Windows
Analysis Report
Becker Logistics, Inc. Rate Confirmation for order_ 2747476.eml
Overview
General Information
Detection
Score: | 48 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
OUTLOOK.EXE (PID: 6312 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \Root\Offi ce16\OUTLO OK.EXE" /e ml "C:\Use rs\user\De sktop\Beck er Logisti cs, Inc. R ate Confir mation for order_ 27 47476.eml" MD5: 91A5292942864110ED734005B7E005C0) ai.exe (PID: 6100 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \root\vfs\ ProgramFil esCommonX6 4\Microsof t Shared\O ffice16\ai .exe" "9FF B3030-A239 -4A5C-A8BA -7ED10F54B 49E" "BEB4 842B-5C57- 4C17-812D- 518B82A07A 12" "6312" "C:\Progr am Files ( x86)\Micro soft Offic e\Root\Off ice16\OUTL OOK.EXE" " WordCombin edFloatieL reOnline.o nnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD)
- cleanup
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
- • Phishing
- • Networking
- • System Summary
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Language, Device and Operating System Detection
Click to jump to signature section
Phishing |
---|
Source: | Joe Sandbox AI: |
Source: | Joe Sandbox AI: |
Source: | Classification: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Window found: | Jump to behavior |
Source: | Window detected: |
Source: | Key opened: | Jump to behavior |
Source: | Key value created or modified: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 21 Browser Extensions | 1 Process Injection | 1 Masquerading | OS Credential Dumping | 1 Process Discovery | Remote Services | Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Modify Registry | LSASS Memory | 12 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Process Injection | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 DLL Side-Loading | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
s-0005.dual-s-msedge.net | 52.123.128.14 | true | false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1658742 |
Start date and time: | 2025-04-07 22:59:40 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 3s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 14 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Becker Logistics, Inc. Rate Confirmation for order_ 2747476.eml |
Detection: | MAL |
Classification: | mal48.winEML@3/3@0/0 |
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, d llhost.exe, sppsvc.exe, SIHCli ent.exe, SgrmBroker.exe, conho st.exe, svchost.exe - Excluded IPs from analysis (wh
itelisted): 52.109.0.91, 23.20 6.121.14, 23.206.121.15, 51.11 6.246.106, 20.189.173.16, 52.1 23.128.14, 20.190.152.22, 52.1 49.20.212, 184.31.69.3, 172.20 2.163.200 - Excluded domains from analysis
(whitelisted): omex.cdn.offic e.net, ecs.office.com, fs.micr osoft.com, onedscolprdgwc06.ge rmanywestcentral.cloudapp.azur e.com, slscr.update.microsoft. com, prod.configsvc1.live.com. akadns.net, onedscolprdwus17.w estus.cloudapp.azure.com, mobi le.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.co m, dual-s-0005-office.config.s kype.com, login.live.com, otel rules.svc.static.microsoft, co nfig.officeapps.live.com, us.c onfigsvc1.live.com.akadns.net, wus-azsc-config.officeapps.li ve.com, officeclient.microsoft .com, ecs.office.trafficmanage r.net, omex.cdn.office.net.aka maized.net, mobile.events.data .trafficmanager.net, a1864.dsc d.akamai.net - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtQueryAttributesFile calls found. - Report size getting too big, t
oo many NtQueryValueKey calls found. - Report size getting too big, t
oo many NtReadVirtualMemory ca lls found.
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
s-0005.dual-s-msedge.net | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 102400 |
Entropy (8bit): | 4.462776527219168 |
Encrypted: | false |
SSDEEP: | 768:FWTOIEP397NQivyNlDa549EVlbMb96LaSdlaa4/2rmpXYhiKipYOflQWX1C1POaT:fh4IQb96LawX4i |
MD5: | 9E26733EA122C10CC0AE4FC398080462 |
SHA1: | 0E5CD3D8F10D3F98F0522E70ED05F6E8026E23C5 |
SHA-256: | BD9907C66A05DBD09B95F7B6DF3A98825BDEEC976C7618C6287A06EA6AD2910E |
SHA-512: | 9573E987A6F09F03CCBFAC85A5680A22093470EE289F4CCCC7BDEA8E062C21C31CF0E430AA7F6E8F6920F951C402A370A81DE75893544E52BF6AEE1EFD0BE14B |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 271360 |
Entropy (8bit): | 2.7859577714542687 |
Encrypted: | false |
SSDEEP: | 1536:I6O0KZMwHD1sVZWxehGUAqLn4CCp2ZW53jEpEHP4qQ10PAwrHZ/EW53jEpEHP4q5:g0Q1sfWcL4Ap98op9 |
MD5: | E263802AB57F4CFC7300AE692DE63A14 |
SHA1: | F3AA4983B24907064812847ED3A0DAF2F2BBDEC5 |
SHA-256: | 50B9AF332FBCD8C899EDEAF0BC1988F3518D0641DDC62A84A36F98461DD91945 |
SHA-512: | 34763BE1D05FC97A5F6C0076D75355A19304A160191321C8303F011C7DF20740ADF6D249E353370980180A52E65BD8495465C701F7B0DDCE57827D68526270A0 |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 131072 |
Entropy (8bit): | 3.1558762792152892 |
Encrypted: | false |
SSDEEP: | 1536:O8W53jEpEHP4qQ10PAwr1U/NJj7D4NW53jEpEHP4qQ10PAwrojwvhHR0:Oep9rwbp9v |
MD5: | 13141405BDA386B960DC27A44E08FD88 |
SHA1: | A8D080A81804320B532274EE933B13230BBF330A |
SHA-256: | 4E299D7FC08754C2CC287E8CE766F0CDEB71387AABEEFA27C3F61F234D6D4EAE |
SHA-512: | D5C2205BFD930C9276B90B55522DD756B5B72475F32F63C8BED5F66F74177BDAF1F90EC45472E3898F7751B3335327B81FA05C98F44D4C18D16C22A96EF6E2D0 |
Malicious: | true |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 5.572883936727022 |
TrID: | |
File name: | Becker Logistics, Inc. Rate Confirmation for order_ 2747476.eml |
File size: | 20'679 bytes |
MD5: | 3e2e0f0d8ef1b81a4801208c39b49cd3 |
SHA1: | c5e26813d36ac66664752d7c9c00259ef9f08b4f |
SHA256: | db7efa6460372e35189ed45bd11595f4cf626f3f4a13163e9807669520c29a06 |
SHA512: | dd7ef9c16509c96c43aa120b3b81adb6a601ab9a0d3fcfe51050d5cbb77717d8086672478d3ff801367068346f77a535ccbc20cc9b6032c192b3f6e211bc423b |
SSDEEP: | 384:Ivwc5t97gwkJYFyc6gf8/t4/vI++4/vOW4/vG/k4/v8iRRv4/vl/85u/qWfEZTnG:Ioc5t5BMYFIOFXr4le23 |
TLSH: | 8A922C1F59CB0D2210BEDD656F01AC38F397386E436A4191346F9447DB88F94FA8A2F9 |
File Content Preview: | Delivered-To: lena@deltagov.com..Received: by 2002:ab4:a190:0:b0:28c:be37:2e43 with SMTP id de16csp6754831ecb;.. Mon, 7 Apr 2025 12:19:39 -0700 (PDT)..X-Google-Smtp-Source: AGHT+IERxaZgAdnUmPqpiSSjpYi5XBc0URVilGsNik1bDAeyoIAHM+zOa4WiyPOKhRSOORENUgU |
Subject: | Becker Logistics, Inc. Rate Confirmation for order: 2747476 |
From: | "andrii.riashko@beckerlogistics.com" <andrii.riashko@beckerlogistics.com> |
To: | lena@deltagov.com |
Cc: | |
BCC: | |
Date: | Mon, 07 Apr 2025 14:19:33 -0500 |
Communications: |
|
Attachments: |
Key | Value |
---|---|
Delivered-To | lena@deltagov.com |
Received | from GO-APP07 (69.65.18.130) by SJ1PEPF00001CE8.mail.protection.outlook.com (10.167.242.24) with Microsoft SMTP Server id 15.20.8606.22 via Frontend Transport; Mon, 7 Apr 2025 19:19:35 +0000 |
X-Google-Smtp-Source | AGHT+IERxaZgAdnUmPqpiSSjpYi5XBc0URVilGsNik1bDAeyoIAHM+zOa4WiyPOKhRSOORENUgUG |
X-Received | by 2002:a05:690c:3686:b0:703:ac44:d37e with SMTP id 00721157ae682-703f42fc111mr180885847b3.37.1744053578829; Mon, 07 Apr 2025 12:19:38 -0700 (PDT) |
ARC-Seal | i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=jVz5QLMH6fGm+t5q2UU0fuOHTx17pvOm64gr1gwbrUtUBHMFfYx/EsVJ+5EsD7h1FSX0RgCxIUyhSbnPusL5GpYnz4BNTRhMAPp8alEpr8C9LG98dp7QafjbZkt6FGCVwPUsSzwDABja+ySHVmJDlqPPQz8VqARm4IafWr8nx0oTwA4Pw2T7ri0bDNoaWgHeTLWMiptkvLhrxv3t+MYYF/RLjIJ9vNgbmlVuSNg5uacBg5EWZDVfvKnQrF1jaX3COlIZOB5HqyL9X9jWLdddvENvvy6gJm/pdOhjXoBhyW7QEDRjnxbkqEQ38O0ZqnfmTlFr+s4FkIGM3kLAja1cuQ== |
ARC-Message-Signature | i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Pv9M6pEL5qrHNSH3Dx1YWLD1zdeaQarjz+rs0haUR2A=; b=HuD2wkncscVcCnQIA8xgo66staJJBXZTc68lJ5d1TVlbecxrfZnmOx/qQrhN64y1rl9nrjwEWaZpeXT9BqXOQ80NkEapFFMoNhFXtmnxXuA2N4u4gfFgCVF3PeFgcUI1afYcX11kBuh3wgYx3Pnx4wP+P7NS8ZYSuSs45d9NkeYa1YP8bu/ieHJFn8YtIPlpz3fkMA6PG1Hrw9nGJp53Pb+bn26GVVmzWD0q0MjO5Q81h64EZ/6IZDBHaWOfuY5PUKy+JkFnlFGItDKhaAzocsYaQfaT4yUIUSZAIIEO2g2Foy8UPH/5jzab/MCP847lNNm7svxG/cRGfdfUV6bCGA== |
ARC-Authentication-Results | i=1; mx.microsoft.com 1; spf=fail (sender ip is 69.65.18.130) smtp.rcpttodomain=deltagov.com smtp.mailfrom=beckerlogistics.com; dmarc=fail (p=none sp=none pct=100) action=none header.from=beckerlogistics.com; dkim=none (message not signed); arc=none (0) |
Return-Path | andrii.riashko@beckerlogistics.com |
Received-SPF | Fail (protection.outlook.com: domain of beckerlogistics.com does not designate 69.65.18.130 as permitted sender) receiver=protection.outlook.com; client-ip=69.65.18.130; helo=GO-APP07; |
Authentication-Results | mx.google.com; dkim=pass header.i=@beckerlogistics.onmicrosoft.com header.s=selector2-beckerlogistics-onmicrosoft-com header.b="kskYx/er"; arc=pass (i=1); spf=pass (google.com: domain of andrii.riashko@beckerlogistics.com designates 2a01:111:f403:200a::714 as permitted sender) smtp.mailfrom=andrii.riashko@beckerlogistics.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=beckerlogistics.com |
DKIM-Signature | v=1; a=rsa-sha256; c=relaxed/relaxed; d=beckerlogistics.onmicrosoft.com; s=selector2-beckerlogistics-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Pv9M6pEL5qrHNSH3Dx1YWLD1zdeaQarjz+rs0haUR2A=; b=kskYx/erjmEUG2NyvoLAYqN85QT8iSypuODvxJ+khLehIayzktFFg/dpJPZ66uAlzGRLicETYVfx3DPyupTP/rLJb7ctoLpCx2WJ3mY3PsHFEvDMm9xIMeTGZTp0yQbacgTWxpforSeuzL4Mmdl+PgtjJ8lctuSG9d+X57I/k/A= |
X-MS-Exchange-Authentication-Results | spf=fail (sender IP is 69.65.18.130) smtp.mailfrom=beckerlogistics.com; dkim=none (message not signed) header.d=none;dmarc=fail action=none header.from=beckerlogistics.com; |
From | "andrii.riashko@beckerlogistics.com" <andrii.riashko@beckerlogistics.com> |
Subject | Becker Logistics, Inc. Rate Confirmation for order: 2747476 |
To | lena@deltagov.com |
MIME-Version | 1.0 |
Sender | "andrii.riashko@beckerlogistics.com" <andrii.riashko@beckerlogistics.com> |
Reply-To | andrii.riashko@beckerlogistics.com |
Date | Mon, 07 Apr 2025 14:19:33 -0500 |
Message-ID | <202504071419302880.94@GO-APP07.gobecker.com> |
X-Mailer | emailit |
Content-Type | text/html; charset="utf-8" |
Content-Transfer-Encoding | quoted-printable |
Content-Disposition | inline |
X-EOPAttributedMessage | 0 |
X-MS-PublicTrafficType | |
X-MS-TrafficTypeDiagnostic | SJ1PEPF00001CE8:EE_|SA1PR16MB4825:EE_ |
X-MS-Office365-Filtering-Correlation-Id | b007c3e2-7fc1-4024-bb4b-08dd76092201 |
X-MS-Exchange-SenderADCheck | 1 |
X-MS-Exchange-AntiSpam-Relay | 0 |
X-Microsoft-Antispam | BCL:0;ARA:13230040|1032899013|1800799024|82310400026|376014|36860700013|69100299015|8096899003|2066899003; |
X-Microsoft-Antispam-Message-Info | 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 |
X-Forefront-Antispam-Report | CIP:69.65.18.130;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:GO-APP07;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(1032899013)(1800799024)(82310400026)(376014)(36860700013)(69100299015)(8096899003)(2066899003);DIR:OUT;SFP:1102; |
X-OriginatorOrg | beckerlogistics.com |
X-MS-Exchange-CrossTenant-OriginalArrivalTime | 07 Apr 2025 19:19:35.1300 (UTC) |
X-MS-Exchange-CrossTenant-Network-Message-Id | b007c3e2-7fc1-4024-bb4b-08dd76092201 |
X-MS-Exchange-CrossTenant-Id | 93911d83-c81d-424a-b44d-8b41231e6db3 |
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp | TenantId=93911d83-c81d-424a-b44d-8b41231e6db3;Ip=[69.65.18.130];Helo=[GO-APP07] |
X-MS-Exchange-CrossTenant-AuthSource | SJ1PEPF00001CE8.namprd03.prod.outlook.com |
X-MS-Exchange-CrossTenant-AuthAs | Anonymous |
X-MS-Exchange-CrossTenant-FromEntityHeader | HybridOnPrem |
X-MS-Exchange-Transport-CrossTenantHeadersStamped | SA1PR16MB4825 |
Icon Hash: | 46070c0a8e0c67d6 |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Apr 7, 2025 23:00:49.660120010 CEST | 1.1.1.1 | 192.168.2.8 | 0x1b4a | No error (0) | s-0005.dual-s-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 7, 2025 23:00:49.660120010 CEST | 1.1.1.1 | 192.168.2.8 | 0x1b4a | No error (0) | 52.123.128.14 | A (IP address) | IN (0x0001) | false | ||
Apr 7, 2025 23:00:49.660120010 CEST | 1.1.1.1 | 192.168.2.8 | 0x1b4a | No error (0) | 52.123.129.14 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 17:00:43 |
Start date: | 07/04/2025 |
Path: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x3d0000 |
File size: | 34'446'744 bytes |
MD5 hash: | 91A5292942864110ED734005B7E005C0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 2 |
Start time: | 17:00:45 |
Start date: | 07/04/2025 |
Path: | C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7003b0000 |
File size: | 710'048 bytes |
MD5 hash: | EC652BEDD90E089D9406AFED89A8A8BD |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |