447AA4DB11A162D20FC |
SHA-512: | A2995412ACC7B072E0AB7D1A86F9480E629A77AA0FB7ADCCD5F3413F031C4200EE362DFA0D8248B03BF9427B9A466140A1FD8C2E3C9A20FD1221C18F4D6C952C |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.964593265655907 |
TrID: |
|
File name: | Payment Advice 24-03-2025.docx |
File size: | 56'034 bytes |
MD5: | e2de305918472693be1488c417b50d3e |
SHA1: | 9c5818c4acb4a4a37efe6b62b0af3b8194a02385 |
SHA256: | 35a44945e700a366481f14c0a15c8fd9b7cbb61389b8fba0a3d0f30b87ff01b2 |
SHA512: | ada9106d38934aacd23dabe392cf6f57015aaf931093e21274186c6137d3a8bce436d60e0d5904d3c1b19a5854d0646f4dce7ac059c60e83ce0dd2496ab5549a |
SSDEEP: | 768:cl3IMiBqMNwwbG2FVChvB+78itcNj9xIqSSooFkl1Yt9Nxk/EW7hwTP9VAnCA9Ef:ctni3VChJUcp9xpu1ubyZS38xueSTxqy |
TLSH: | F943E1F99D51880FF61883F6F645BA3FB620E72A129321136E111D2DCA9B5C54A02EFD |
File Content Preview: | PK.........PxZ+..0............[Content_Types].xmlUT...>-.g>-.g>-.g.V.j.@.}/.....i..J)....c.h.....%.7v&......SL".../.bu.3s4hu.;[<A...Z,..(..`:.....o.GQ )o...j.......V...X0.c-Z..IJ.-8.U......)....Q..j..z.. u...J..b....Rg..S..+.:.9$#.......N...\.....vZ...O.. |
Icon Hash: | 35e5c48caa8a8599 |
Document Type: | OpenXML |
Number of OLE Files: | 1 |
Has Summary Info: | |
Application Name: | |
Encrypted Document: | False |
Contains Word Document Stream: | True |
Contains Workbook/Book Stream: | False |
Contains PowerPoint Document Stream: | False |
Contains Visio Document Stream: | False |
Contains ObjectPool Stream: | False |
Flash Objects Count: | 0 |
Contains VBA Macros: | False |
Code Page: | -535 |
Title: | |
Subject: | |
Author: | 91974 |
Keywords: | |
Template: | |
Last Saved By: | 91974 |
Revion Number: | 2 |
Total Edit Time: | 1 |
Last Printed: | 2020-10-16 02:53:17 |
Create Time: | 2025-03-21T06:52:00Z |
Last Saved Time: | 2025-03-21T06:53:00Z |
Number of Pages: | 1 |
Number of Words: | 0 |
Number of Characters: | 0 |
Thumbnail: | 'H.&" WMFC @l! EMF@"8X?F, EMF+@xxF\PEMF+"@@$@0@?!@@!"!"!"!"!"!'%&%(6(%Ld(((!??%6)%Ld((!??%M6)M%LdM(MM(!??%g6)g%Ldg(gg(!??%}6)}%Ld}(}}(!??%6)%Ld((!??%6)%Ld((!??%6)%Ld((!??%(6%Ld((!??%(6(%Ld(((!??%6%Ld!??%6%Ld!??'%Ld''!??%%6(%Ld''!??%6%Ld!??'%(&%6(%Ld'&!??%6%Ld!??'%(&%6(%Ld'&!??%'6'%Ld'''!??!bK!;$$==V(8X8h(h$$AA<C%'%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%('%%V0#$$%%(%""Rp[SOu#a#/#lu|0#aQlu%hhy`Qy/%hy%hy/y%hT yy{/yuyO/yyI/ y<I/-&Wa#/yu9y y%huy%hdv%'A>TT4GUUA&A4LP1TTReUUA&ARLP2TThzUUA&AgLh(}P3TTUUA&ALP4TTUUA&ALP5TTUUA&ALP6TTUUA&ALPATT^gUUA&A^LPB%%"!%'A>)Rp0wiSO_GB2312ua#/lu|0aQlu&hXy`Qpy/&h y&hy/ y&hD!yy{/ yuyO/ yx yI/ yl>I/-&W"a#/yu9 yy&huy&hdv%Rp Verdanayupy-&lu&&" WMFC @aQlu'hXy`Qpy/'h y'hy/ y'hD!yy{/ yuyO/ yx yI/ ydcaI/-&Wa#/yu9 yy'huy'hdv%RpTimes New Romanyupy-&lu+aQlu(hXy`Qpy/(h y(hy/ y(hD!yy{/ yuyO/ yx yI/ ycaI/-&Wa#/yu9 yy(huy(hdv%T,i{UUA&A,itL4 TEL: 0086-512-82558856 FAX: 0086-512-58268319Rp[SOyupya#/D!yluunaQlu)hXy`Qpy/)h y)hy/ y)hD!yy{/ yuyO/ yx yI/ yTeaI/-&Wa#/yu9 yy)huy)hdv%RpTimes New RomanyupyD!ylu)aQlugXy`Qpy/g ygy/ ygD!yy{/ yuyO/ yx yI/ ypI/-&Wa#/yu9 yyguygdv%%%%%%%%"!%)MT-#JUUA&A-#Ld_ln~v[8fgPlQS))))))))))))%%"!%)NgTReUUA&ARLxJIANGSU SOIPOI CO.,LTD%"!%)TLUUA&A,LL%%%%%%%%"!%)%%%%%%%%TTUUA&ALP'%Ld!??%%TTUUA&ALP %Ld!??%%TTUUA&ALP'%Ld!??%%TTUUA&ALP %Ld!??%%TTUUA&ALPUS%Ld!??%%TUUA&ALp / DELIVERY ORDER%Ld!??%%%%"!%)%"!%'%(&%6%Ld!??%6%Ld!??%~6%Ld~~!??%~6%Ld~~!??%(6(%Ld(((!??%6%Ld!??%6%Ld!??%(6%Ld((!??%(M6M%Ld(MM(M!??%(g6g%Ld(gg(g!??%(}6}%Ld(}}(}!??%(6%Ld((!??%(6%Ld((!??%(6%Ld((!??%%"!%))%"!%'%(&%6%Ld!??%6%Ld!??%("Q|P(x( F4(EMF+*@$??FEMF+@ &6WMFC@''',',',--((-@!(-)-@!(-MM)-@!(M-gg)-@!(g-}})-@!(}-)-@!(-)-@!(-)-@!(-(-@!(-((-@!(--@!--@!-@!'--(-@!'--@!--(-@!&--@!--(-@!&-''-@!',$#"! ---$$$----$$$----$$$----$$$----$$$----$$$----$$$----$$$----$$$----$$$----$$$----$$$----$$$----$$$----$$$----$$$----$$$----$$$---''??-'A>2412R22gh(}32425262A2^B-"System-'-'A>,)0??_GB2312- Verdana-Times New Roman-2i,t TEL: 0086-512-82558856 FAX: 0086-512-58268319??-Times New Roman--------'-,M)+2#-))))))))))))--'-,gN)(2RJIANGSU SOIPOI CO.,LTD-'-,)2,--------'-,)--------2-@!--2 -@!--2-@!--2 -@!--2-@!--!2 / DELIVERY ORDER-@!----'-,)-'-,---@!--@!-~-@!~-~-@!~-((-@!(--@!--@!-(-@!(-M(M-@!M(-g(g-@!g(-}(}-@!}(-(-@!(-(-@!(-(-@!(--'-,),)-'-,---@!--@!-'#A( |
Creating Application: | |
Security: | 0 |
Document Code Page: | 1252 |
Presentation Target Format: | |
Number of Lines: | 1 |
Number of Paragraphs: | 1 |
Number of Slides: | 0 |
Number of Pages with Notes: | 0 |
Number of Hidden Slides: | 0 |
Number of Sound/Video Clips: | 0 |
Thumbnail Scaling Desired: | false |
Company: | |
Contains Dirty Links: | false |
Shared Document: | false |
Changed Hyperlinks: | false |
Application Version: | 12.0000 |
General | |
Stream Path: | \x1CompObj |
CLSID: | |
File Type: | data |
Stream Size: | 114 |
Entropy: | 4.25248375192737 |
Base64 Encoded: | True |
Data ASCII: | . . . . . . . . . . . . . . . . . . . F & . . . M i c r o s o f t O f f i c e E x c e l 2 0 0 3 W o r k s h e e t . . . . . B i f f 8 . . . . . E x c e l . S h e e t . 8 . 9 q . . . . . . . . . . . . |
Data Raw: | 01 00 fe ff 03 0a 00 00 ff ff ff ff 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 26 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 32 30 30 33 20 57 6f 72 6b 73 68 65 65 74 00 06 00 00 00 42 69 66 66 38 00 0e 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00 |
General | |
Stream Path: | \x1Ole |
CLSID: | |
File Type: | data |
Stream Size: | 20 |
Entropy: | 0.5689955935892812 |
Base64 Encoded: | False |
Data ASCII: | . . . . . . . . . . . . . . . . . . . . |
Data Raw: | 01 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |
General | |
Stream Path: | \x3EPRINT |
CLSID: | |
File Type: | Windows Enhanced Metafile (EMF) image data version 0x10000 |
Stream Size: | 36988 |
Entropy: | 3.2497681809626355 |
Base64 Encoded: | False |
Data ASCII: | . . . . l . . . . . . . . . . . . . . . . . . . . . . . . . J [ . . ( W . . E M F . . . . | . . k . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . \\ K . . h C . . F . . . , . . . . . . E M F + . @ . . . . . . . . . . . . . . . . X . . . X . . . F . . . \\ . . . P . . . E M F + " @ . . . . . . . . . . . @ . . . . . . . . . . $ @ . . . . . . . . . . 0 @ . . . . . . . . . . . . ? ! @ . . . . . . . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
Data Raw: | 01 00 00 00 6c 00 00 00 00 00 00 00 20 00 00 00 0a 14 00 00 f1 13 00 00 00 00 00 00 00 00 00 00 4a 5b 00 00 28 57 00 00 20 45 4d 46 00 00 01 00 7c 90 00 00 6b 04 00 00 0e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ec 13 00 00 c8 19 00 00 d8 00 00 00 17 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5c 4b 03 00 68 43 04 00 46 00 00 00 2c 00 00 00 20 00 00 00 45 4d 46 2b 01 40 01 00 |
General | |
Stream Path: | \x3ObjInfo |
CLSID: | |
File Type: | data |
Stream Size: | 6 |
Entropy: | 1.2516291673878228 |
Base64 Encoded: | False |
Data ASCII: | . . . . . . |
Data Raw: | 00 00 03 00 0d 00 |
General | |
Stream Path: | \x5DocumentSummaryInformation |
CLSID: | |
File Type: | data |
Stream Size: | 560 |
Entropy: | 3.3879366798911743 |
Base64 Encoded: | True |
Data ASCII: | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , D . . . . . . . . . . + , . . . H . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . % . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
Data Raw: | fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 44 00 00 00 05 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 8c 01 00 00 48 01 00 00 10 00 00 00 01 00 00 00 88 00 00 00 03 00 00 00 90 00 00 00 05 00 00 00 9c 00 00 00 06 00 00 00 a4 00 00 00 07 00 00 00 ac 00 00 00 08 00 00 00 b4 00 00 00 09 00 00 00 |
General | |
Stream Path: | \x5SummaryInformation |
CLSID: | |
File Type: | data |
Stream Size: | 24184 |
Entropy: | 3.1945226555165376 |
Base64 Encoded: | True |
Data ASCII: | . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . + ' 0 . . . H ^ . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 1 9 7 4 . . . . . . . . . . . 1 . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . . . g . @ . . . . . . Q < . . @ . . . |
Data Raw: | fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 48 5e 00 00 0e 00 00 00 01 00 00 00 78 00 00 00 04 00 00 00 80 00 00 00 07 00 00 00 94 00 00 00 08 00 00 00 a0 00 00 00 09 00 00 00 b0 00 00 00 12 00 00 00 bc 00 00 00 0b 00 00 00 d4 00 00 00 0c 00 00 00 e0 00 00 00 0d 00 00 00 ec 00 00 00 |
General | |
Stream Path: | Workbook |
CLSID: | |
File Type: | Applesoft BASIC program data, first line number 16 |
Stream Size: | 17006 |
Entropy: | 4.28640454300865 |
Base64 Encoded: | True |
Data ASCII: | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . 9 1 9 7 4 B . . . . a . . . . . . . . = . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . . . . . Z T 0 9 . . . . . . . X . @ . . . . . . . . . . " . . . . . . . . . . . |
Data Raw: | 09 08 10 00 00 06 05 00 ab 1f cd 07 c9 80 01 00 06 04 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 05 00 00 39 31 39 37 34 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 |
Download Network PCAP: filtered – full
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-26T03:29:45.705197+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49721 | 162.19.137.157 | 443 | TCP |
2025-03-26T03:29:46.796737+0100 | 1810005 | Joe Security ANOMALY Microsoft Office WebDAV Discovery | 1 | 192.168.2.5 | 49722 | 162.19.137.157 | 443 | TCP |
2025-03-26T03:29:47.172706+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49723 | 162.19.137.157 | 443 | TCP |
2025-03-26T03:29:47.947558+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49725 | 162.19.137.157 | 443 | TCP |
- Total Packets: 58
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 26, 2025 03:29:45.340953112 CET | 49721 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:45.340966940 CET | 443 | 49721 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:45.341145039 CET | 49721 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:45.341420889 CET | 49721 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:45.341434002 CET | 443 | 49721 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:45.705131054 CET | 443 | 49721 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:45.705197096 CET | 49721 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:45.706717968 CET | 49721 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:45.706721067 CET | 443 | 49721 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:45.707051992 CET | 443 | 49721 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:45.708132982 CET | 49721 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:45.748267889 CET | 443 | 49721 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:46.049868107 CET | 443 | 49721 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:46.049962997 CET | 443 | 49721 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:46.050005913 CET | 49721 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:46.050038099 CET | 49721 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:46.050057888 CET | 443 | 49721 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:46.050070047 CET | 49721 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:46.050075054 CET | 443 | 49721 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:46.071573019 CET | 49722 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:46.071592093 CET | 443 | 49722 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:46.071664095 CET | 49722 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:46.072381973 CET | 49722 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:46.072395086 CET | 443 | 49722 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:46.440114021 CET | 443 | 49722 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:46.440243006 CET | 49722 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:46.448460102 CET | 49722 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:46.448473930 CET | 443 | 49722 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:46.448798895 CET | 443 | 49722 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:46.448893070 CET | 49722 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:46.449234009 CET | 49722 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:46.492270947 CET | 443 | 49722 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:46.796658993 CET | 443 | 49722 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:46.796741009 CET | 443 | 49722 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:46.796886921 CET | 49722 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:46.797700882 CET | 49722 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:46.797713041 CET | 443 | 49722 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:46.797801971 CET | 49722 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:46.797801971 CET | 49722 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:46.812571049 CET | 49723 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:46.812616110 CET | 443 | 49723 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:46.812908888 CET | 49723 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:46.813066006 CET | 49723 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:46.813074112 CET | 443 | 49723 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:47.172126055 CET | 443 | 49723 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:47.172705889 CET | 49723 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:47.172746897 CET | 443 | 49723 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:47.174911022 CET | 49723 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:47.174921989 CET | 443 | 49723 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:47.544351101 CET | 443 | 49723 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:47.544451952 CET | 443 | 49723 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:47.544516087 CET | 49723 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:47.576351881 CET | 49723 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:47.576397896 CET | 443 | 49723 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:47.576414108 CET | 49723 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:47.576421022 CET | 443 | 49723 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:47.577840090 CET | 49725 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:47.577874899 CET | 443 | 49725 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:47.577933073 CET | 49725 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:47.578278065 CET | 49725 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:47.578296900 CET | 443 | 49725 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:47.946984053 CET | 443 | 49725 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:47.947557926 CET | 49725 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:47.947566986 CET | 443 | 49725 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:47.948577881 CET | 49725 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:47.948582888 CET | 443 | 49725 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:48.319219112 CET | 443 | 49725 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:48.319305897 CET | 443 | 49725 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:48.319361925 CET | 49725 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:48.319391966 CET | 49725 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:48.319407940 CET | 443 | 49725 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:48.319417000 CET | 49725 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:48.319422007 CET | 443 | 49725 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:48.385515928 CET | 49726 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:48.385545015 CET | 443 | 49726 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:48.385621071 CET | 49726 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:48.385977983 CET | 49726 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:48.385991096 CET | 443 | 49726 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:48.748610020 CET | 443 | 49726 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:48.748759985 CET | 49726 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:48.749185085 CET | 49726 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:48.749191999 CET | 443 | 49726 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:48.750102043 CET | 49726 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:48.750107050 CET | 443 | 49726 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:49.128308058 CET | 443 | 49726 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:49.128392935 CET | 443 | 49726 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:49.128392935 CET | 49726 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:49.128487110 CET | 49726 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:49.134780884 CET | 49726 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:49.134799004 CET | 443 | 49726 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:49.136035919 CET | 49727 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:49.136126041 CET | 443 | 49727 