Windows
Analysis Report
Fw Microsoft account security alert.eml
Overview
General Information
Detection
Score: | 21 |
Range: | 0 - 100 |
Confidence: | 80% |
Signatures
Classification
- System is w10x64
OUTLOOK.EXE (PID: 6296 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \Root\Offi ce16\OUTLO OK.EXE" /e ml "C:\Use rs\user\De sktop\Fw M icrosoft a ccount sec urity aler t.eml" MD5: 91A5292942864110ED734005B7E005C0) ai.exe (PID: 6832 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \root\vfs\ ProgramFil esCommonX6 4\Microsof t Shared\O ffice16\ai .exe" "C4D 1528C-5EE1 -4BA2-8C7D -CA8BCC237 55A" "26EB 5C07-BFA4- 42B0-A714- 3998933FEC AF" "6296" "C:\Progr am Files ( x86)\Micro soft Offic e\Root\Off ice16\OUTL OOK.EXE" " WordCombin edFloatieL reOnline.o nnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD)
- cleanup
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
- • Phishing
- • Networking
- • System Summary
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Language, Device and Operating System Detection
Click to jump to signature section
Phishing |
---|
Source: | Joe Sandbox AI: |
Source: | Classification: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Window found: | Jump to behavior |
Source: | Window detected: |
Source: | Key opened: | Jump to behavior |
Source: | Key value created or modified: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 11 Browser Extensions | 1 Process Injection | 1 Masquerading | OS Credential Dumping | 1 Process Discovery | Remote Services | Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Modify Registry | LSASS Memory | 12 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Process Injection | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 DLL Side-Loading | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse | ||
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
s-0005.dual-s-dc-msedge.net | 52.123.131.14 | true | false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1662017 |
Start date and time: | 2025-04-10 17:09:00 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 33s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 17 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Fw Microsoft account security alert.eml |
Detection: | SUS |
Classification: | sus21.winEML@3/3@0/0 |
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, d llhost.exe, RuntimeBroker.exe, SIHClient.exe, backgroundTask Host.exe, SgrmBroker.exe, conh ost.exe, TextInputHost.exe, sv chost.exe - Excluded IPs from analysis (wh
itelisted): 52.109.6.53, 52.10 9.8.36, 23.215.0.46, 23.215.0. 37, 23.53.11.13, 23.54.127.164 , 20.42.65.89, 52.123.131.14, 52.149.20.212, 20.190.151.7, 2 3.9.183.29 - Excluded domains from analysis
(whitelisted): omex.cdn.offic e.net, slscr.update.microsoft. com, a767.dspw65.akamai.net, r oaming.officeapps.live.com, du al-s-0005-office.config.skype. com, osiprod-cus-buff-azsc-000 .centralus.cloudapp.azure.com, login.live.com, otelrules.svc .static.microsoft, eus2-azsc-c onfig.officeapps.live.com, off iceclient.microsoft.com, c.pki .goog, wu-b-net.trafficmanager .net, a1864.dscd.akamai.net, e cs.office.com, self-events-dat a.trafficmanager.net, fs.micro soft.com, ctldl.windowsupdate. com.delivery.microsoft.com, pr od.configsvc1.live.com.akadns. net, self.events.data.microsof t.com, ctldl.windowsupdate.com , prod.roaming1.live.com.akadn s.net, cus-azsc-000.roaming.of ficeapps.live.com, fe3cr.deliv ery.mp.microsoft.com, download .windowsupdate.com.edgesuite.n et, us1.roaming1.live.com.akad ns.net, config.officeapps.live .com, us.configsvc1.live.com.a kadns.net, onedscolprdeus11.ea stus.cloudapp.azure.com, ecs.o ffice.trafficmanager.net, omex .cdn.office.net.akamaized.net - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtQueryAttributesFile calls found. - Report size getting too big, t
oo many NtQueryValueKey calls found. - Report size getting too big, t
oo many NtReadVirtualMemory ca lls found.
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
s-0005.dual-s-dc-msedge.net | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
|
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 217088 |
Entropy (8bit): | 4.91367309841274 |
Encrypted: | false |
SSDEEP: | 1536:clU4vl95GmswQBBXToG3MCI5xQic46Fq043EDN43is7rfnd0Q7E:clU4vl/GmswQ/X2Lh9Q |
MD5: | B779E9456D031D4E736365012027E148 |
SHA1: | 0771947069C637C654910ABF3216DCC7F8DC66A0 |
SHA-256: | FF915A31B387C1CD2939A1627F805FA3E9BEB6C6587ABEC877399649F9831ECF |
SHA-512: | AF98477EF5101426A6F9224719D355CA11C914DA6493B3E2D35EEF89027D6FB0DE47B0721E7DE0384451ECC9095B37DD886B3759C269DEF7DE00375C54E3283A |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 271360 |
Entropy (8bit): | 2.7313824306508776 |
Encrypted: | false |
SSDEEP: | 1536:uTzMr/WMlqa38a9j8aEahr7UCUdd8hbMyeiJPfkpjQnU/tg3DpAXW53jEpEHPVQG:2wLWD3GpMakpjRpj |
MD5: | 741DCF7F4B6FD59E1CD78B896B23A57B |
SHA1: | ED3E132674AA2E350B7E595D835507161EE7CF7E |
SHA-256: | 3322B4DF97A697DE4C1713E755EA4ACBE26BDB210B911D8BE30AE2215AD43E82 |
SHA-512: | D16433D0CCA1F50BBAAEEFC13304D5DEBB5EAA3F8BBDE1E185DF70AA890212B6986A13FA0D44113DF791A7E081011C352E64ABB5E590FF77441A657F6B2346AD |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 131072 |
Entropy (8bit): | 3.6119694815359025 |
Encrypted: | false |
SSDEEP: | 1536:iW53jEpEHPVQ10BAwr14/TIlilld8hbMJl1eiJPfkpjQnU/tgKW53jEpEHPVQ10F:ApjCiPGpMkpjxuj |
MD5: | 1E65A74049D8C0E966448A5FC0B4EEF7 |
SHA1: | 86C87FFF8A03E1C177A3BDEE04B3FD16F4CE2B0E |
SHA-256: | 202827082B15D05DDC147F81272F931C4BE73160DCA784663D044BBB48D46BEB |
SHA-512: | 68F504381F6EA3744AB40B8DB26CD83618F5EB63D43BEB0598C43AC3E91FC58B11EFCFD37819DDD9388A5C013936D69933B9E9F61BCCA840788C9B9DCC585D11 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 6.02486961232216 |
TrID: |
|
File name: | Fw Microsoft account security alert.eml |
File size: | 22'988 bytes |
MD5: | 4c89cb752570cdd4f52d35a698ce5d50 |
SHA1: | 305df8c4500d7ea0d76d6ee89529d24f31a6b3ba |
SHA256: | e8767750781b225815cfb5fc8df62a4342ee43f1cd203430519a32a492479731 |
SHA512: | 390b30d9635de7972f4d2cdcfacf2755ee2393a7ec18430f00b76ac1ea8613e4f06aaf14d53368ab88b59ac34c544978540759f2d614b9b6ed1a1adec3f39b42 |
SSDEEP: | 384:Q5mWfRsN9jICIDdlrnCSQMpJY1Kh7jR7gDFLWFo8qWu0wuklnacwWh:QoWfRs3jICIXrCSd6gh7jR7gDFLWFovl |
TLSH: | F7A25C289E555015FEA134ECBC02BA8DF2520C9780B3F4D1F8A9D26F0CCE19D9B57A97 |
File Content Preview: | Received: from CY5PR14MB5728.namprd14.prod.outlook.com (2603:10b6:930:40::19).. by SA1PR14MB6629.namprd14.prod.outlook.com with HTTPS; Sun, 30 Mar 2025.. 03:52:25 +0000..ARC-Seal: i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=fail;.. b=gICT9A |
Subject: | Fw: Microsoft account security alert |
From: | Vicki Hawkins <Vicki@kidsdevelopmentalclinic.com> |
To: | Avatar Cs Support <Support@avatar-cs.net> |
Cc: | |
BCC: | |
Date: | Sun, 30 Mar 2025 03:52:15 +0000 |
Communications: |
|
Attachments: |
Key | Value |
---|---|
Received | from SA1PR14MB4691.namprd14.prod.outlook.com ([fe80::12b5:7309:c08e:ef6a]) by SA1PR14MB4691.namprd14.prod.outlook.com ([fe80::12b5:7309:c08e:ef6a%4]) with mapi id 15.20.8534.043; Sun, 30 Mar 2025 03:52:15 +0000 |
ARC-Seal | i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=dS28gbBuPLgJ4jDC16PpDzghTjFR0uLIImjSCW5L7Ms9yoKKTlPOr7R1o7bVVPIGZVYoYEU+BzSmsSm2fQOocusE1bIl+JL/W5HI37JkC7kPcpC5K6RIiQc+CDLFc9+b8FewD+ip3EazLEc7ijuEpLnUWAcdZHA+hmiyd6RJsXzejN8USW4Da+ZFM0qQrnFPTG18XEif9FFut9TLKh4cPBg3i2HbNZrsaLeHZNK5niV5cgN9qTtEKF6WhqmzyqwgcpX2iAwDa/4A8DxhNZzKz99ZRh3SAI5nYxSSigs9qYA14hr+44phB2vLsqQCu2Z9ouco1AWQILbxoJIQmZl0Tg== |
ARC-Message-Signature | i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=kfEeXDxTz1mu9Y2+nkfaR51o1rZ3F75/SW+FbB+Y3TM=; b=oFqb0BiumbpZMK4HsBMXH7zLDyYvH0JDiVMp0wrOOGjmd3UNZhBgRzStkSFy2APpt7aa7TvuttVx/7iDtakjg0qPccWfvoSpE0K1kjTjTSzQU7BY3QSM72JRyLr7ifVGF65lUfwZZN1AAya9kpUsgxEw4JNHGJn/TrfJJH/0a8GwWEL1THJbOOB/rVo9+Mw6O5BLimSaa4yM95SK53fU1hgkYcxieKBxqfu2yzjyknrNB/VyEkM+6RBKbJbacd3bB33k91xBQx6OeCRVOJJJJp7RF+rZEVWCFupkvakgzbN6wPB2eI8AAJpVsO/Pi3cMWMExyZP89CTeNzN5CNiFmQ== |
ARC-Authentication-Results | i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=kidsdevelopmentalclinic.com; dmarc=pass action=none header.from=kidsdevelopmentalclinic.com; dkim=pass header.d=kidsdevelopmentalclinic.com; arc=none |
Authentication-Results | spf=fail (sender IP is 148.163.129.48) smtp.mailfrom=kidsdevelopmentalclinic.com; dkim=fail (signature did not verify) header.d=kidsdevelopmentaltherapy.onmicrosoft.com;dmarc=none action=none header.from=kidsdevelopmentalclinic.com;compauth=none reason=405 |
Received-SPF | Fail (protection.outlook.com: domain of kidsdevelopmentalclinic.com does not designate 148.163.129.48 as permitted sender) receiver=protection.outlook.com; client-ip=148.163.129.48; helo=dispatch1-us1.ppe-hosted.com; |
Authentication-Results-Original | dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=kidsdevelopmentalclinic.com; |
X-Virus-Scanned | Proofpoint Essentials engine |
DKIM-Signature | v=1; a=rsa-sha256; c=relaxed/relaxed; d=kidsdevelopmentaltherapy.onmicrosoft.com; s=selector2-kidsdevelopmentaltherapy-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=kfEeXDxTz1mu9Y2+nkfaR51o1rZ3F75/SW+FbB+Y3TM=; b=q2avtJfcftr5pZEZEypkycOL9PAI+J/vCQLCKYM5cl4b+Bd9t4Z1/i2WvnnaFFFj3LNCVdVz536sOi/EUJjg/rRugbVcZvyiHGvkEn95HfxDUvfyjnc1sAMsQt056dq3Bgl1l6gj2TRROvmB4aiMvRqUoI/pv2ZPsvRoTIahAIk= |
From | Vicki Hawkins <Vicki@kidsdevelopmentalclinic.com> |
To | Avatar Cs Support <Support@avatar-cs.net> |
Subject | Fw: Microsoft account security alert |
Thread-Topic | Microsoft account security alert |
Thread-Index | AQHboNv5Le0qFq1p+Ua2s/Pb7XZ8lLOLDId+ |
Date | Sun, 30 Mar 2025 03:52:15 +0000 |
Message-ID | <SA1PR14MB46919BDE7A610E7960655611A2A22@SA1PR14MB4691.namprd14.prod.outlook.com> |
References | <A642VB7PRPU4.8K2MYI61KBWH3@bl02epf00024f3c> |
In-Reply-To | <A642VB7PRPU4.8K2MYI61KBWH3@bl02epf00024f3c> |
Accept-Language | en-US |
X-MS-Has-Attach | |
X-MS-TNEF-Correlator | |
x-ms-reactions | allow |
x-ms-traffictypediagnostic | SA1PR14MB4691:EE_|IA0PR14MB6910:EE_|SJ1PEPF00002320:EE_|CY5PR14MB5728:EE_|SA1PR14MB6629:EE_ |
X-MS-Office365-Filtering-Correlation-Id | 40cb1b86-a18a-4aa4-5732-08dd6f3e4745 |
x-ms-exchange-senderadcheck | 1 |
x-ms-exchange-antispam-relay | 0 |
X-Microsoft-Antispam-Untrusted | BCL:0;ARA:13230040|10070799003|366016|1800799024|376014|38070700018|8096899003; |
X-Microsoft-Antispam-Message-Info-Original | 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 |
X-Forefront-Antispam-Report-Untrusted | CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SA1PR14MB4691.namprd14.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(10070799003)(366016)(1800799024)(376014)(38070700018)(8096899003);DIR:OUT;SFP:1102; |
Content-Type | multipart/alternative; boundary="_000_SA1PR14MB46919BDE7A610E7960655611A2A22SA1PR14MB4691namp_" |
X-MS-Exchange-Transport-CrossTenantHeadersStamped | CY5PR14MB5728 |
X-MDID | 1743306739-VUELxRFAT6ed |
X-MDID-I | us1;ut7;1743306739;VUELxRFAT6ed;<Vicki@kidsdevelopmentalclinic.com>;5cf9a4cf6273223b5172cfa417120dd2 |
X-PPE-TRUSTED | V=1;DIR=IN; |
Return-Path | Vicki@kidsdevelopmentalclinic.com |
X-MS-Exchange-Organization-ExpirationStartTime | 30 Mar 2025 03:52:23.0860 (UTC) |
X-MS-Exchange-Organization-ExpirationStartTimeReason | OriginalSubmit |
X-MS-Exchange-Organization-ExpirationInterval | 1:00:00:00.0000000 |
X-MS-Exchange-Organization-ExpirationIntervalReason | OriginalSubmit |
X-MS-Exchange-Organization-Network-Message-Id | 40cb1b86-a18a-4aa4-5732-08dd6f3e4745 |
X-EOPAttributedMessage | 0 |
X-EOPTenantAttributedMessage | 8a90e1c2-aeed-4c51-a768-cfa73171e94c:0 |
X-MS-Exchange-Organization-MessageDirectionality | Incoming |
X-MS-Exchange-Transport-CrossTenantHeadersStripped | SJ1PEPF00002320.namprd03.prod.outlook.com |
X-MS-PublicTrafficType | |
X-MS-Exchange-Organization-AuthSource | SJ1PEPF00002320.namprd03.prod.outlook.com |
X-MS-Exchange-Organization-AuthAs | Anonymous |
X-MS-Office365-Filtering-Correlation-Id-Prvs | 0a443da3-3d07-425a-d229-08dd6f3e42ce |
X-MS-Exchange-Organization-SCL | -1 |
X-Microsoft-Antispam | BCL:0;ARA:13230040|35042699022|82310400026|13003099007|8096899003; |
X-Forefront-Antispam-Report | CIP:148.163.129.48;CTRY:US;LANG:en;SCL:-1;SRV:;IPV:NLI;SFV:NSPM;H:dispatch1-us1.ppe-hosted.com;PTR:dispatch1-us1.ppe-hosted.com;CAT:NONE;SFS:(13230040)(35042699022)(82310400026)(13003099007)(8096899003);DIR:INB; |
X-MS-Exchange-CrossTenant-OriginalArrivalTime | 30 Mar 2025 03:52:22.9298 (UTC) |
X-MS-Exchange-CrossTenant-Network-Message-Id | 40cb1b86-a18a-4aa4-5732-08dd6f3e4745 |
X-MS-Exchange-CrossTenant-Id | 8a90e1c2-aeed-4c51-a768-cfa73171e94c |
X-MS-Exchange-CrossTenant-AuthSource | SJ1PEPF00002320.namprd03.prod.outlook.com |
X-MS-Exchange-CrossTenant-AuthAs | Anonymous |
X-MS-Exchange-CrossTenant-FromEntityHeader | Internet |
X-MS-Exchange-Transport-EndToEndLatency | 00:00:02.6884764 |
X-MS-Exchange-Processed-By-BccFoldering | 15.20.8534.033 |
X-Microsoft-Antispam-Mailbox-Delivery | ucf:0;jmr:0;auth:0;dest:I;ENG:(910005)(944506478)(944626604)(920097)(930097)(140003); |
X-Microsoft-Antispam-Message-Info | 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 |
MIME-Version | 1.0 |
Icon Hash: | 46070c0a8e0c67d6 |
Download Network PCAP: filtered – full
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 10, 2025 17:11:02.216063976 CEST | 53 | 55758 | 162.159.36.2 | 192.168.2.8 |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Apr 10, 2025 17:10:29.172341108 CEST | 1.1.1.1 | 192.168.2.8 | 0xb1d1 | No error (0) | shed.s-0005.dual-s-dc-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 10, 2025 17:10:29.172341108 CEST | 1.1.1.1 | 192.168.2.8 | 0xb1d1 | No error (0) | s-0005.dual-s-dc-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 10, 2025 17:10:29.172341108 CEST | 1.1.1.1 | 192.168.2.8 | 0xb1d1 | No error (0) | 52.123.131.14 | A (IP address) | IN (0x0001) | false | ||
Apr 10, 2025 17:10:29.172341108 CEST | 1.1.1.1 | 192.168.2.8 | 0xb1d1 | No error (0) | 52.123.130.14 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 11:10:26 |
Start date: | 10/04/2025 |
Path: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x310000 |
File size: | 34'446'744 bytes |
MD5 hash: | 91A5292942864110ED734005B7E005C0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 2 |
Start time: | 11:10:27 |
Start date: | 10/04/2025 |
Path: | C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6fdd80000 |
File size: | 710'048 bytes |
MD5 hash: | EC652BEDD90E089D9406AFED89A8A8BD |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |