Edit tour

Windows Analysis Report
Quote JAN2025-5760097-UAE.xlam.xlsx

Overview

General Information

Sample name:Quote JAN2025-5760097-UAE.xlam.xlsx
Analysis ID:1662358
MD5:64a142fda742311b00a2b2a928345bc6
SHA1:ba69e5514dab1453f2ef1e0f8d99c7799b4bdff7
SHA256:df407bada9651b06555daff772292d300d46044558c2160923b818a3ed397130
Tags:AgentTeslaCVE-2017-11882xlamxlsxuser-abuse_ch
Infos:

Detection

Score:64
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Document misses a certain OLE stream usually present in this Microsoft Office document type
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Excel Network Connections
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w11x64_office
  • EXCEL.EXE (PID: 7548 cmdline: "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding MD5: F9F7B6C42211B06E7AC3E4B60AA8FB77)
    • splwow64.exe (PID: 6676 cmdline: C:\Windows\splwow64.exe 12288 MD5: AF4A7EBF6114EE9E6FBCC910EC3C96E6)
  • appidpolicyconverter.exe (PID: 8100 cmdline: "C:\Windows\system32\appidpolicyconverter.exe" MD5: 6567D9CF2545FAAC60974D9D682700D4)
    • conhost.exe (PID: 8116 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 9698384842DA735D80D278A427A229AB)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
sheet1.xmlINDICATOR_XML_LegacyDrawing_AutoLoad_Documentdetects AutoLoad documents using LegacyDrawingditekSHen
  • 0x24c3:$s1: <legacyDrawing r:id="
  • 0x24eb:$s2: <oleObject progId="
  • 0x2540:$s3: autoLoad="true"

System Summary

barindex
Source: Network ConnectionAuthor: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0", Tim Shelton: Data: DestinationIp: 13.107.246.40, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE, Initiated: true, ProcessId: 7548, Protocol: tcp, SourceIp: 192.168.2.25, SourceIsIpv6: false, SourcePort: 49697
Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.25, DestinationIsIpv6: false, DestinationPort: 49697, EventID: 3, Image: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE, Initiated: true, ProcessId: 7548, Protocol: tcp, SourceIp: 13.107.246.40, SourceIsIpv6: false, SourcePort: 443
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Quote JAN2025-5760097-UAE.xlam.xlsxAvira: detected
Source: Quote JAN2025-5760097-UAE.xlam.xlsxVirustotal: Detection: 50%Perma Link
Source: Quote JAN2025-5760097-UAE.xlam.xlsxReversingLabs: Detection: 69%
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEDirectory created: C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xmlJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile opened: C:\Program Files\Microsoft Office\root\vfs\System\MSVCR100.dllJump to behavior
Source: unknownHTTPS traffic detected: 13.107.246.40:443 -> 192.168.2.25:49697 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.246.40:443 -> 192.168.2.25:49698 version: TLS 1.2
Source: global trafficDNS query: name: otelrules.svc.static.microsoft
Source: global trafficTCP traffic: 192.168.2.25:49697 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.25:49697 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.25:49697 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.25:49697 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.25:49697 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.25:49697 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.25:49697 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.25:49697 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.25:49697 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.25:49697 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.25:49697 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.25:49697 -> 13.107.246.40:443
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.25:49697
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.40:443
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.25:49698
Source: global trafficTCP traffic: 192.168.2.25:49697 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.40:443
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.25:49698
Source: global trafficTCP traffic: 192.168.2.25:49697 -> 13.107.246.40:443
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.25:49697
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.25:49697
Source: global trafficTCP traffic: 192.168.2.25:49697 -> 13.107.246.40:443
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.25:49698
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.25:49697 -> 13.107.246.40:443
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.25:49697
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.40:443
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.25:49698
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.25:49697
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.25:49698
Source: global trafficTCP traffic: 192.168.2.25:49697 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.40:443
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.25:49698
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.25:49697
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.25:49698
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.25:49697
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.25:49698
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.25:49697
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.25:49697 -> 13.107.246.40:443
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.25:49697
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.25:49697
Source: global trafficTCP traffic: 192.168.2.25:49697 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.25:49697 -> 13.107.246.40:443
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.25:49697
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.25:49698
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.40:443
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.25:49698
Source: global trafficTCP traffic: 192.168.2.25:49697 -> 13.107.246.40:443
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.25:49697
Source: Joe Sandbox ViewIP Address: 13.107.246.40 13.107.246.40
Source: Joe Sandbox ViewIP Address: 13.107.246.40 13.107.246.40
Source: Joe Sandbox ViewJA3 fingerprint: 258a5a1e95b8a911872bae9081526644
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /rules/rule120201v19s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.18129; Pro)Host: otelrules.svc.static.microsoft
Source: global trafficHTTP traffic detected: GET /rules/rule170146v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.18129; Pro)Host: otelrules.svc.static.microsoft
Source: global trafficDNS traffic detected: DNS query: otelrules.svc.static.microsoft
Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49697
Source: unknownNetwork traffic detected: HTTP traffic on port 49697 -> 443
Source: unknownHTTPS traffic detected: 13.107.246.40:443 -> 192.168.2.25:49697 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.246.40:443 -> 192.168.2.25:49698 version: TLS 1.2

System Summary

barindex
Source: sheet1.xml, type: SAMPLEMatched rule: detects AutoLoad documents using LegacyDrawing Author: ditekSHen
Source: Quote JAN2025-5760097-UAE.xlam.xlsxOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: sheet1.xml, type: SAMPLEMatched rule: INDICATOR_XML_LegacyDrawing_AutoLoad_Document author = ditekSHen, description = detects AutoLoad documents using LegacyDrawing
Source: classification engineClassification label: mal64.winXLSX@5/7@1/1
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xmlJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Users\user\Desktop\~$Quote JAN2025-5760097-UAE.xlam.xlsxJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:8116:120:WilError_03
Source: C:\Windows\System32\appidpolicyconverter.exeMutant created: PolicyMutex
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\{97A73BF5-A18B-46EC-A220-627F018E7A65} - OProcSessId.datJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\appidpolicyconverter.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Quote JAN2025-5760097-UAE.xlam.xlsxVirustotal: Detection: 50%
Source: Quote JAN2025-5760097-UAE.xlam.xlsxReversingLabs: Detection: 69%
Source: unknownProcess created: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
Source: unknownProcess created: C:\Windows\System32\appidpolicyconverter.exe "C:\Windows\system32\appidpolicyconverter.exe"
Source: C:\Windows\System32\appidpolicyconverter.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288Jump to behavior
Source: C:\Windows\System32\appidpolicyconverter.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\appidpolicyconverter.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\appidpolicyconverter.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\appidpolicyconverter.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Windows\System32\appidpolicyconverter.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{3EE60F5C-9BAD-4CD8-8E21-AD2D001D06EB}\InprocServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: Quote JAN2025-5760097-UAE.xlam.xlsxInitial sample: OLE zip file path = xl/media/image1.jpg
Source: Quote JAN2025-5760097-UAE.xlam.xlsxInitial sample: OLE zip file path = xl/calcChain.xml
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\CommonJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEDirectory created: C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xmlJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile opened: C:\Program Files\Microsoft Office\root\vfs\System\MSVCR100.dllJump to behavior
Source: Quote JAN2025-5760097-UAE.xlam.xlsxInitial sample: OLE indicators vbamacros = False
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeWindow / User API: threadDelayed 938Jump to behavior
Source: C:\Windows\splwow64.exeLast function: Thread delayed
Source: C:\Windows\splwow64.exeLast function: Thread delayed
Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information queried: ProcessInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
Exploitation for Client Execution
1
DLL Side-Loading
1
Process Injection
3
Masquerading
OS Credential Dumping1
Process Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets2
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1662358 Sample: Quote JAN2025-5760097-UAE.x... Startdate: 10/04/2025 Architecture: WINDOWS Score: 64 19 star-azurefd-prod.trafficmanager.net 2->19 21 shed.dual-low.s-part-0012.t-0009.t-msedge.net 2->21 23 3 other IPs or domains 2->23 27 Malicious sample detected (through community Yara rule) 2->27 29 Antivirus / Scanner detection for submitted sample 2->29 31 Multi AV Scanner detection for submitted file 2->31 7 EXCEL.EXE 504 60 2->7         started        11 appidpolicyconverter.exe 1 2->11         started        signatures3 process4 dnsIp5 25 s-part-0012.t-0009.t-msedge.net 13.107.246.40, 443, 49697, 49698 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 7->25 17 C:\...\~$Quote JAN2025-5760097-UAE.xlam.xlsx, data 7->17 dropped 13 splwow64.exe 7->13         started        15 conhost.exe 11->15         started        file6 process7

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Quote JAN2025-5760097-UAE.xlam.xlsx50%VirustotalBrowse
Quote JAN2025-5760097-UAE.xlam.xlsx69%ReversingLabsDocument-Office.Exploit.CVE-2017-11882
Quote JAN2025-5760097-UAE.xlam.xlsx100%AviraEXP/CVE-2017-11882.Gen
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
s-part-0012.t-0009.t-msedge.net
13.107.246.40
truefalse
    high
    s-0005.dual-s-dc-msedge.net
    52.123.130.14
    truefalse
      high
      otelrules.svc.static.microsoft
      unknown
      unknownfalse
        high
        NameMaliciousAntivirus DetectionReputation
        https://otelrules.svc.static.microsoft/rules/rule170146v0s19.xmlfalse
          high
          https://otelrules.svc.static.microsoft/rules/rule120201v19s19.xmlfalse
            high
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            13.107.246.40
            s-part-0012.t-0009.t-msedge.netUnited States
            8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
            Joe Sandbox version:42.0.0 Malachite
            Analysis ID:1662358
            Start date and time:2025-04-10 20:55:09 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 5m 25s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:defaultwindowsofficecookbook.jbs
            Analysis system description:Windows 11 23H2 with Office Professional Plus 2021, Chrome 131, Firefox 133, Adobe Reader DC 24, Java 8 Update 431, 7zip 24.09
            Run name:Potential for more IOCs and behavior
            Number of analysed new started processes analysed:22
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:Quote JAN2025-5760097-UAE.xlam.xlsx
            Detection:MAL
            Classification:mal64.winXLSX@5/7@1/1
            EGA Information:Failed
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Found application associated with file extension: .xlsx
            • Found Word or Excel or PowerPoint or XPS Viewer
            • Attach to Office via COM
            • Active ActiveX Object
            • Scroll down
            • Close Viewer
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, SIHClient.exe, conhost.exe, appidcertstorecheck.exe, svchost.exe
            • Excluded IPs from analysis (whitelisted): 52.109.8.89, 52.109.8.36, 52.111.227.28, 23.53.11.13, 23.54.127.164, 20.189.173.11, 52.123.130.14, 4.175.87.197, 40.126.62.132, 23.9.183.29
            • Excluded domains from analysis (whitelisted): us1.odcsm1.live.com.akadns.net, odc.officeapps.live.com, slscr.update.microsoft.com, cus-config.officeapps.live.com, a767.dspw65.akamai.net, mobile.events.data.microsoft.com, roaming.officeapps.live.com, osiprod-cus-buff-azsc-000.centralus.cloudapp.azure.com, dual-s-0005-office.config.skype.com, onedscolprdwus10.westus.cloudapp.azure.com, login.live.com, officeclient.microsoft.com, c.pki.goog, osiprod-cus-bronze-azsc-000.centralus.cloudapp.azure.com, wu-b-net.trafficmanager.net, ecs.office.com, fs.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, prod.configsvc1.live.com.akadns.net, ctldl.windowsupdate.com, prod.roaming1.live.com.akadns.net, cus-azsc-000.odc.officeapps.live.com, cus-azsc-000.roaming.officeapps.live.com, fe3cr.delivery.mp.microsoft.com, download.windowsupdate.com.edgesuite.net, us1.roaming1.live.com.akadns.net, config.officeapps.live.com, us.configsvc1.live.com.akadns.net, ecs.office.trafficmanager.net, prod.odcsm1.live.com.akadns.net,
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtCreateKey calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            • Report size getting too big, too many NtReadVirtualMemory calls found.
            • Report size getting too big, too many NtSetValueKey calls found.
            TimeTypeDescription
            14:57:15API Interceptor964x Sleep call for process: splwow64.exe modified
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            13.107.246.40Payment Transfer Receipt.shtmlGet hashmaliciousHTMLPhisherBrowse
            • www.aib.gov.uk/
            NEW ORDER.xlsGet hashmaliciousUnknownBrowse
            • 2s.gg/3zs
            PO_OCF 408.xlsGet hashmaliciousUnknownBrowse
            • 2s.gg/42Q
            06836722_218 Aluplast.docx.docGet hashmaliciousUnknownBrowse
            • 2s.gg/3zk
            Quotation.xlsGet hashmaliciousUnknownBrowse
            • 2s.gg/3zM
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            s-0005.dual-s-dc-msedge.netphish_alert_sp2_2.0.0.0 (4).emlGet hashmaliciousUnknownBrowse
            • 52.123.130.14
            original (5).emlGet hashmaliciousUnknownBrowse
            • 52.123.131.14
            Scan copy.xlsGet hashmaliciousUnknownBrowse
            • 52.123.130.14
            Scan copy.xlsGet hashmaliciousUnknownBrowse
            • 52.123.130.14
            accounting soa.xlsGet hashmaliciousUnknownBrowse
            • 52.123.130.14
            Scan copy.xlsGet hashmaliciousUnknownBrowse
            • 52.123.130.14
            accounting soa.xlsGet hashmaliciousUnknownBrowse
            • 52.123.130.14
            #U03a0#U03c1#U03bf#U03c3#U03c6#U03bf#U03c1#U03ac #U03c4#U03b9#U03bc#U03ae#U03c2.xlsGet hashmaliciousUnknownBrowse
            • 52.123.130.14
            Purchase Order-212.xla.xlsxGet hashmaliciousUnknownBrowse
            • 52.123.130.14
            Purchase Order-212.xla.xlsxGet hashmaliciousUnknownBrowse
            • 52.123.130.14
            s-part-0012.t-0009.t-msedge.netheki.msiGet hashmaliciousRHADAMANTHYSBrowse
            • 13.107.246.40
            Fax-499584-940.xlsxGet hashmaliciousHTMLPhisherBrowse
            • 13.107.246.40
            Comprobante de pago (BBVA PAGOS).exeGet hashmaliciousAgentTeslaBrowse
            • 13.107.246.40
            https://tn.dtrkr.com/clicks/html/67acc4df-0534-5117-92da-7e0584f11767/caed4a07-120c-5efc-b3cc-823a45496e9b/f2e6a577-6be2-5c17-b479-2c9457e3298c?urlChildId=a1507033-e69c-52ab-bcff-5b3cde8b8d62&templateId=cc6705d0-cd95-4109-a775-b9224700bf67Get hashmaliciousUnknownBrowse
            • 13.107.246.40
            Scan copy.xlsGet hashmaliciousUnknownBrowse
            • 13.107.246.40
            Scan copy.xlsGet hashmaliciousUnknownBrowse
            • 13.107.246.40
            accounting soa.xlsGet hashmaliciousUnknownBrowse
            • 13.107.246.40
            Scan copy.xlsGet hashmaliciousUnknownBrowse
            • 13.107.246.40
            accounting soa.xlsGet hashmaliciousUnknownBrowse
            • 13.107.246.40
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            MICROSOFT-CORP-MSN-AS-BLOCKUSresgod.mpsl.elfGet hashmaliciousMiraiBrowse
            • 20.110.50.113
            resgod.mips.elfGet hashmaliciousMiraiBrowse
            • 51.144.46.186
            heki.msiGet hashmaliciousRHADAMANTHYSBrowse
            • 150.171.28.11
            splm68k.elfGet hashmaliciousUnknownBrowse
            • 20.106.143.62
            jklmips.elfGet hashmaliciousUnknownBrowse
            • 52.180.79.163
            nabsh4.elfGet hashmaliciousUnknownBrowse
            • 52.96.169.98
            resgod.x86.elfGet hashmaliciousMiraiBrowse
            • 51.119.215.158
            nabx86.elfGet hashmaliciousUnknownBrowse
            • 13.84.158.161
            arm7.elfGet hashmaliciousUnknownBrowse
            • 20.176.186.171
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            258a5a1e95b8a911872bae9081526644Scan copy.xlsGet hashmaliciousUnknownBrowse
            • 13.107.246.40
            accounting soa.xlsGet hashmaliciousUnknownBrowse
            • 13.107.246.40
            #U03a0#U03c1#U03bf#U03c3#U03c6#U03bf#U03c1#U03ac #U03c4#U03b9#U03bc#U03ae#U03c2.xlsGet hashmaliciousUnknownBrowse
            • 13.107.246.40
            Purchase Order-212.xla.xlsxGet hashmaliciousUnknownBrowse
            • 13.107.246.40
            Purchase Order-212.xla.xlsxGet hashmaliciousUnknownBrowse
            • 13.107.246.40
            DRAFT AWB and DRAFT Commercial invoice.xlsGet hashmaliciousUnknownBrowse
            • 13.107.246.40
            PO%23001498.xlsxGet hashmaliciousUnknownBrowse
            • 13.107.246.40
            Quotation.xla.xlsxGet hashmaliciousUnknownBrowse
            • 13.107.246.40
            460.xlsGet hashmaliciousUnknownBrowse
            • 13.107.246.40
            NUHRFQ2504105-OT.xlsGet hashmaliciousUnknownBrowse
            • 13.107.246.40
            No context
            Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
            Category:dropped
            Size (bytes):118
            Entropy (8bit):3.5700810731231707
            Encrypted:false
            SSDEEP:3:QaklTlAlXMLLmHlIlFLlmIK/5lTn84vlJlhlXlDHlA6l3l6Als:QFulcLk04/5p8GVz6QRq
            MD5:573220372DA4ED487441611079B623CD
            SHA1:8F9D967AC6EF34640F1F0845214FBC6994C0CB80
            SHA-256:BE84B842025E4241BFE0C9F7B8F86A322E4396D893EF87EA1E29C74F47B6A22D
            SHA-512:F19FA3583668C3AF92A9CEF7010BD6ECEC7285F9C8665F2E9528DBA606F105D9AF9B1DB0CF6E7F77EF2E395943DC0D5CB37149E773319078688979E4024F9DD7
            Malicious:false
            Reputation:high, very likely benign file
            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.H.e.a.r.t.b.e.a.t.C.a.c.h.e./.>.
            Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
            File Type:data
            Category:dropped
            Size (bytes):20971520
            Entropy (8bit):8.112143835430977E-5
            Encrypted:false
            SSDEEP:3:Tuekk9NJtHFfs1XsExe/t:qeVJ8
            MD5:AFDEAC461EEC32D754D8E6017E845D21
            SHA1:5D0874C19B70638A0737696AEEE55BFCC80D7ED8
            SHA-256:3A96B02F6A09F6A6FAC2A44A5842FF9AEB17EB4D633E48ABF6ADDF6FB447C7E2
            SHA-512:CAB6B8F9FFDBD80210F42219BAC8F1124D6C0B6995C5128995F7F48CED8EF0F2159EA06A2CD09B1FDCD409719F94A7DB437C708D3B1FDA01FDC80141A4595FC7
            Malicious:false
            Reputation:moderate, very likely benign file
            Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
            File Type:data
            Category:dropped
            Size (bytes):20971520
            Entropy (8bit):0.0
            Encrypted:false
            SSDEEP:3::
            MD5:8F4E33F3DC3E414FF94E5FB6905CBA8C
            SHA1:9674344C90C2F0646F0B78026E127C9B86E3AD77
            SHA-256:CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC
            SHA-512:7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB
            Malicious:false
            Reputation:high, very likely benign file
            Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
            File Type:ASCII text, with very long lines (28567), with CRLF line terminators
            Category:dropped
            Size (bytes):20971520
            Entropy (8bit):0.19105210519338972
            Encrypted:false
            SSDEEP:3072:iv8cwZYiv9ApCh8ir7+wOQ83eZD0MpqHGka7XTk/xJeW/KgDUHVM0Ye5rRM+3bWp:3ZYiv9c+r9cG
            MD5:F37AEC5DBD0A32ABB05AD16F36FC475B
            SHA1:DF3DD1D31CE260F8360D48C870331EEB82FAC02C
            SHA-256:2D3650F62C5063816914CD73A370B6EBCCA5D21C980CC1CB5700816E18EA5831
            SHA-512:F6167A29D8BB79A13261654D57C4474C38FA32EF8FEC684D7020C3249CBF939790BBEE37E6490ECF7DDB6F91489EB17515B5D92BEA8E1BB2A264DC67E3CCBF9F
            Malicious:false
            Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation..04/10/2025 18:56:14.086.EXCEL (0x1D7C).0x1DE0.Microsoft Excel.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Experimentation.FeatureQueryBatched","Flags":33777005812056321,"InternalSequenceNumber":17,"Time":"2025-04-10T18:56:14.086Z","Data.Sequence":0,"Data.Count":128,"Data.Features":"[ { \"ID\" : 1, \"N\" : \"Microsoft.Office.Telemetry.TrackCPSWrites\", \"V\" : false, \"S\" : 1, \"P\" : 0, \"T\" : \"2025-04-10T18:56:13.5859970Z\", \"C\" : \"33\", \"Q\" : 0.0, \"M\" : 0, \"F\" : 5 }, { \"ID\" : 1, \"N\" : \"Microsoft.Office.Telemetry.CPSMaxWrites\", \"V\" : 2, \"S\" : 1, \"P\" : 0, \"T\" : \"2025-04-10T18:56:13.5859970Z\", \"C\" : \"33\", \"Q\" : 0.0, \"M\" : 0, \"F\" : 5 }, { \"ID\" : 1, \"N\" : \"Microsoft.Office.Word.UAEOnSafeModeEnabled\", \"V\" : true, \"S\" : 1, \"P\" : 0, \"T\" : \"2025-04-10T18:56:13.5859970Z\", \"C\" : \"\", \"Q\" : 8.0, \"M\" : 0, \"F\" : 5, \"G\" : \"Opt\" }, { \"ID\" : 1, \"
            Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
            File Type:data
            Category:dropped
            Size (bytes):20971520
            Entropy (8bit):0.0
            Encrypted:false
            SSDEEP:3::
            MD5:8F4E33F3DC3E414FF94E5FB6905CBA8C
            SHA1:9674344C90C2F0646F0B78026E127C9B86E3AD77
            SHA-256:CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC
            SHA-512:7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB
            Malicious:false
            Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
            File Type:data
            Category:dropped
            Size (bytes):165
            Entropy (8bit):1.4377382811115937
            Encrypted:false
            SSDEEP:3:EVANFN:EqfN
            MD5:359140EB88A757E2BBEF2F7D32DCC4E5
            SHA1:FD16035441ADF907BBFC594A96470C202E265067
            SHA-256:42CDE461F058A0C6F6C5A69BD1D21114CD55929011C77BCB9A025B9CA43ED71F
            SHA-512:9ADF6AC24E55AA161D2FFA1AC3BBBF03A7028DEFD8E1722FA52CAF7C730F7CF8AAE2073A50FD8AA004AF46E9A578A3B8088DD89415368E64E1916367CE126741
            Malicious:false
            Preview:.user ..M.e.r.c.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
            Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
            File Type:data
            Category:dropped
            Size (bytes):165
            Entropy (8bit):1.4377382811115937
            Encrypted:false
            SSDEEP:3:EVANFN:EqfN
            MD5:359140EB88A757E2BBEF2F7D32DCC4E5
            SHA1:FD16035441ADF907BBFC594A96470C202E265067
            SHA-256:42CDE461F058A0C6F6C5A69BD1D21114CD55929011C77BCB9A025B9CA43ED71F
            SHA-512:9ADF6AC24E55AA161D2FFA1AC3BBBF03A7028DEFD8E1722FA52CAF7C730F7CF8AAE2073A50FD8AA004AF46E9A578A3B8088DD89415368E64E1916367CE126741
            Malicious:true
            Preview:.user ..M.e.r.c.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
            File type:Microsoft Excel 2007+
            Entropy (8bit):7.997928341583342
            TrID:
            • Excel Microsoft Office Open XML Format document (35004/1) 81.40%
            • ZIP compressed archive (8000/1) 18.60%
            File name:Quote JAN2025-5760097-UAE.xlam.xlsx
            File size:683'189 bytes
            MD5:64a142fda742311b00a2b2a928345bc6
            SHA1:ba69e5514dab1453f2ef1e0f8d99c7799b4bdff7
            SHA256:df407bada9651b06555daff772292d300d46044558c2160923b818a3ed397130
            SHA512:b93070745e3b8e9466064ab0e189fa99f22b8620a6d987d777aa19c23aef37d20b3482d142c8890e9ee98ec82ecbeaba6f8720718a2736fc4e95be644177fb91
            SSDEEP:12288:wKnWfdXrPWIJqjzdz0NznaBr4QYqiUc4YaA/cFZYLOdCudU97+0LPVhrH:zsbPF4dzWG4QCwbj+Of2+CVRH
            TLSH:09E4234C35CE2F6C950A15AEE1A4FAC469C008ED42731B0F276E16E45AF7EDEB35B448
            File Content Preview:PK........P..Z................[Content_Types].xmlUT...0..g0..g0..g.UMo.@..W....Z.Kr.....P.. .....`/..v7..}gM@UTp...k..7og4.?......rv....+..'.m&.....;+b.+A;........~...=...6NX....y.-....h).r.@...p.b........g..T.....3\..N.|G......bz..R...k% Q.o.. R..J..N...
            Icon Hash:35e58a8c0c8a85b9
            Document Type:OpenXML
            Number of OLE Files:1
            Has Summary Info:
            Application Name:
            Encrypted Document:False
            Contains Word Document Stream:False
            Contains Workbook/Book Stream:False
            Contains PowerPoint Document Stream:False
            Contains Visio Document Stream:False
            Contains ObjectPool Stream:False
            Flash Objects Count:0
            Contains VBA Macros:False
            Author:SHINY
            Last Saved By:X10LUXURY
            Create Time:2010-06-04T08:55:28Z
            Last Saved Time:2023-07-30T22:56:25Z
            Creating Application:Microsoft Excel
            Security:0
            Thumbnail Scaling Desired:false
            Company:Grizli777
            Contains Dirty Links:false
            Shared Document:false
            Changed Hyperlinks:false
            Application Version:15.0300
            General
            Stream Path:\x1olE10naTiVE
            CLSID:
            File Type:data
            Stream Size:964792
            Entropy:5.870149026135287
            Base64 Encoded:False
            Data ASCII:. ] . . . e + . . . | . . E L 3 . $ F - ! k . U . ( . M T , . D . . * - b ( J 6 . D 2 ! . . m t \\ o . G f | ~ . x F # . k g m ; p $ . p } t L . a B . # } . m . . . * . . n 1 . k @ . E R . h c $ . ? B K . . v , . . 0 c q & X : H R B . / H . p . w 5 x Y . ` K 7 . : o . B " . l { O Q F 4 f . < 5 D + O x Q . k . P _ - . ) . J . . . 9 * . g V . ( . H C o . S : J ? . s $ . ^ ; Y . _ . . . o @ i . . ) b z . . T \\ . ` . , 9 . f C * g + = q . . + Q - . B / L 4 i s . 2 . . ) ` . a N q b % B . c 9 m . : ` v D / l .
