Edit tour

Windows Analysis Report
Payment Advice Note from 25.03.2025.msg

Overview

General Information

Sample name:Payment Advice Note from 25.03.2025.msg
Analysis ID:1648770
MD5:7592ff5d716ab04452e26980d1bdf81d
SHA1:e76d4abafda9f38c34d16aeefa61f829f3683033
SHA256:74a7cdb35b270f276f107aa6dfeb2a1edbe80db15c935110cd11a7099c77c368
Infos:

Detection

Score:48
Range:0 - 100
Confidence:100%

Signatures

AI detected suspicious elements in Email content
AI detected suspicious elements in Email header
Queries the volume information (name, serial number etc) of a device
Sigma detected: Office Autorun Keys Modification

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • OUTLOOK.EXE (PID: 9064 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /f "C:\Users\user\Desktop\Payment Advice Note from 25.03.2025.msg" MD5: 91A5292942864110ED734005B7E005C0)
    • ai.exe (PID: 8812 cmdline: "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "2AAFF37D-449B-4AD7-B904-E9901A8542B5" "800E699A-EB5E-43CF-862C-2F1D207B981C" "9064" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD)
  • cleanup
No configs have been found
No yara matches
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 9064, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Addins\OneNote.OutlookAddin\1
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: EmailJoe Sandbox AI: Detected potential phishing email: Generic 'NOREPLY' sender address commonly used in phishing. Payment-related subject line with PDF attachment is a classic phishing pattern. Future date (2025) in both subject and attachment name is suspicious
Source: EmailJoe Sandbox AI: Detected suspicious elements in Email header: Content-type is application/pdf which is suspicious for direct PDF attachment without proper multipart structure. Return path claims to be from lenmed.co.za but received from vodacom.co.za domain. Base64 encoding combined with PDF content type is a common malware delivery pattern. No SPF, DKIM or DMARC authentication results present. While SAP NetWeaver is legitimate software, this combination of headers suggests possible spoofing. Message appears to be masquerading as a business email but shows signs of header manipulation
Source: EmailClassification: Invoice Scam
Source: classification engineClassification label: mal48.winMSG@3/4@0/0
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\Documents\Outlook Files\~Outlook Data File - NoEmail.pst.tmpJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20250326T0246290914-9064.etlJump to behavior
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /f "C:\Users\user\Desktop\Payment Advice Note from 25.03.2025.msg"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "2AAFF37D-449B-4AD7-B904-E9901A8542B5" "800E699A-EB5E-43CF-862C-2F1D207B981C" "9064" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "2AAFF37D-449B-4AD7-B904-E9901A8542B5" "800E699A-EB5E-43CF-862C-2F1D207B981C" "9064" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: c2r64.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: userenv.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{F959DBBB-3867-41F2-8E5F-3B8BEFAA81B3}\InprocServer32Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEWindow found: window name: SysTabControl32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\CommonJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information queried: ProcessInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeQueries volume information: C:\Program Files (x86)\Microsoft Office\root\Office16\AI\WordCombinedFloatieLreOnline.onnx VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation11
Browser Extensions
1
Process Injection
1
Masquerading
OS Credential Dumping1
Process Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
1
Process Injection
LSASS Memory12
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1648770 Sample: Payment Advice Note from 25... Startdate: 26/03/2025 Architecture: WINDOWS Score: 48 15 AI detected suspicious elements in Email header 2->15 17 AI detected suspicious elements in Email content 2->17 6 OUTLOOK.EXE 47 76 2->6         started        process3 file4 11 C:\...\~Outlook Data File - NoEmail.pst.tmp, SysEx 6->11 dropped 13 C:\Users\...\Outlook Data File - NoEmail.pst, Microsoft 6->13 dropped 9 ai.exe 6->9         started        process5

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
s-0005.dual-s-msedge.net
52.123.128.14
truefalse
    high
    No contacted IP infos
    Joe Sandbox version:42.0.0 Malachite
    Analysis ID:1648770
    Start date and time:2025-03-26 07:45:20 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 15s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:10
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:Payment Advice Note from 25.03.2025.msg
    Detection:MAL
    Classification:mal48.winMSG@3/4@0/0
    Cookbook Comments:
    • Found application associated with file extension: .msg
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 52.109.8.89, 52.182.141.63, 52.149.20.212, 52.123.128.14, 150.171.31.254, 2.23.227.208, 20.96.153.111, 204.79.197.222, 150.171.28.10, 23.33.40.139, 4.245.163.56
    • Excluded domains from analysis (whitelisted): www.bing.com, fp.msedge.net, ecs.office.com, ev2-ring.msedge.net, slscr.update.microsoft.com, prod.configsvc1.live.com.akadns.net, ctldl.windowsupdate.com, cus-config.officeapps.live.com, g.bing.com, arc.msn.com, mobile.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, dual-s-0005-office.config.skype.com, config.officeapps.live.com, us.configsvc1.live.com.akadns.net, officeclient.microsoft.com, ecs.office.trafficmanager.net, mobile.events.data.trafficmanager.net, onedscolprdcus01.centralus.cloudapp.azure.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtQueryAttributesFile calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    No simulations
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    s-0005.dual-s-msedge.netFilled-Summons Notice (2).docxGet hashmaliciousHTMLPhisherBrowse
    • 52.123.128.14
    Payment Advice 24-03-2025.docxGet hashmaliciousUnknownBrowse
    • 52.123.128.14
    Payment Advice 24-03-2025.docxGet hashmaliciousUnknownBrowse
    • 52.123.128.14
    7e02499c-2bea-a9d9-6a2f-934633fb5e94.emlGet hashmaliciousUnknownBrowse
    • 52.123.129.14
    https://thetti-my.sharepoint.com/:f:/p/kellieblack/EtssBivICL5BgQEDfbETZP4BZsoHTOyxYMnSj46dgeiAiA?e=0t2fdmGet hashmaliciousHTMLPhisherBrowse
    • 52.123.128.14
    Revised - Hartzellprop.com 2025 Handbook29828.docGet hashmaliciousHTMLPhisher, Invisible JS, Tycoon2FABrowse
    • 52.123.128.14
    Revised - Cwalker 2025 Handbook25807.docGet hashmaliciousHTMLPhisher, Invisible JS, Tycoon2FABrowse
    • 52.123.129.14
    original.emlGet hashmaliciousUnknownBrowse
    • 52.123.128.14
    PO 25032025.docxGet hashmaliciousUnknownBrowse
    • 52.123.129.14
    PO 25032025.docxGet hashmaliciousUnknownBrowse
    • 52.123.128.14
    No context
    No context
    No context
    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
    File Type:data
    Category:dropped
    Size (bytes):94208
    Entropy (8bit):4.470539971563455
    Encrypted:false
    SSDEEP:1536:jx47B9YrKUXIXo3/yvQvYekbRHCiIOLtow8fkxzlN/Ev1hY2nlJ+:N47BmrK2IXox+
    MD5:21922FD3FF46FBA73A1D8F1B33A87D5F
    SHA1:FD9994FAA192EB7F8C25414BAD04A1701C675F8D
    SHA-256:F1D06E80825607E48C7F138B8F0D61F64EF436C5AE9BEC0576F60798D716DDDA
    SHA-512:1E4DCE6D293A9D92300FBF7FE4B680845C31DBD2DE533B14A4980C18A01764032D9607D398784367231F3F5698BC29C34E4EA92FCDC406D26DE3568D961724F5
    Malicious:false
    Reputation:low
    Preview:............................................................................d...l#..h#..........................eJ..............Zb..2...................................,...@.t.z.r.e.s...d.l.l.,.-.1.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.1.1.1...............................................................V...........................v.2._.O.U.T.L.O.O.K.:.2.3.6.8.:.9.8.6.a.e.7.a.c.e.f.4.b.4.7.5.3.8.2.6.8.c.b.8.2.1.e.a.f.9.7.8.5...C.:.\.U.s.e.r.s.\.a.l.f.o.n.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.O.u.t.l.o.o.k. .L.o.g.g.i.n.g.\.O.U.T.L.O.O.K._.1.6._.0._.1.6.8.2.7._.2.0.1.3.0.-.2.0.2.5.0.3.2.6.T.0.2.4.6.2.9.0.9.1.4.-.9.0.6.4...e.t.l...........P.P.l#..h#...D......................................................................................................................................................................................................................................................................................................
    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
    File Type:data
    Category:dropped
    Size (bytes):163840
    Entropy (8bit):0.37951419118514335
    Encrypted:false
    SSDEEP:192:JTlVhovPwdfAfHyK1ETJfkn4Mu4rcn5NgiXHWQOoqAbAFAqwNh/:JT7hvAfyRJM4Mu4I8iXHOoqMu
    MD5:5939A710C684792E77D0C9FB1F5B62AF
    SHA1:BA42A5F81AD86C7600E521EB4ADC0CA8A9C2AF00
    SHA-256:29198EE4A306E1234B5B1D2F9E16A5A15472157651376220BC154284DA07E262
    SHA-512:B7C92615F70F5693C1F61CBFB4AF382DF43AC1DA26C9A4C7B26A2A99639F5418388BC572D89160869F409BEEA14228699CEFB345E0296EC7C8D607F734DC044E
    Malicious:false
    Reputation:low
    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
    File Type:Microsoft Outlook email folder (>=2003)
    Category:dropped
    Size (bytes):271360
    Entropy (8bit):1.3007625714890005
    Encrypted:false
    SSDEEP:768:X4QcBKwAe3Q4LMYK8TSmrArCJFpi4cBfJblG02xu3o8BUTIZ:cH3fnFS7OJqlfAuYeNZ
    MD5:1F33CAE1A3AF902C5B109802262F7679
    SHA1:ACB478C8853698E738E3CA9F03EBFAD0C569D867
    SHA-256:F33460DC60071D4E47B2EAE9049A848B0FC25DA0876D6884812AA6977DEB77B9
    SHA-512:81607CFD68E45524578D793BF18997DAE672E62981B92BC43347C1EB4A0B835E9E1AFF5503898203FAF46D295688E53341298BCFDA320D2E1F6D4B7E9C14CCD0
    Malicious:true
    Reputation:low
    Preview:!BDNs..{SM......\....9..........?.......T................@...........@...@...................................@...........................................................................$.......D.......V..............;...............>...................................................................................................................................................................................................................................................................................................3..ER.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
    File Type:SysEx File -
    Category:dropped
    Size (bytes):131072
    Entropy (8bit):0.9708137879266469
    Encrypted:false
    SSDEEP:384:WOjTIXJ2DeQjqH3Vjz8z7IZiDS9jURP6Hs:pTIZ2di3VvIMZAS+RA
    MD5:971B0393D78FA3878C18B709034E615B
    SHA1:EAFF11F3201D0E02DE38D7097C7286C735EA7CCE
    SHA-256:5F2F912B68844BF29EBC7BA34CB397B9F9A50798B1E4AE9C685083103C593A74
    SHA-512:E83F1551989B1FE5675BCA3878C1357F5DD27A6B990E96AFD1AA642E1F57655CF4B1A580CA5480636E271CDA2D23877187191B2066F0B7A2861388FEDA585497
    Malicious:true
    Reputation:low
    Preview:.`..C...P.......h#............................#.!BDNs..{SM......\....9..........?.......T................@...........@...@...................................@...........................................................................$.......D.......V..............;...............>...................................................................................................................................................................................................................................................................................................3..ER................B............#.........................................................................................................................................................................................................................................................................................................................................................................................................
    File type:CDFV2 Microsoft Outlook Message
    Entropy (8bit):6.402436356648218
    TrID:
    • Outlook Message (71009/1) 58.92%
    • Outlook Form Template (41509/1) 34.44%
    • Generic OLE2 / Multistream Compound File (8008/1) 6.64%
    File name:Payment Advice Note from 25.03.2025.msg
    File size:115'200 bytes
    MD5:7592ff5d716ab04452e26980d1bdf81d
    SHA1:e76d4abafda9f38c34d16aeefa61f829f3683033
    SHA256:74a7cdb35b270f276f107aa6dfeb2a1edbe80db15c935110cd11a7099c77c368
    SHA512:db597e7d5fe593dd25c2da43fe6a2299127e66b97291179a2a5673b84a2348d68db945ae8ddd3355c776758e05decc9b2b2d384067d1a7402807d120385203c8
    SSDEEP:3072:Y0LdhEVgAyhG83mUETeL8zvASQycsWRYOwq+t94Tg:p7AUqcsfOwqTT
    TLSH:9BB31A443AFA4614F677AFF60DE1B04785363C91BC21868F3968330F0A75D85AA62B5F
    File Content Preview:........................>.......................................................}..............................................................................................................................................................................
    Subject:Payment Advice Note from 25.03.2025
    From:NOREPLY <noreply@lenmed.co.za>
    To:<info@dataprime.co.za>
    Cc:
    BCC:
    Date:Tue, 25 Mar 2025 14:27:32 +0100
    Communications:
      Attachments:
      • Payment Advice Note from 25.03.2025.pdf
      Key Value
      Receivedfrom LENMED.CO.ZA (vc-vb-41-21-200-252.ens.vodacom.co.za
      (260310a6:10:4b7::22) with Microsoft SMTP Server (version=TLS1_3,
      2025 1331:00 +0000
      25 Mar 2025 1330:59 +0000
      Authentication-Resultsspf=pass (sender IP is 41.74.205.145)
      Received-SPFPass (protection.outlook.com: domain of lenmed.co.za designates
      via Frontend Transport; Tue, 25 Mar 2025 1330:59 +0000
      DKIM-Signaturev=1; a=rsa-sha256; c=relaxed/relaxed; d=lenmed.co.za;
      h=fromfrom:reply-to:subject:subject:date:date:message-id:message-id:
      toto:cc:mime-version:mime-version:content-type:content-type:
      content-transfer-encodingcontent-transfer-encoding;
      za-mta-24-HotZRxAYMjWVaeozOIwE6A-1; Tue, 25 Mar 2025 1530:55 +0200
      X-MC-UniqueHotZRxAYMjWVaeozOIwE6A-1
      X-Mimecast-MFC-AGG-IDHotZRxAYMjWVaeozOIwE6A_1742909454
      DateTue, 25 Mar 2025 15:27:32 +0200 (CAT)
      FromNOREPLY <noreply@lenmed.co.za>
      SubjectPayment Advice Note from 25.03.2025
      To<info@dataprime.co.za>
      Message-ID<ADR5000000016547330000505685D0BC1FD082AFABFECA13B425@LENMED.CO.ZA>
      MIME-Version1.0
      ImportanceNormal
      X-Priority3 (Normal)
      X-MailerSAP NetWeaver 740
      X-Mimecast-Spam-Score0
      X-Mimecast-MFC-PROC-IDNV0Ev7T70SXvzCDLCTbEajBwEsgQlBh6XM64tq-LiSo_1742909454
      X-Mimecast-Originatorlenmed.co.za
      Content-Typeapplication/pdf;
      Content-Transfer-Encodingbase64
      Content-DescriptionPayment Advice Note from 25.03.2025
      Return-Pathnoreply@lenmed.co.za
      X-MS-Exchange-Organization-ExpirationStartTime25 Mar 2025 13:31:00.4052
      X-MS-Exchange-Organization-ExpirationStartTimeReasonOriginalSubmit
      X-MS-Exchange-Organization-ExpirationInterval1:00:00:00.0000000
      X-MS-Exchange-Organization-ExpirationIntervalReasonOriginalSubmit
      X-MS-Exchange-Organization-Network-Message-Id83eda0cb-8b51-45de-199b-08dd6ba14857
      X-EOPAttributedMessage0
      X-EOPTenantAttributedMessage9a48e0d0-b340-4d47-b81c-14a44c7c076a:0
      X-MS-Exchange-Organization-MessageDirectionalityIncoming
      X-MS-PublicTrafficTypeEmail
      X-MS-TrafficTypeDiagnosticDB1PEPF000509E5:EE_|GV1PR02MB10719:EE_
      X-MS-Exchange-Organization-AuthSourceDB1PEPF000509E5.eurprd03.prod.outlook.com
      X-MS-Exchange-Organization-AuthAsAnonymous
      X-MS-Office365-Filtering-Correlation-Id83eda0cb-8b51-45de-199b-08dd6ba14857
      X-LD-Processed9a48e0d0-b340-4d47-b81c-14a44c7c076a,ExtFwd
      X-MS-Exchange-AtpMessagePropertiesSA|SL
      dateTue, 25 Mar 2025 14:27:32 +0100

      Icon Hash:c4e1928eacb280a2
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Mar 26, 2025 07:46:34.155090094 CET1.1.1.1192.168.2.50x62eaNo error (0)ecs-office.s-0005.dual-s-msedge.nets-0005.dual-s-msedge.netCNAME (Canonical name)IN (0x0001)false
      Mar 26, 2025 07:46:34.155090094 CET1.1.1.1192.168.2.50x62eaNo error (0)s-0005.dual-s-msedge.net52.123.128.14A (IP address)IN (0x0001)false
      Mar 26, 2025 07:46:34.155090094 CET1.1.1.1192.168.2.50x62eaNo error (0)s-0005.dual-s-msedge.net52.123.129.14A (IP address)IN (0x0001)false
      050100s020406080100

      Click to jump to process

      050100s0.0020406080100MB

      Click to jump to process

      • File
      • Registry

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:1
      Start time:02:46:26
      Start date:26/03/2025
      Path:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
      Wow64 process (32bit):true
      Commandline:"C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /f "C:\Users\user\Desktop\Payment Advice Note from 25.03.2025.msg"
      Imagebase:0x290000
      File size:34'446'744 bytes
      MD5 hash:91A5292942864110ED734005B7E005C0
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:false
      There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
      There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
      There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
      There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
      There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

      Target ID:5
      Start time:02:46:33
      Start date:26/03/2025
      Path:C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe
      Wow64 process (32bit):false
      Commandline:"C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "2AAFF37D-449B-4AD7-B904-E9901A8542B5" "800E699A-EB5E-43CF-862C-2F1D207B981C" "9064" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
      Imagebase:0x7ff7361b0000
      File size:710'048 bytes
      MD5 hash:EC652BEDD90E089D9406AFED89A8A8BD
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:false

      No disassembly