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:49.136228085 CET | 49727 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:49.136440039 CET | 49727 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:49.136478901 CET | 443 | 49727 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:49.498894930 CET | 443 | 49727 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:49.499006987 CET | 49727 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:49.500174999 CET | 49727 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:49.500193119 CET | 443 | 49727 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:49.500664949 CET | 49727 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:49.500673056 CET | 443 | 49727 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:49.867063046 CET | 443 | 49727 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:49.867088079 CET | 443 | 49727 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:49.867151022 CET | 443 | 49727 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:49.867163897 CET | 49727 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:49.867211103 CET | 49727 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:49.867211103 CET | 49727 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:49.869311094 CET | 49727 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:49.869350910 CET | 443 | 49727 | 162.19.137.157 | 192.168.2.5 |
Mar 26, 2025 03:29:49.869376898 CET | 49727 | 443 | 192.168.2.5 | 162.19.137.157 |
Mar 26, 2025 03:29:49.871227026 CET | 49727 | 443 | 192.168.2.5 | 162.19.137.157 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 26, 2025 03:29:45.216996908 CET | 58291 | 53 | 192.168.2.5 | 1.1.1.1 |
Mar 26, 2025 03:29:45.339975119 CET | 53 | 58291 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Mar 26, 2025 03:29:45.216996908 CET | 192.168.2.5 | 1.1.1.1 | 0x87f0 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Mar 26, 2025 03:29:43.107151985 CET | 1.1.1.1 | 192.168.2.5 | 0x90cf | No error (0) | s-0005.dual-s-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Mar 26, 2025 03:29:43.107151985 CET | 1.1.1.1 | 192.168.2.5 | 0x90cf | No error (0) | 52.123.128.14 | A (IP address) | IN (0x0001) | false | ||
Mar 26, 2025 03:29:43.107151985 CET | 1.1.1.1 | 192.168.2.5 | 0x90cf | No error (0) | 52.123.129.14 | A (IP address) | IN (0x0001) | false | ||
Mar 26, 2025 03:29:45.339975119 CET | 1.1.1.1 | 192.168.2.5 | 0x87f0 | No error (0) | host1.emobility.energy | CNAME (Canonical name) | IN (0x0001) | false | ||
Mar 26, 2025 03:29:45.339975119 CET | 1.1.1.1 | 192.168.2.5 | 0x87f0 | No error (0) | 162.19.137.157 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49721 | 162.19.137.157 | 443 | 4836 | C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-26 02:29:45 UTC | 331 | OUT | |
2025-03-26 02:29:46 UTC | 266 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49722 | 162.19.137.157 | 443 | 4836 | C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-26 02:29:46 UTC | 234 | OUT | |
2025-03-26 02:29:46 UTC | 266 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.5 | 49723 | 162.19.137.157 | 443 | 4836 | C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-26 02:29:47 UTC | 333 | OUT | |
2025-03-26 02:29:47 UTC | 539 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.5 | 49725 | 162.19.137.157 | 443 | 4836 | C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-26 02:29:47 UTC | 313 | OUT | |
2025-03-26 02:29:48 UTC | 590 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.5 | 49726 | 162.19.137.157 | 443 | 4836 | C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-26 02:29:48 UTC | 198 | OUT | |
2025-03-26 02:29:49 UTC | 539 | IN | |
2025-03-26 02:29:49 UTC | 38 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.5 | 49727 | 162.19.137.157 | 443 | 4836 | C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-26 02:29:49 UTC | 178 | OUT | |
2025-03-26 02:29:49 UTC | 590 | IN | |
2025-03-26 02:29:49 UTC | 4645 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 4 |
Start time: | 22:29:39 |
Start date: | 25/03/2025 |
Path: | C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xfa0000 |
File size: | 1'620'872 bytes |
MD5 hash: | 1A0C2C2E7D9C4BC18E91604E9B0C7678 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |