Edit tour

Windows Analysis Report
Inquiry-140-120.xla.xlsx

Overview

General Information

Sample name:Inquiry-140-120.xla.xlsx
Analysis ID:1654281
MD5:184b186803e3cd34f34952ade6ed8f1d
SHA1:ae81de594f4f3b1e32eb5e5291fb28c3343a420c
SHA256:9ed36f226beb7031af2c4fc6beea0aa61180d56b4649acda65927c8b2aba7f90
Tags:xlaxlsxuser-abuse_ch
Infos:

Detection

Score:52
Range:0 - 100
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Excel sheet contains many unusual embedded objects
Document contains embedded VBA macros
Document embeds suspicious OLE2 link
Document misses a certain OLE stream usually present in this Microsoft Office document type
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Excel Network Connections
Sigma detected: Suspicious Office Outbound Connections
Unable to load, office file is protected or invalid

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w11x64_office
  • EXCEL.EXE (PID: 2472 cmdline: "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding MD5: F9F7B6C42211B06E7AC3E4B60AA8FB77)
    • splwow64.exe (PID: 2208 cmdline: C:\Windows\splwow64.exe 12288 MD5: AF4A7EBF6114EE9E6FBCC910EC3C96E6)
  • EXCEL.EXE (PID: 4376 cmdline: "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\user\Desktop\Inquiry-140-120.xla.xlsx" MD5: F9F7B6C42211B06E7AC3E4B60AA8FB77)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Network ConnectionAuthor: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0", Tim Shelton: Data: DestinationIp: 13.107.246.40, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE, Initiated: true, ProcessId: 2472, Protocol: tcp, SourceIp: 192.168.2.24, SourceIsIpv6: false, SourcePort: 60845
Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.24, DestinationIsIpv6: false, DestinationPort: 60845, EventID: 3, Image: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE, Initiated: true, ProcessId: 2472, Protocol: tcp, SourceIp: 13.107.246.40, SourceIsIpv6: false, SourcePort: 443
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Inquiry-140-120.xla.xlsxReversingLabs: Detection: 13%
Source: Inquiry-140-120.xla.xlsxVirustotal: Detection: 14%Perma Link
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEDirectory created: C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xmlJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile opened: C:\Program Files\Microsoft Office\root\vfs\System\MSVCR100.dllJump to behavior
Source: unknownHTTPS traffic detected: 13.107.246.40:443 -> 192.168.2.24:60845 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.246.40:443 -> 192.168.2.24:60844 version: TLS 1.2
Source: global trafficDNS query: name: otelrules.svc.static.microsoft
Source: global trafficTCP traffic: 192.168.2.24:60845 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:60844 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:60845 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:60844 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:60845 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:60844 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:60845 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:60844 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:60845 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:60845 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:60845 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:60844 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:60844 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:60844 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:60844 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:60844 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:60844 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:60844 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:60845 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:60845 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:60845 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:60845 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:60844 -> 13.107.246.40:443
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:60845
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:60844
Source: global trafficTCP traffic: 192.168.2.24:60845 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:60844 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:60845 -> 13.107.246.40:443
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:60845
Source: global trafficTCP traffic: 192.168.2.24:60844 -> 13.107.246.40:443
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:60844
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:60845
Source: global trafficTCP traffic: 192.168.2.24:60845 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:60845 -> 13.107.246.40:443
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:60845
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:60845
Source: global trafficTCP traffic: 192.168.2.24:60845 -> 13.107.246.40:443
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:60844
Source: global trafficTCP traffic: 192.168.2.24:60844 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:60844 -> 13.107.246.40:443
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:60844
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:60844
Source: global trafficTCP traffic: 192.168.2.24:60844 -> 13.107.246.40:443
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:60845
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:60844
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:60844
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:60844
Source: global trafficTCP traffic: 192.168.2.24:60844 -> 13.107.246.40:443
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:60844
Source: global trafficTCP traffic: 192.168.2.24:60844 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:60844 -> 13.107.246.40:443
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:60844
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:60844
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:60844
Source: global trafficTCP traffic: 192.168.2.24:60844 -> 13.107.246.40:443
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:60845
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:60845
Source: global trafficTCP traffic: 192.168.2.24:60845 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:60845 -> 13.107.246.40:443
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:60845
Source: global trafficTCP traffic: 192.168.2.24:60845 -> 13.107.246.40:443
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:60845
Source: Joe Sandbox ViewIP Address: 13.107.246.40 13.107.246.40
Source: Joe Sandbox ViewIP Address: 13.107.246.40 13.107.246.40
Source: Joe Sandbox ViewJA3 fingerprint: 258a5a1e95b8a911872bae9081526644
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /rules/rule170146v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.18129; Pro)Host: otelrules.svc.static.microsoft
Source: global trafficHTTP traffic detected: GET /rules/rule120201v19s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.18129; Pro)Host: otelrules.svc.static.microsoft
Source: global trafficDNS traffic detected: DNS query: otelrules.svc.static.microsoft
Source: Inquiry-140-120.xla.xlsx, 4E650000.0.drString found in binary or memory: https://Linkedindfksdjkfweifgjhdfhgjuhuegfdjghjfhjghdfjghhuhfdgjhjfhggjhfguhdfjgjffhjhghjvcubrejhh.d
Source: Primary1743576794552089100_975D446F-4AD7-420E-A868-C7EE916F112A.log.0.drString found in binary or memory: https://res.cdn.office.net/mro1cdnstorage/fonts/prod/4.41/flatfontassets.pkg
Source: unknownNetwork traffic detected: HTTP traffic on port 60844 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 60845 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 60845
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 60844
Source: unknownHTTPS traffic detected: 13.107.246.40:443 -> 192.168.2.24:60845 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.246.40:443 -> 192.168.2.24:60844 version: TLS 1.2

System Summary

barindex
Source: Inquiry-140-120.xla.xlsxOLE: Microsoft Excel 2007+
Source: ~DF6C44756B8CA05016.TMP.0.drOLE: Microsoft Excel 2007+
Source: 4E650000.0.drOLE: Microsoft Excel 2007+
Source: Inquiry-140-120.xla.xlsxOLE indicator, VBA macros: true
Source: Inquiry-140-120.xla.xlsxStream path 'MBD004F80F4/\x1Ole' : https://Linkedindfksdjkfweifgjhdfhgjuhuegfdjghjfhjghdfjghhuhfdgjhjfhggjhfguhdfjgjffhjhghjvcubrejhh.dOC@kuhlinks.de/G15BaN5'pSDlP}&m)ZOSFcwS4jkFwRCfxnHS5mdAol2b8E6H5N40vQS2sXW6bJoujUuMEwzSCkxJKFqhSsJVygygSFiO4EWMi7aLk1sBdHkBdgoCZRCJdIZOSHt0c5yMCFGh1HvGILmF8GwhhdgWwsXxjDFAOXADkcGGih5btG2B4cBvsZhtjpFUbwXpL3CGUHqO59GARcA4I5iqGOfR1KLrmhKLWxGtqlizZ8b0N5YepprFVZktPLV9Zukfo06hln{oTf4Ny"up
Source: 4E650000.0.drStream path 'MBD004F80F4/\x1Ole' : https://Linkedindfksdjkfweifgjhdfhgjuhuegfdjghjfhjghdfjghhuhfdgjhjfhggjhfguhdfjgjffhjhghjvcubrejhh.dOC@kuhlinks.de/G15BaN5'pSDlP}&m)ZOSFcwS4jkFwRCfxnHS5mdAol2b8E6H5N40vQS2sXW6bJoujUuMEwzSCkxJKFqhSsJVygygSFiO4EWMi7aLk1sBdHkBdgoCZRCJdIZOSHt0c5yMCFGh1HvGILmF8GwhhdgWwsXxjDFAOXADkcGGih5btG2B4cBvsZhtjpFUbwXpL3CGUHqO59GARcA4I5iqGOfR1KLrmhKLWxGtqlizZ8b0N5YepprFVZktPLV9Zukfo06hln{oTf4Ny"up
Source: ~DF6C44756B8CA05016.TMP.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEWindow title found: microsoft excel okexcel cannot open the file 'inquiry-140-120.xla.xlsx' because the file format or file extension is not valid. verify that the file has not been corrupted and that the file extension matches the format of the file.
Source: classification engineClassification label: mal52.winXLSX@4/14@1/1
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xmlJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Users\user\Desktop\~$Inquiry-140-120.xla.xlsxJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\{975D446F-4AD7-420E-A868-C7EE916F112A} - OProcSessId.datJump to behavior
Source: Inquiry-140-120.xla.xlsxOLE indicator, Workbook stream: true
Source: 4E650000.0.drOLE indicator, Workbook stream: true
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: Inquiry-140-120.xla.xlsxReversingLabs: Detection: 13%
Source: Inquiry-140-120.xla.xlsxVirustotal: Detection: 14%
Source: unknownProcess created: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288
Source: unknownProcess created: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\user\Desktop\Inquiry-140-120.xla.xlsx"
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288Jump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{3EE60F5C-9BAD-4CD8-8E21-AD2D001D06EB}\InprocServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\CommonJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEDirectory created: C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xmlJump to behavior
Source: Inquiry-140-120.xla.xlsxStatic file information: File size 1208832 > 1048576
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile opened: C:\Program Files\Microsoft Office\root\vfs\System\MSVCR100.dllJump to behavior
Source: ~DF6C44756B8CA05016.TMP.0.drInitial sample: OLE indicators vbamacros = False
Source: Inquiry-140-120.xla.xlsxInitial sample: OLE indicators encrypted = True
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Inquiry-140-120.xla.xlsxStream path 'MBD004F80F3/Package' entropy: 7.98990927524 (max. 8.0)
Source: Inquiry-140-120.xla.xlsxStream path 'Workbook' entropy: 7.99911637225 (max. 8.0)
Source: ~DF6C44756B8CA05016.TMP.0.drStream path 'Package' entropy: 7.99058757045 (max. 8.0)
Source: 4E650000.0.drStream path 'MBD004F80F3/Package' entropy: 7.99058757045 (max. 8.0)
Source: 4E650000.0.drStream path 'Workbook' entropy: 7.99807413483 (max. 8.0)
Source: C:\Windows\splwow64.exeWindow / User API: threadDelayed 815Jump to behavior
Source: C:\Windows\splwow64.exeLast function: Thread delayed
Source: C:\Windows\splwow64.exeLast function: Thread delayed
Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information queried: ProcessInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts3
Exploitation for Client Execution
1
Scripting
1
Process Injection
3
Masquerading
OS Credential Dumping1
Process Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1654281 Sample: Inquiry-140-120.xla.xlsx Startdate: 02/04/2025 Architecture: WINDOWS Score: 52 17 star-azurefd-prod.trafficmanager.net 2->17 19 shed.dual-low.s-part-0012.t-0009.t-msedge.net 2->19 21 5 other IPs or domains 2->21 25 Multi AV Scanner detection for submitted file 2->25 27 Excel sheet contains many unusual embedded objects 2->27 7 EXCEL.EXE 504 87 2->7         started        11 EXCEL.EXE 23 50 2->11         started        signatures3 process4 dnsIp5 23 s-part-0012.t-0009.t-msedge.net 13.107.246.40, 443, 60844, 60845 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 7->23 15 C:\Users\user\...\~$Inquiry-140-120.xla.xlsx, data 7->15 dropped 13 splwow64.exe 7->13         started        file6 process7

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Inquiry-140-120.xla.xlsx14%ReversingLabs
Inquiry-140-120.xla.xlsx15%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://Linkedindfksdjkfweifgjhdfhgjuhuegfdjghjfhjghdfjghhuhfdgjhjfhggjhfguhdfjgjffhjhghjvcubrejhh.d0%Avira URL Cloudsafe

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
s-part-0012.t-0009.t-msedge.net
13.107.246.40
truefalse
    high
    a726.dscd.akamai.net
    23.200.0.22
    truefalse
      high
      s-0005.dual-s-msedge.net
      52.123.128.14
      truefalse
        high
        otelrules.svc.static.microsoft
        unknown
        unknownfalse
          high
          NameMaliciousAntivirus DetectionReputation
          https://otelrules.svc.static.microsoft/rules/rule170146v0s19.xmlfalse
            high
            https://otelrules.svc.static.microsoft/rules/rule120201v19s19.xmlfalse
              high
              NameSourceMaliciousAntivirus DetectionReputation
              https://Linkedindfksdjkfweifgjhdfhgjuhuegfdjghjfhjghdfjghhuhfdgjhjfhggjhfguhdfjgjffhjhghjvcubrejhh.dInquiry-140-120.xla.xlsx, 4E650000.0.drfalse
              • Avira URL Cloud: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              13.107.246.40
              s-part-0012.t-0009.t-msedge.netUnited States
              8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
              Joe Sandbox version:42.0.0 Malachite
              Analysis ID:1654281
              Start date and time:2025-04-02 08:52:13 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 5m 23s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:defaultwindowsofficecookbook.jbs
              Analysis system description:Windows 11 23H2 with Office Professional Plus 2021, Chrome 131, Firefox 133, Adobe Reader DC 24, Java 8 Update 431, 7zip 24.09
              Run name:Potential for more IOCs and behavior
              Number of analysed new started processes analysed:21
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • GSI enabled (VBA)
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:Inquiry-140-120.xla.xlsx
              Detection:MAL
              Classification:mal52.winXLSX@4/14@1/1
              EGA Information:Failed
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .xlsx
              • Found Word or Excel or PowerPoint or XPS Viewer
              • Attach to Office via COM
              • Active ActiveX Object
              • Active ActiveX Object
              • Scroll down
              • Close Viewer
              • Exclude process from analysis (whitelisted): dllhost.exe, sppsvc.exe, SystemSettingsBroker.exe, SIHClient.exe, appidcertstorecheck.exe, conhost.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 52.109.8.89, 52.109.8.36, 52.109.16.52, 20.189.173.8, 20.189.173.15, 52.123.128.14, 40.126.29.11, 172.202.163.200, 23.200.0.22
              • Excluded domains from analysis (whitelisted): us1.odcsm1.live.com.akadns.net, odc.officeapps.live.com, slscr.update.microsoft.com, cus-config.officeapps.live.com, res-1.cdn.office.net, mobile.events.data.microsoft.com, roaming.officeapps.live.com, onedscolprdwus07.westus.cloudapp.azure.com, dual-s-0005-office.config.skype.com, osiprod-cus-buff-azsc-000.centralus.cloudapp.azure.com, login.live.com, ncus-000.odc.officeapps.live.com, officeclient.microsoft.com, osiprod-ncus-bronze-public-000.northcentralus.cloudapp.azure.com, onedscolprdwus14.westus.cloudapp.azure.com, c.pki.goog, ecs.office.com, prod.configsvc1.live.com.akadns.net, uci.cdn.office.net, ctldl.windowsupdate.com, prod.roaming1.live.com.akadns.net, res-stls-prod.edgesuite.net, cus-azsc-000.roaming.officeapps.live.com, fe3cr.delivery.mp.microsoft.com, us1.roaming1.live.com.akadns.net, res-prod.trafficmanager.net, config.officeapps.live.com, us.configsvc1.live.com.akadns.net, ecs.office.trafficmanager.net, res.cdn.office.net, prod.odcsm1.live.com.akad
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtCreateKey calls found.
              • Report size getting too big, too many NtQueryAttributesFile calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • Report size getting too big, too many NtReadVirtualMemory calls found.
              • Report size getting too big, too many NtSetValueKey calls found.
              TimeTypeDescription
              02:54:16API Interceptor850x Sleep call for process: splwow64.exe modified
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              13.107.246.40Payment Transfer Receipt.shtmlGet hashmaliciousHTMLPhisherBrowse
              • www.aib.gov.uk/
              NEW ORDER.xlsGet hashmaliciousUnknownBrowse
              • 2s.gg/3zs
              PO_OCF 408.xlsGet hashmaliciousUnknownBrowse
              • 2s.gg/42Q
              06836722_218 Aluplast.docx.docGet hashmaliciousUnknownBrowse
              • 2s.gg/3zk
              Quotation.xlsGet hashmaliciousUnknownBrowse
              • 2s.gg/3zM
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              a726.dscd.akamai.netProvider Document.htmlGet hashmaliciousHTMLPhisherBrowse
              • 23.62.47.145
              VUE-KMH-462E Missed Amex Entry-Mar-25 1.xlsmGet hashmaliciousUnknownBrowse
              • 23.206.121.16
              http://benedictocollege1-my.sharepoint.com/:f:/g/personal/ryacassey_montillano_benedictocollege_edu_ph/EqNqk_rEp1RHm2UFQLxbuYoBbS5GFhosjapIHgSzIrrsZQ?e=4SvNeCGet hashmaliciousUnknownBrowse
              • 23.206.121.35
              Inquiry-140-120.xla.xlsxGet hashmaliciousUnknownBrowse
              • 23.206.121.45
              Message.emlGet hashmaliciousUnknownBrowse
              • 23.206.121.54
              Inquiry-140-120.xla.xlsxGet hashmaliciousUnknownBrowse
              • 23.53.126.44
              NMDC01042025.xlsGet hashmaliciousUnknownBrowse
              • 23.204.152.198
              Message.emlGet hashmaliciousUnknownBrowse
              • 23.53.126.12
              RFQ-Pietro Bonaiti P0 24081128 04.xlsxGet hashmaliciousUnknownBrowse
              • 23.206.121.54
              RFQ PO#285041PB Additional Items.docGet hashmaliciousUnknownBrowse
              • 23.44.136.173
              s-0005.dual-s-msedge.netRevised - Buncombe county government 2025 Handbook33469.docGet hashmaliciousUnknownBrowse
              • 52.123.129.14
              VUE-KMH-462E Missed Amex Entry-Mar-25 1.xlsmGet hashmaliciousUnknownBrowse
              • 52.123.128.14
              VUE-KMH-462E Missed Amex Entry-Mar-25 1.xlsmGet hashmaliciousUnknownBrowse
              • 52.123.129.14
              Inquiry-140-120.xla.xlsxGet hashmaliciousUnknownBrowse
              • 52.123.129.14
              http://benedictocollege1-my.sharepoint.com/:f:/g/personal/ryacassey_montillano_benedictocollege_edu_ph/EqNqk_rEp1RHm2UFQLxbuYoBbS5GFhosjapIHgSzIrrsZQ?e=4SvNeCGet hashmaliciousUnknownBrowse
              • 52.123.129.14
              Message.emlGet hashmaliciousUnknownBrowse
              • 52.123.129.14
              Inquiry-140-120.xla.xlsxGet hashmaliciousUnknownBrowse
              • 52.123.128.14
              Inquiry-140-120.xla.xlsxGet hashmaliciousUnknownBrowse
              • 52.123.128.14
              NMDC01042025.xlsGet hashmaliciousUnknownBrowse
              • 52.123.129.14
              s-part-0012.t-0009.t-msedge.netNotification.DocxGet hashmaliciousUnknownBrowse
              • 13.107.246.40
              https://www.terrabellaseniorliving.com/terrabella-little-avenue/Get hashmaliciousCAPTCHA Scam ClickFixBrowse
              • 13.107.246.40
              https://sprayfoamsys.com/service-center/Get hashmaliciousUnknownBrowse
              • 13.107.246.40
              Provider Document.htmlGet hashmaliciousHTMLPhisherBrowse
              • 13.107.246.40
              https://microwaveeng-dot-m365view-318723.uc.r.appspot.com/Get hashmaliciousHTMLPhisherBrowse
              • 13.107.246.40
              https://sprayfoamsys.comGet hashmaliciousUnknownBrowse
              • 13.107.246.40
              VUE-KMH-462E Missed Amex Entry-Mar-25 1.xlsmGet hashmaliciousUnknownBrowse
              • 13.107.246.40
              VUE-KMH-462E Missed Amex Entry-Mar-25 1.xlsmGet hashmaliciousUnknownBrowse
              • 13.107.246.40
              Inquiry-140-120.xla.xlsxGet hashmaliciousUnknownBrowse
              • 13.107.246.40
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              MICROSOFT-CORP-MSN-AS-BLOCKUShttp://free-calendar.suGet hashmaliciousUnknownBrowse
              • 20.253.86.149
              Notification.DocxGet hashmaliciousUnknownBrowse
              • 20.189.173.13
              https://www.terrabellaseniorliving.com/terrabella-little-avenue/Get hashmaliciousCAPTCHA Scam ClickFixBrowse
              • 13.107.42.14
              http://xxxjknams53w.z13.web.core.windows.netGet hashmaliciousTechSupportScamBrowse
              • 20.150.90.65
              https://516jm1zm.r.sa-east-1.awstrack.me/L0/https:%2F%2Fcloud.screenconnect.com.by%2FMMvmajre/1/01030195ed466068-b7faa7cb-1833-4388-bad8-b1418ddcc4cd-000000/XFv4Glw7SIWsIew07KwB0pk-9m0=204Get hashmaliciousUnknownBrowse
              • 13.107.42.14
              https://wetransfer.com/downloads/2971136d8b665852eb1f874db092eba220250401114650/596f3cb65b7858fdbbd45a98e463335420250401114650/9efedd?t_exp=1743767210&t_lsid=52fe332d-a748-433b-8af3-fc8487bab09a&t_network=email&t_rid=ZW1haWx8YWRyb2l0fDg1MzA4Yzg5LWMzYjktNDZiZS04MWU5LTViYTJmN2Y1ZjMyZg%3D%3D&t_s=download_link&t_ts=1743508010&utm_campaign=TRN_TDL_01&utm_source=sendgrid&utm_medium=email&trk=TRN_TDL_01Get hashmaliciousUnknownBrowse
              • 20.40.202.2
              https://sprayfoamsys.com/service-center/Get hashmaliciousUnknownBrowse
              • 20.110.205.119
              Provider Document.htmlGet hashmaliciousHTMLPhisherBrowse
              • 40.126.29.15
              http://stonefarmliving.comGet hashmaliciousUnknownBrowse
              • 13.107.43.14
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              258a5a1e95b8a911872bae9081526644Inquiry-140-120.xla.xlsxGet hashmaliciousUnknownBrowse
              • 13.107.246.40
              Nuevo Orden.xlam.xlsxGet hashmaliciousUnknownBrowse
              • 13.107.246.40
              Inquiry-140-120.xla.xlsxGet hashmaliciousUnknownBrowse
              • 13.107.246.40
              NMDC01042025.xlsGet hashmaliciousUnknownBrowse
              • 13.107.246.40
              RFQ-Pietro Bonaiti P0 24081128 04.xlsxGet hashmaliciousUnknownBrowse
              • 13.107.246.40
              PO#267759.xlam.xlsxGet hashmaliciousUnknownBrowse
              • 13.107.246.40
              PO223445.xlam.xlsxGet hashmaliciousUnknownBrowse
              • 13.107.246.40
              transferencia interbancaria_swift.xlam.xlsxGet hashmaliciousUnknownBrowse
              • 13.107.246.40
              swift PI RSEK25001.docx.docGet hashmaliciousUnknownBrowse
              • 13.107.246.40
              SOA03312025.xlsGet hashmaliciousUnknownBrowse
              • 13.107.246.40
              No context
              Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
              Category:dropped
              Size (bytes):118
              Entropy (8bit):3.5700810731231707
              Encrypted:false
              SSDEEP:3:QaklTlAlXMLLmHlIlFLlmIK/5lTn84vlJlhlXlDHlA6l3l6Als:QFulcLk04/5p8GVz6QRq
              MD5:573220372DA4ED487441611079B623CD
              SHA1:8F9D967AC6EF34640F1F0845214FBC6994C0CB80
              SHA-256:BE84B842025E4241BFE0C9F7B8F86A322E4396D893EF87EA1E29C74F47B6A22D
              SHA-512:F19FA3583668C3AF92A9CEF7010BD6ECEC7285F9C8665F2E9528DBA606F105D9AF9B1DB0CF6E7F77EF2E395943DC0D5CB37149E773319078688979E4024F9DD7
              Malicious:false
              Reputation:high, very likely benign file
              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.H.e.a.r.t.b.e.a.t.C.a.c.h.e./.>.
              Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:data
              Category:dropped
              Size (bytes):20971520
              Entropy (8bit):8.112143835430977E-5
              Encrypted:false
              SSDEEP:3:Tuekk9NJtHFfs1XsExe/t:qeVJ8
              MD5:AFDEAC461EEC32D754D8E6017E845D21
              SHA1:5D0874C19B70638A0737696AEEE55BFCC80D7ED8
              SHA-256:3A96B02F6A09F6A6FAC2A44A5842FF9AEB17EB4D633E48ABF6ADDF6FB447C7E2
              SHA-512:CAB6B8F9FFDBD80210F42219BAC8F1124D6C0B6995C5128995F7F48CED8EF0F2159EA06A2CD09B1FDCD409719F94A7DB437C708D3B1FDA01FDC80141A4595FC7
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:data
              Category:dropped
              Size (bytes):20971520
              Entropy (8bit):0.0
              Encrypted:false
              SSDEEP:3::
              MD5:8F4E33F3DC3E414FF94E5FB6905CBA8C
              SHA1:9674344C90C2F0646F0B78026E127C9B86E3AD77
              SHA-256:CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC
              SHA-512:7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB
              Malicious:false
              Reputation:high, very likely benign file
              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):71
              Entropy (8bit):4.3462513114457515
              Encrypted:false
              SSDEEP:3:Tuekk9NJtHFfs1XsExen:qeVJ8u
              MD5:8F4510F128F81A8BAF2A345D00F7E30C
              SHA1:8C711E6C484881ECDC83B6BDAC41C7A19EDE9C37
              SHA-256:15AA8B35FC5F139EF0B0FBC641CAA862AED19674625B81D1DC63467BC0AAFED9
              SHA-512:78695E5E2337703757903B8452E31A98F860022B04972651212C3004FEBE29017380A8BCA9FCCFD935DE00D8BD73AA556C30A3CEA5FC76E7ADF7E7763D68E78F
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation..
              Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:ASCII text, with very long lines (28591), with CRLF line terminators
              Category:dropped
              Size (bytes):20971520
              Entropy (8bit):0.21727367142804946
              Encrypted:false
              SSDEEP:1536:oIrA8wUcWI0IXkoRoGK5jMmsguNOVkwSET+VHleYzW9X5PjTS8GcGUdQvUBoBkBc:PAuRIXIGK6yunUrV6wBtKqV
              MD5:DF7AA960D9C915EDAA859859450F07A9
              SHA1:7C9E1055868D085CEBF802BCAB761E87A9EFC0C9
              SHA-256:AF6700F04F03723E891685673778B53D45A5A38F786660D64DD69F7359FC41E7
              SHA-512:FA2AF3BCE41E2F7986889217BB19C569446DCD1852BBD67CFD8C8E235CF77FEA34845635C15BCA908AA7F74C1444032AE3BC3871CC73063F5776389B511F8E72
              Malicious:false
              Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation..04/02/2025 06:53:14.556.EXCEL (0x9A8).0xF68.Microsoft Excel.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Experimentation.FeatureQueryBatched","Flags":33777005812056321,"InternalSequenceNumber":17,"Time":"2025-04-02T06:53:14.556Z","Data.Sequence":0,"Data.Count":128,"Data.Features":"[ { \"ID\" : 1, \"N\" : \"Microsoft.Office.Telemetry.TrackCPSWrites\", \"V\" : false, \"S\" : 1, \"P\" : 0, \"T\" : \"2025-04-02T06:53:13.9786646Z\", \"C\" : \"33\", \"Q\" : 0.0, \"M\" : 0, \"F\" : 5 }, { \"ID\" : 1, \"N\" : \"Microsoft.Office.Telemetry.CPSMaxWrites\", \"V\" : 2, \"S\" : 1, \"P\" : 0, \"T\" : \"2025-04-02T06:53:13.9786646Z\", \"C\" : \"33\", \"Q\" : 0.0, \"M\" : 0, \"F\" : 5 }, { \"ID\" : 1, \"N\" : \"Microsoft.Office.Word.UAEOnSafeModeEnabled\", \"V\" : true, \"S\" : 1, \"P\" : 0, \"T\" : \"2025-04-02T06:53:13.9786646Z\", \"C\" : \"\", \"Q\" : 8.0, \"M\" : 0, \"F\" : 5, \"G\" : \"Opt\" }, { \"ID\" : 1, \"N\
              Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:data
              Category:dropped
              Size (bytes):20971520
              Entropy (8bit):0.0
              Encrypted:false
              SSDEEP:3::
              MD5:8F4E33F3DC3E414FF94E5FB6905CBA8C
              SHA1:9674344C90C2F0646F0B78026E127C9B86E3AD77
              SHA-256:CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC
              SHA-512:7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB
              Malicious:false
              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:ASCII text, with very long lines (28645), with CRLF line terminators
              Category:dropped
              Size (bytes):261760
              Entropy (8bit):5.15165719899675
              Encrypted:false
              SSDEEP:
              MD5:49A0FAC1CCB29A2AFBB703BA737ED564
              SHA1:20AA1D3D00AA8D8AA619A70CB715749D53E26A13
              SHA-256:418911C926C68811D7EA3AE64D5AB7346F9D1424F61F76D90EE7118FD815A558
              SHA-512:5A1E8C58A7215852E254472C5372D091AC197E82A0DDA351108CCE76D123B14B026FEA9CDA53B4B6A074C4C127B3CD216027B299766381588C72436DBAA67634
              Malicious:false
              Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation..04/02/2025 06:54:26.665.EXCEL (0x1118).0x1078.Microsoft Excel.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Experimentation.FeatureQueryBatched","Flags":33777005812056321,"InternalSequenceNumber":19,"Time":"2025-04-02T06:54:26.649Z","Data.Sequence":0,"Data.Count":128,"Data.Features":"[ { \"ID\" : 1, \"N\" : \"Microsoft.Office.Telemetry.TrackCPSWrites\", \"V\" : false, \"S\" : 1, \"P\" : 0, \"T\" : \"2025-04-02T06:54:26.1027969Z\", \"C\" : \"33\", \"Q\" : 0.0, \"M\" : 0, \"F\" : 5 }, { \"ID\" : 1, \"N\" : \"Microsoft.Office.Telemetry.CPSMaxWrites\", \"V\" : 2, \"S\" : 1, \"P\" : 0, \"T\" : \"2025-04-02T06:54:26.1027969Z\", \"C\" : \"33\", \"Q\" : 0.0, \"M\" : 0, \"F\" : 5 }, { \"ID\" : 1, \"N\" : \"Microsoft.Office.Word.UAEOnSafeModeEnabled\", \"V\" : true, \"S\" : 1, \"P\" : 0, \"T\" : \"2025-04-02T06:54:26.1027969Z\", \"C\" : \"\", \"Q\" : 6.0, \"M\" : 0, \"F\" : 5, \"G\" : \"Opt\" }, { \"ID\" : 1, \"
              Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:Composite Document File V2 Document, Cannot read section info
              Category:dropped
              Size (bytes):741888
              Entropy (8bit):7.980995296349493
              Encrypted:false
              SSDEEP:
              MD5:1162EA74CB48B35B5CC367F1EA573DBD
              SHA1:0FF674BFCF1710F2F6A980FBCFB02551A4C70211
              SHA-256:2FDE7A58845B940C2D8339C5C65C6333365AC0163DA3181BB58111D844A6004F
              SHA-512:28E3D460C393FE2941A8DC7263353EA87302A32221FE38AEBFCE2814300EB8591FF45674F78B7E4D1F99530AC35E23C3F94F1B77F7F6084C25D8677DC476B835
              Malicious:false
              Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
              Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:data
              Category:dropped
              Size (bytes):749568
              Entropy (8bit):7.940585858130725
              Encrypted:false
              SSDEEP:
              MD5:5C868F4E36DA83D7F8C160A5D6A4E9CF
              SHA1:AB16D565FD140E110C207072B6DEEE560980BAB8
              SHA-256:60E15524547EBE632CC067ED61EA858904EC6F40BF77C534A2A74F6FC5DE53DC
              SHA-512:1BAF49C7991DFA6BA32BD5E0DB041E9702FD84CBF676773C6F60A2F350396FFF49097ED5657F47117AFE7EDC5F7C271695FD0217300C1C1D30822BC8F2814957
              Malicious:false
              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:data
              Category:dropped
              Size (bytes):512
              Entropy (8bit):0.0
              Encrypted:false
              SSDEEP:
              MD5:BF619EAC0CDF3F68D496EA9344137E8B
              SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
              SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
              SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
              Malicious:false
              Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Wed Apr 2 07:54:24 2025, Security: 1
              Category:dropped
              Size (bytes):986112
              Entropy (8bit):7.984715724320225
              Encrypted:false
              SSDEEP:
              MD5:871FCE00052C054D1EE442E122A8B916
              SHA1:AB2CFC89366991925FBE82A492622EEEB1762B14
              SHA-256:6D7CBA55AC7A27FF5E23C1563F6227CC36DE06B535B7A7DC44322A3311501827
              SHA-512:9B61223AB00EE6323549D7A75962271EEE283B76361C0803F0443006C7FB8E67F9DC77F411B68A452D5073AF9E474B057B39CB9A5C83C85C98203862C5DCA5C5
              Malicious:false
              Preview:......................>.......................................................................................................g.......i................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
              Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):26
              Entropy (8bit):3.95006375643621
              Encrypted:false
              SSDEEP:
              MD5:187F488E27DB4AF347237FE461A079AD
              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
              Malicious:false
              Preview:[ZoneTransfer]....ZoneId=0
              Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Wed Apr 2 07:54:24 2025, Security: 1
              Category:dropped
              Size (bytes):986112
              Entropy (8bit):7.984715724320225
              Encrypted:false
              SSDEEP:
              MD5:871FCE00052C054D1EE442E122A8B916
              SHA1:AB2CFC89366991925FBE82A492622EEEB1762B14
              SHA-256:6D7CBA55AC7A27FF5E23C1563F6227CC36DE06B535B7A7DC44322A3311501827
              SHA-512:9B61223AB00EE6323549D7A75962271EEE283B76361C0803F0443006C7FB8E67F9DC77F411B68A452D5073AF9E474B057B39CB9A5C83C85C98203862C5DCA5C5
              Malicious:false
              Preview:......................>.......................................................................................................g.......i................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
              Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
              File Type:data
              Category:dropped
              Size (bytes):165
              Entropy (8bit):1.4134958568691696
              Encrypted:false
              SSDEEP:
              MD5:8B6F49EF043D1AF562C216108A13E0F2
              SHA1:0106337F6D46E83B30CA7C1563C3FC3AF4209AF3
              SHA-256:C80D5433620A06CF252C9489F9A46BA091A5DAA239AAC3A98DB918627DEFF314
              SHA-512:241592FDA43D686AF92D22B2B451C51E70B742A5C33FA94307613155906396A53501E05719DD568C3D3C8088B95B83D7E98393B3692EB4B01907FE8BD927E896
              Malicious:true
              Preview:.user ..M.a.o.g.a. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
              File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Wed Apr 2 04:17:45 2025, Security: 1
              Entropy (8bit):7.982236826273992
              TrID:
              • Microsoft Excel sheet (30009/1) 47.99%
              • Microsoft Excel sheet (alternate) (24509/1) 39.20%
              • Generic OLE2 / Multistream Compound File (8008/1) 12.81%
              File name:Inquiry-140-120.xla.xlsx
              File size:1'208'832 bytes
              MD5:184b186803e3cd34f34952ade6ed8f1d
              SHA1:ae81de594f4f3b1e32eb5e5291fb28c3343a420c
              SHA256:9ed36f226beb7031af2c4fc6beea0aa61180d56b4649acda65927c8b2aba7f90
              SHA512:054f22dc598fcaeef2585c53705208d0bf142386c6ab56d847b082948141a802f20a55b3382c3b252bb52a407931156577fcabc9deed647a52ae462b8a057bd3
              SSDEEP:24576:g6gA1jj+NpBQ2Ge9lkaWnBMlss4sFyzF/50Vc865eRuv:g6gAV+/BQzaWnBKPFy5/5oc865eg
              TLSH:AC452354B8AAD309D21384B191B3C8750A21BDE53A8EC5933BCD7B1D7132574BB9BC2E
              File Content Preview:........................>.......................................................................................................}...............a..............................................................................................................
              Icon Hash:35e58a8c0c8a85b9
              Document Type:OLE
              Number of OLE Files:1
              Has Summary Info:
              Application Name:Microsoft Excel
              Encrypted Document:True
              Contains Word Document Stream:False
              Contains Workbook/Book Stream:True
              Contains PowerPoint Document Stream:False
              Contains Visio Document Stream:False
              Contains ObjectPool Stream:False
              Flash Objects Count:0
              Contains VBA Macros:True
              Code Page:1252
              Author:
              Last Saved By:
              Create Time:2006-09-16 00:00:00
              Last Saved Time:2025-04-02 03:17:45
              Creating Application:Microsoft Excel
              Security:1
              Document Code Page:1252
              Thumbnail Scaling Desired:False
              Contains Dirty Links:False
              Shared Document:False
              Changed Hyperlinks:False
              Application Version:786432
              General
              Stream Path:_VBA_PROJECT_CUR/VBA/Sheet1
              VBA File Name:Sheet1.cls
              Stream Size:977
              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . I . . . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 2 . 0 . -
              Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 49 13 e1 18 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
              Attribute VB_Name = "Sheet1"
              Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"
              Attribute VB_GlobalNameSpace = False
              Attribute VB_Creatable = False
              Attribute VB_PredeclaredId = True
              Attribute VB_Exposed = True
              Attribute VB_TemplateDerived = False
              Attribute VB_Customizable = True
              

              General
              Stream Path:_VBA_PROJECT_CUR/VBA/Sheet2
              VBA File Name:Sheet2.cls
              Stream Size:977
              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . I . : . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 2 . 0 . -
              Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 49 13 b2 3a 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
              Attribute VB_Name = "Sheet2"
              Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"
              Attribute VB_GlobalNameSpace = False
              Attribute VB_Creatable = False
              Attribute VB_PredeclaredId = True
              Attribute VB_Exposed = True
              Attribute VB_TemplateDerived = False
              Attribute VB_Customizable = True
              

              General
              Stream Path:_VBA_PROJECT_CUR/VBA/Sheet3
              VBA File Name:Sheet3.cls
              Stream Size:977
              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . I . p 1 . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 2 . 0 .
              Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 49 13 70 31 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
              Attribute VB_Name = "Sheet3"
              Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"
              Attribute VB_GlobalNameSpace = False
              Attribute VB_Creatable = False
              Attribute VB_PredeclaredId = True
              Attribute VB_Exposed = True
              Attribute VB_TemplateDerived = False
              Attribute VB_Customizable = True
              

              General
              Stream Path:_VBA_PROJECT_CUR/VBA/ThisWorkbook
              VBA File Name:ThisWorkbook.cls
              Stream Size:985
              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . I . " . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 1 . 9 . -
              Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 49 13 a5 22 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
              Attribute VB_Name = "ThisWorkbook"
              Attribute VB_Base = "0{00020819-0000-0000-C000-000000000046}"
              Attribute VB_GlobalNameSpace = False
              Attribute VB_Creatable = False
              Attribute VB_PredeclaredId = True
              Attribute VB_Exposed = True
              Attribute VB_TemplateDerived = False
              Attribute VB_Customizable = True
              

              General
              Stream Path:\x1CompObj
              CLSID:
              File Type:data
              Stream Size:114
              Entropy:4.25248375192737
              Base64 Encoded:True
              Data ASCII:. . . . . . . . . . . . . . . . . . . F & . . . M i c r o s o f t O f f i c e E x c e l 2 0 0 3 W o r k s h e e t . . . . . B i f f 8 . . . . . E x c e l . S h e e t . 8 . 9 q . . . . . . . . . . . .
              Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 26 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 32 30 30 33 20 57 6f 72 6b 73 68 65 65 74 00 06 00 00 00 42 69 66 66 38 00 0e 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
              General
              Stream Path:\x5DocumentSummaryInformation
              CLSID:
              File Type:data
              Stream Size:244
              Entropy:2.889430592781307
              Base64 Encoded:False
              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , 0 . . . . . . . . . . . . . . H . . . . . . . P . . . . . . . X . . . . . . . ` . . . . . . . h . . . . . . . p . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S h e e t 1 . . . . . S h e e t 2 . . . . . S h e e t 3 . . . . . . . . . . . . . . . . . W o r k s h e e t s . . . . . . . . .
              Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 c4 00 00 00 08 00 00 00 01 00 00 00 48 00 00 00 17 00 00 00 50 00 00 00 0b 00 00 00 58 00 00 00 10 00 00 00 60 00 00 00 13 00 00 00 68 00 00 00 16 00 00 00 70 00 00 00 0d 00 00 00 78 00 00 00 0c 00 00 00 a1 00 00 00 02 00 00 00 e4 04 00 00
              General
              Stream Path:\x5SummaryInformation
              CLSID:
              File Type:data
              Stream Size:200
              Entropy:3.292068105701867
              Base64 Encoded:False
              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . + ' 0 . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . T . . . . . . . ` . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . | . # . @ . . . h } . . . . . . . . .
              Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 98 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 54 00 00 00 12 00 00 00 60 00 00 00 0c 00 00 00 78 00 00 00 0d 00 00 00 84 00 00 00 13 00 00 00 90 00 00 00 02 00 00 00 e4 04 00 00 1e 00 00 00 04 00 00 00
              General
              Stream Path:MBD004F80F3/\x1CompObj
              CLSID:
              File Type:data
              Stream Size:99
              Entropy:3.631242196770981
              Base64 Encoded:False
              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . ! . . . M i c r o s o f t O f f i c e E x c e l W o r k s h e e t . . . . . E x c e l M L 1 2 . . . . . 9 q . . . . . . . . . . . .
              Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 21 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 57 6f 72 6b 73 68 65 65 74 00 0a 00 00 00 45 78 63 65 6c 4d 4c 31 32 00 00 00 00 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
              General
              Stream Path:MBD004F80F3/Package
              CLSID:
              File Type:Microsoft Excel 2007+
              Stream Size:758888
              Entropy:7.989909275240376
              Base64 Encoded:True
              Data ASCII:P K . . . . . . . . . . ! . 9 | . . . . . . . . . . [ C o n t e n t _ T y p e s ] . x m l . ( . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
              Data Raw:50 4b 03 04 14 00 06 00 08 00 00 00 21 00 db 39 7c be ae 01 00 00 0e 06 00 00 13 00 d4 01 5b 43 6f 6e 74 65 6e 74 5f 54 79 70 65 73 5d 2e 78 6d 6c 20 a2 d0 01 28 a0 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
              General
              Stream Path:MBD004F80F4/\x1Ole
              CLSID:
              File Type:data
              Stream Size:846
              Entropy:4.283897110500678
              Base64 Encoded:False
              Data ASCII:. . . . ? k G . 3 . . . . . . . . . . . . . . . . y . . . K . . . . . h . t . t . p . s . : . / . / . L . i . n . k . e . d . i . n . d . f . k . s . d . j . k . f . w . e . i . f . g . j . h . d . f . h . g . j . u . h . u . e . g . f . d . j . g . h . j . f . h . j . g . h . d . f . j . g . h . h . u . h . f . d . g . j . h . j . f . h . g . g . j . h . f . g . u . h . d . f . j . g . j . f . f . h . j . h . g . h . j . v . c . u . b . r . e . j . h . h . . . d . O . C . @ . k . u . h . l . i . n . k . s
              Data Raw:01 00 00 02 ff 3f 6b 47 a8 b0 00 33 00 00 00 00 00 00 00 00 00 00 00 00 18 01 00 00 e0 c9 ea 79 f9 ba ce 11 8c 82 00 aa 00 4b a9 0b 14 01 00 00 68 00 74 00 74 00 70 00 73 00 3a 00 2f 00 2f 00 4c 00 69 00 6e 00 6b 00 65 00 64 00 69 00 6e 00 64 00 66 00 6b 00 73 00 64 00 6a 00 6b 00 66 00 77 00 65 00 69 00 66 00 67 00 6a 00 68 00 64 00 66 00 68 00 67 00 6a 00 75 00 68 00 75 00 65 00
              General
              Stream Path:Workbook
              CLSID:
              File Type:Applesoft BASIC program data, first line number 16
              Stream Size:425943
              Entropy:7.999116372245071
              Base64 Encoded:True
              Data ASCII:. . . . . . . . . . . . . . . . . / . 6 . . . . . . . . " * j : _ h . . ~ ; % ~ . _ S . & $ . > = A . . . . . . . . . . . . . \\ . p . 9 . . . ] C . | g . S = . e C . p . @ . c , . [ . . c . . Z ` . a . Y > * . / 4 } X . . . . . c + & l 6 . . w b - 2 . B . . . E a . . . < . . . = . . . 3 . Z . . . . . X . . p : . . . . . . . . . . . . . . . . . . K . . . $ . . . _ . = . . . U g f 4 < c . Z G . @ . . . F . . . . " . . . . . . . . . y . . . . . . Z 1 . . . ? z . * K . . Y . V . C 3 J . _ C 1 . . . . M . _ . _
              Data Raw:09 08 10 00 00 06 05 00 ab 1f cd 07 c1 00 01 00 06 04 00 00 2f 00 36 00 01 00 01 00 01 00 0c 96 22 2a a1 f9 6a 3a a5 a7 5f d6 68 08 f4 18 c1 f2 c1 ad 7e 3b 25 9e 7e a8 ad b0 a1 b5 cd ca 9c 88 e9 5f 86 bd 53 0d 26 fd 24 01 3e 84 3d 41 87 00 00 00 e1 00 02 00 b0 04 c1 00 02 00 b0 f1 e2 00 00 00 5c 00 70 00 39 b3 83 9c 9c 10 f9 9b c7 11 d3 8f 5d 43 dd 1a 7c 67 8c 05 53 3d d0 97 b3 94
              General
              Stream Path:_VBA_PROJECT_CUR/PROJECT
              CLSID:
              File Type:ASCII text, with CRLF line terminators
              Stream Size:517
              Entropy:5.22331819792307
              Base64 Encoded:True
              Data ASCII:I D = " { 4 0 A 3 7 9 4 A - 6 2 D 4 - 4 9 F 2 - 8 6 1 E - B F F 3 8 6 B 5 0 5 1 C } " . . D o c u m e n t = T h i s W o r k b o o k / & H 0 0 0 0 0 0 0 0 . . D o c u m e n t = S h e e t 1 / & H 0 0 0 0 0 0 0 0 . . D o c u m e n t = S h e e t 2 / & H 0 0 0 0 0 0 0 0 . . D o c u m e n t = S h e e t 3 / & H 0 0 0 0 0 0 0 0 . . N a m e = " V B A P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " B 1 B 3 6 0 8 0 6 4 8 0 6 4 8 0 6
              Data Raw:49 44 3d 22 7b 34 30 41 33 37 39 34 41 2d 36 32 44 34 2d 34 39 46 32 2d 38 36 31 45 2d 42 46 46 33 38 36 42 35 30 35 31 43 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d 54 68 69 73 57 6f 72 6b 62 6f 6f 6b 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 44 6f 63 75 6d 65 6e 74 3d 53 68 65 65 74 31 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 44 6f 63 75 6d 65 6e 74 3d 53 68 65 65 74 32 2f 26 48 30 30 30
              General
              Stream Path:_VBA_PROJECT_CUR/PROJECTwm
              CLSID:
              File Type:data
              Stream Size:104
              Entropy:3.0488640812019017
              Base64 Encoded:False
              Data ASCII:T h i s W o r k b o o k . T . h . i . s . W . o . r . k . b . o . o . k . . . S h e e t 1 . S . h . e . e . t . 1 . . . S h e e t 2 . S . h . e . e . t . 2 . . . S h e e t 3 . S . h . e . e . t . 3 . . . . .
              Data Raw:54 68 69 73 57 6f 72 6b 62 6f 6f 6b 00 54 00 68 00 69 00 73 00 57 00 6f 00 72 00 6b 00 62 00 6f 00 6f 00 6b 00 00 00 53 68 65 65 74 31 00 53 00 68 00 65 00 65 00 74 00 31 00 00 00 53 68 65 65 74 32 00 53 00 68 00 65 00 65 00 74 00 32 00 00 00 53 68 65 65 74 33 00 53 00 68 00 65 00 65 00 74 00 33 00 00 00 00 00
              General
              Stream Path:_VBA_PROJECT_CUR/VBA/_VBA_PROJECT
              CLSID:
              File Type:data
              Stream Size:2644
              Entropy:3.9805586022967634
              Base64 Encoded:False
              Data ASCII:a . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . * . \\ . G . { . 0 . 0 . 0 . 2 . 0 . 4 . E . F . - . 0 . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . - . C . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 4 . 6 . } . # . 4 . . . 0 . # . 9 . # . C . : . \\ . P . R . O . G . R . A . ~ . 2 . \\ . C . O . M . M . O . N . ~ . 1 . \\ . M . I . C . R . O . S . ~ . 1 . \\ . V . B . A . \\ . V . B . A . 6 . \\ . V . B . E . 6 . . . D . L . L . # . V . i . s . u . a . l . . B . a . s . i . c . . F . o . r .
              Data Raw:cc 61 88 00 00 01 00 ff 09 40 00 00 09 04 00 00 e4 04 01 00 00 00 00 00 00 00 00 00 01 00 04 00 02 00 fa 00 2a 00 5c 00 47 00 7b 00 30 00 30 00 30 00 32 00 30 00 34 00 45 00 46 00 2d 00 30 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 2d 00 43 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 34 00 36 00 7d 00 23 00 34 00 2e 00 30 00 23 00
              General
              Stream Path:_VBA_PROJECT_CUR/VBA/dir
              CLSID:
              File Type:data
              Stream Size:553
              Entropy:6.3664341854159625
              Base64 Encoded:True
              Data ASCII:. % . . . . . . . . 0 * . . . . p . . H . . . . d . . . . . . . V B A P r o j e c t . . 4 . . @ . . j . . . = . . . . r . . . . . . . . . 9 . j . . . . J < . . . . . r s t d o l e > . . . s . t . d . o . l . e . . . h . % . ^ . . * \\ G { 0 0 0 2 0 4 3 0 - . . . . . C . . . . . . 0 0 4 . 6 } # 2 . 0 # 0 . # C : \\ W i n d . o w s \\ S y s W O W 6 4 \\ . e 2 . . t l b # O L E . A u t o m a t i . o n . ` . . E O f f D i c E O . f . i . c E . . E . 2 D F 8 D 0 4 C . - 5 B F A - 1 0 1 B - B D E 5 E A A C 4 . 2
              Data Raw:01 25 b2 80 01 00 04 00 00 00 01 00 30 2a 02 02 90 09 00 70 14 06 48 03 00 82 02 00 64 e4 04 04 00 0a 00 1c 00 56 42 41 50 72 6f 6a 65 88 63 74 05 00 34 00 00 40 02 14 6a 06 02 0a 3d 02 0a 07 02 72 01 14 08 05 06 12 09 02 12 ee 39 04 6a 08 94 00 0c 02 4a 3c 02 0a 16 00 01 72 80 73 74 64 6f 6c 65 3e 02 19 00 73 00 74 00 64 00 6f 00 80 6c 00 65 00 0d 00 68 00 25 02 5e 00 03 2a 5c 47

              Download Network PCAP: filteredfull

              • Total Packets: 20
              • 443 (HTTPS)
              • 53 (DNS)
              TimestampSource PortDest PortSource IPDest IP
              Apr 2, 2025 08:54:22.407891989 CEST60845443192.168.2.2413.107.246.40
              Apr 2, 2025 08:54:22.407911062 CEST60844443192.168.2.2413.107.246.40
              Apr 2, 2025 08:54:22.407938004 CEST4436084513.107.246.40192.168.2.24
              Apr 2, 2025 08:54:22.407995939 CEST4436084413.107.246.40192.168.2.24
              Apr 2, 2025 08:54:22.408031940 CEST60845443192.168.2.2413.107.246.40
              Apr 2, 2025 08:54:22.408068895 CEST60844443192.168.2.2413.107.246.40
              Apr 2, 2025 08:54:22.408525944 CEST60845443192.168.2.2413.107.246.40
              Apr 2, 2025 08:54:22.408545971 CEST4436084513.107.246.40192.168.2.24
              Apr 2, 2025 08:54:22.408672094 CEST60844443192.168.2.2413.107.246.40
              Apr 2, 2025 08:54:22.408704996 CEST4436084413.107.246.40192.168.2.24
              Apr 2, 2025 08:54:22.696944952 CEST4436084513.107.246.40192.168.2.24
              Apr 2, 2025 08:54:22.697031021 CEST60845443192.168.2.2413.107.246.40
              Apr 2, 2025 08:54:22.699579000 CEST60845443192.168.2.2413.107.246.40
              Apr 2, 2025 08:54:22.699594021 CEST4436084513.107.246.40192.168.2.24
              Apr 2, 2025 08:54:22.699911118 CEST4436084513.107.246.40192.168.2.24
              Apr 2, 2025 08:54:22.700938940 CEST60845443192.168.2.2413.107.246.40
              Apr 2, 2025 08:54:22.702430964 CEST4436084413.107.246.40192.168.2.24
              Apr 2, 2025 08:54:22.702507019 CEST60844443192.168.2.2413.107.246.40
              Apr 2, 2025 08:54:22.704274893 CEST60844443192.168.2.2413.107.246.40
              Apr 2, 2025 08:54:22.704283953 CEST4436084413.107.246.40192.168.2.24
              Apr 2, 2025 08:54:22.704602003 CEST4436084413.107.246.40192.168.2.24
              Apr 2, 2025 08:54:22.705414057 CEST60844443192.168.2.2413.107.246.40
              Apr 2, 2025 08:54:22.744281054 CEST4436084513.107.246.40192.168.2.24
              Apr 2, 2025 08:54:22.752270937 CEST4436084413.107.246.40192.168.2.24
              Apr 2, 2025 08:54:22.913803101 CEST4436084413.107.246.40192.168.2.24
              Apr 2, 2025 08:54:22.913876057 CEST4436084413.107.246.40192.168.2.24
              Apr 2, 2025 08:54:22.913948059 CEST60844443192.168.2.2413.107.246.40
              Apr 2, 2025 08:54:22.913983107 CEST4436084413.107.246.40192.168.2.24
              Apr 2, 2025 08:54:22.917323112 CEST60844443192.168.2.2413.107.246.40
              Apr 2, 2025 08:54:22.917323112 CEST60844443192.168.2.2413.107.246.40
              Apr 2, 2025 08:54:22.917354107 CEST4436084413.107.246.40192.168.2.24
              Apr 2, 2025 08:54:22.917771101 CEST4436084413.107.246.40192.168.2.24
              Apr 2, 2025 08:54:22.917856932 CEST4436084413.107.246.40192.168.2.24
              Apr 2, 2025 08:54:22.917969942 CEST60844443192.168.2.2413.107.246.40
              Apr 2, 2025 08:54:23.202601910 CEST4436084513.107.246.40192.168.2.24
              Apr 2, 2025 08:54:23.202783108 CEST4436084513.107.246.40192.168.2.24
              Apr 2, 2025 08:54:23.203583002 CEST60845443192.168.2.2413.107.246.40
              Apr 2, 2025 08:54:23.203649998 CEST60845443192.168.2.2413.107.246.40
              Apr 2, 2025 08:54:23.203669071 CEST4436084513.107.246.40192.168.2.24
              Apr 2, 2025 08:54:23.203677893 CEST60845443192.168.2.2413.107.246.40
              Apr 2, 2025 08:54:23.203682899 CEST4436084513.107.246.40192.168.2.24
              TimestampSource PortDest PortSource IPDest IP
              Apr 2, 2025 08:54:22.286118984 CEST5575653192.168.2.241.1.1.1
              Apr 2, 2025 08:54:22.406692982 CEST53557561.1.1.1192.168.2.24
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Apr 2, 2025 08:54:22.286118984 CEST192.168.2.241.1.1.10xbf04Standard query (0)otelrules.svc.static.microsoftA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Apr 2, 2025 08:53:17.866564035 CEST1.1.1.1192.168.2.240x8291No error (0)ecs-office.s-0005.dual-s-msedge.nets-0005.dual-s-msedge.netCNAME (Canonical name)IN (0x0001)false
              Apr 2, 2025 08:53:17.866564035 CEST1.1.1.1192.168.2.240x8291No error (0)s-0005.dual-s-msedge.net52.123.128.14A (IP address)IN (0x0001)false
              Apr 2, 2025 08:53:17.866564035 CEST1.1.1.1192.168.2.240x8291No error (0)s-0005.dual-s-msedge.net52.123.129.14A (IP address)IN (0x0001)false
              Apr 2, 2025 08:54:12.691312075 CEST1.1.1.1192.168.2.240xc55cNo error (0)res-stls-prod.edgesuite.net.globalredir.akadns88.neta726.dscd.akamai.netCNAME (Canonical name)IN (0x0001)false
              Apr 2, 2025 08:54:12.691312075 CEST1.1.1.1192.168.2.240xc55cNo error (0)a726.dscd.akamai.net23.200.0.22A (IP address)IN (0x0001)false
              Apr 2, 2025 08:54:12.691312075 CEST1.1.1.1192.168.2.240xc55cNo error (0)a726.dscd.akamai.net23.200.0.21A (IP address)IN (0x0001)false
              Apr 2, 2025 08:54:22.406692982 CEST1.1.1.1192.168.2.240xbf04No error (0)otelrules.svc.static.microsoftotelrules-bzhndjfje8dvh5fd.z01.azurefd.netCNAME (Canonical name)IN (0x0001)false
              Apr 2, 2025 08:54:22.406692982 CEST1.1.1.1192.168.2.240xbf04No error (0)otelrules-bzhndjfje8dvh5fd.z01.azurefd.netstar-azurefd-prod.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
              Apr 2, 2025 08:54:22.406692982 CEST1.1.1.1192.168.2.240xbf04No error (0)star-azurefd-prod.trafficmanager.netshed.dual-low.s-part-0012.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
              Apr 2, 2025 08:54:22.406692982 CEST1.1.1.1192.168.2.240xbf04No error (0)shed.dual-low.s-part-0012.t-0009.t-msedge.nets-part-0012.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
              Apr 2, 2025 08:54:22.406692982 CEST1.1.1.1192.168.2.240xbf04No error (0)s-part-0012.t-0009.t-msedge.net13.107.246.40A (IP address)IN (0x0001)false
              Apr 2, 2025 08:54:29.085678101 CEST1.1.1.1192.168.2.240xeb2dNo error (0)res-stls-prod.edgesuite.net.globalredir.akadns88.neta726.dscd.akamai.netCNAME (Canonical name)IN (0x0001)false
              Apr 2, 2025 08:54:29.085678101 CEST1.1.1.1192.168.2.240xeb2dNo error (0)a726.dscd.akamai.net23.200.0.22A (IP address)IN (0x0001)false
              Apr 2, 2025 08:54:29.085678101 CEST1.1.1.1192.168.2.240xeb2dNo error (0)a726.dscd.akamai.net23.200.0.21A (IP address)IN (0x0001)false
              • otelrules.svc.static.microsoft
              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              0192.168.2.246084513.107.246.404432472C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
              TimestampBytes transferredDirectionData
              2025-04-02 06:54:22 UTC214OUTGET /rules/rule170146v0s19.xml HTTP/1.1
              Connection: Keep-Alive
              Accept-Encoding: gzip
              User-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.18129; Pro)
              Host: otelrules.svc.static.microsoft
              2025-04-02 06:54:23 UTC471INHTTP/1.1 200 OK
              Date: Wed, 02 Apr 2025 06:54:23 GMT
              Content-Type: text/xml
              Content-Length: 461
              Connection: close
              Cache-Control: public, max-age=604800, immutable
              Last-Modified: Thu, 14 Nov 2024 16:14:57 GMT
              ETag: "0x8DD04C77BDE7614"
              x-ms-request-id: c2bc5d12-c01e-008d-029c-a32eec000000
              x-ms-version: 2018-03-28
              x-azure-ref: 20250402T065422Z-17cccd5449bxd7kxhC1EWRapns0000001520000000001ksk
              x-fd-int-roxy-purgeid: 0
              X-Cache: TCP_MISS
              Accept-Ranges: bytes
              2025-04-02 06:54:23 UTC461INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 37 30 31 34 36 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 47 72 61 70 68 69 63 73 2e 45 78 70 6f 72 74 42 75 6c 6c 65 74 42 6c 69 70 43 45 78 63 65 70 74 69 6f 6e 22 20 41 54 54 3d 22 63 66 63 66 64 62 39 31 63 36 38 63 34 33 32 39 62 62 38 62 37 63 62 37 62 61 62 62 33 63 66 37 2d 65 30 38 32 63 32 66 32 2d 65 66 31 64 2d 34 32 37 61 2d 61 63 34 64 2d 62 30 62 37 30 30 61 66 65 37 61 37 2d 37 36 35 35 22 20 44 43 61 3d 22 50 53 55 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 54 53 20 54 3d 22 31 22 20 49 64 3d 22 34 38 39 66 34 22 20
              Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="170146" V="0" DC="SM" EN="Office.Graphics.ExportBulletBlipCException" ATT="cfcfdb91c68c4329bb8b7cb7babb3cf7-e082c2f2-ef1d-427a-ac4d-b0b700afe7a7-7655" DCa="PSU" xmlns=""> <S> <UTS T="1" Id="489f4"


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              1192.168.2.246084413.107.246.404432472C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
              TimestampBytes transferredDirectionData
              2025-04-02 06:54:22 UTC215OUTGET /rules/rule120201v19s19.xml HTTP/1.1
              Connection: Keep-Alive
              Accept-Encoding: gzip
              User-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.18129; Pro)
              Host: otelrules.svc.static.microsoft
              2025-04-02 06:54:22 UTC495INHTTP/1.1 200 OK
              Date: Wed, 02 Apr 2025 06:54:22 GMT
              Content-Type: text/xml
              Content-Length: 2781
              Connection: close
              Vary: Accept-Encoding
              Cache-Control: public, max-age=604800, immutable
              Last-Modified: Tue, 31 Dec 2024 22:07:50 GMT
              ETag: "0x8DD29E791389B5C"
              x-ms-request-id: b139961b-301e-0000-489c-a3eecc000000
              x-ms-version: 2018-03-28
              x-azure-ref: 20250402T065422Z-17cccd5449bqvwqkhC1EWR1rfs000000150g000000004zms
              x-fd-int-roxy-purgeid: 0
              X-Cache: TCP_MISS
              Accept-Ranges: bytes
              2025-04-02 06:54:22 UTC2781INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 32 30 31 22 20 56 3d 22 31 39 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 53 79 73 74 65 6d 2e 53 79 73 74 65 6d 48 65 61 6c 74 68 55 73 61 67 65 2e 43 6c 69 63 6b 53 74 72 65 61 6d 22 20 41 54 54 3d 22 63 64 38 33 36 36 32 36 36 31 31 63 34 63 61 61 61 38 66 63 35 62 32 65 37 32 38 65 65 38 31 64 2d 33 62 36 64 36 63 34 35 2d 36 33 37 37 2d 34 62 66 35 2d 39 37 39 32 2d 64 62 66 38 65 31 38 38 31 30 38 38 2d 37 35 32 31 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 55 73 61 67 65 22 20 44 43 61 3d 22 50 53 55 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20
              Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120201" V="19" DC="SM" EN="Office.System.SystemHealthUsage.ClickStream" ATT="cd836626611c4caaa8fc5b2e728ee81d-3b6d6c45-6377-4bf5-9792-dbf8e1881088-7521" SP="CriticalUsage" DCa="PSU" xmlns=""> <RIS>


              050100s020406080100

              Click to jump to process

              050100s0.0050100150200250MB

              Click to jump to process

              • File
              • Registry

              Click to dive into process behavior distribution

              Target ID:0
              Start time:02:53:12
              Start date:02/04/2025
              Path:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
              Wow64 process (32bit):false
              Commandline:"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
              Imagebase:0x7ff612ea0000
              File size:70'082'712 bytes
              MD5 hash:F9F7B6C42211B06E7AC3E4B60AA8FB77
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:moderate
              Has exited:false
              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

              Target ID:15
              Start time:02:54:16
              Start date:02/04/2025
              Path:C:\Windows\splwow64.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\splwow64.exe 12288
              Imagebase:0x7ff649000000
              File size:192'512 bytes
              MD5 hash:AF4A7EBF6114EE9E6FBCC910EC3C96E6
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:moderate
              Has exited:false
              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

              Target ID:18
              Start time:02:54:25
              Start date:02/04/2025
              Path:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
              Wow64 process (32bit):false
              Commandline:"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\user\Desktop\Inquiry-140-120.xla.xlsx"
              Imagebase:0x7ff612ea0000
              File size:70'082'712 bytes
              MD5 hash:F9F7B6C42211B06E7AC3E4B60AA8FB77
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:moderate
              Has exited:true
              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

              Call Graph

              Hide Legend
              • Entrypoint
              • Decryption Function
              • Executed
              • Not Executed
              • Show Help
              callgraph 1 Error: Graph is empty

              Module: Sheet1

              Declaration
              LineContent
              1

              Attribute VB_Name = "Sheet1"

              2

              Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"

              3

              Attribute VB_GlobalNameSpace = False

              4

              Attribute VB_Creatable = False

              5

              Attribute VB_PredeclaredId = True

              6

              Attribute VB_Exposed = True

              7

              Attribute VB_TemplateDerived = False

              8

              Attribute VB_Customizable = True

              Module: Sheet2

              Declaration
              LineContent
              1

              Attribute VB_Name = "Sheet2"

              2

              Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"

              3

              Attribute VB_GlobalNameSpace = False

              4

              Attribute VB_Creatable = False

              5

              Attribute VB_PredeclaredId = True

              6

              Attribute VB_Exposed = True

              7

              Attribute VB_TemplateDerived = False

              8

              Attribute VB_Customizable = True

              Module: Sheet3

              Declaration
              LineContent
              1

              Attribute VB_Name = "Sheet3"

              2

              Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"

              3

              Attribute VB_GlobalNameSpace = False

              4

              Attribute VB_Creatable = False

              5

              Attribute VB_PredeclaredId = True

              6

              Attribute VB_Exposed = True

              7

              Attribute VB_TemplateDerived = False

              8

              Attribute VB_Customizable = True

              Module: ThisWorkbook

              Declaration
              LineContent
              1

              Attribute VB_Name = "ThisWorkbook"

              2

              Attribute VB_Base = "0{00020819-0000-0000-C000-000000000046}"

              3

              Attribute VB_GlobalNameSpace = False

              4

              Attribute VB_Creatable = False

              5

              Attribute VB_PredeclaredId = True

              6

              Attribute VB_Exposed = True

              7

              Attribute VB_TemplateDerived = False

              8

              Attribute VB_Customizable = True