            Data Raw:de a7 5d 03 03 90 1e 65 c7 2b 01 08 e3 ca bb 7c ff ef 91 81 e3 bd bd 45 4c 8b 33 8b 2e ba 24 46 2d ae 81 f2 94 21 6b ae 8b 0a 55 ff d1 05 d1 28 ab d3 05 4d d8 54 2c ff e0 c8 05 db 44 00 ae 09 88 2a 2d 62 28 db 4a 86 36 08 be 44 d0 32 e1 21 8f 1c 02 6d c3 f4 86 86 e6 e9 74 b9 5c df 6f 0e 47 ea fb a2 66 fd 7c d3 7e 15 b6 78 46 23 de 18 6b c8 67 6d b0 be 3b 70 24 01 e6 f0 70 7d 74 4c
            General
            Stream Path:kq72l4tePuKmuzXyAvqzW
            CLSID:
            File Type:empty
            Stream Size:0
            Entropy:0.0
            Base64 Encoded:False
            Data ASCII:
            Data Raw:

            Download Network PCAP: filteredfull

            • Total Packets: 20
            • 443 (HTTPS)
            • 53 (DNS)
            TimestampSource PortDest PortSource IPDest IP
            Apr 10, 2025 20:57:21.680020094 CEST49697443192.168.2.2513.107.246.40
            Apr 10, 2025 20:57:21.680073023 CEST4434969713.107.246.40192.168.2.25
            Apr 10, 2025 20:57:21.680116892 CEST49698443192.168.2.2513.107.246.40
            Apr 10, 2025 20:57:21.680164099 CEST4434969813.107.246.40192.168.2.25
            Apr 10, 2025 20:57:21.680239916 CEST49697443192.168.2.2513.107.246.40
            Apr 10, 2025 20:57:21.680293083 CEST49698443192.168.2.2513.107.246.40
            Apr 10, 2025 20:57:21.680773973 CEST49698443192.168.2.2513.107.246.40
            Apr 10, 2025 20:57:21.680785894 CEST4434969813.107.246.40192.168.2.25
            Apr 10, 2025 20:57:21.680877924 CEST49697443192.168.2.2513.107.246.40
            Apr 10, 2025 20:57:21.680890083 CEST4434969713.107.246.40192.168.2.25
            Apr 10, 2025 20:57:21.996682882 CEST4434969713.107.246.40192.168.2.25
            Apr 10, 2025 20:57:21.996763945 CEST49697443192.168.2.2513.107.246.40
            Apr 10, 2025 20:57:21.999227047 CEST4434969813.107.246.40192.168.2.25
            Apr 10, 2025 20:57:21.999300003 CEST49698443192.168.2.2513.107.246.40
            Apr 10, 2025 20:57:22.001024008 CEST49697443192.168.2.2513.107.246.40
            Apr 10, 2025 20:57:22.001033068 CEST4434969713.107.246.40192.168.2.25
            Apr 10, 2025 20:57:22.001233101 CEST49698443192.168.2.2513.107.246.40
            Apr 10, 2025 20:57:22.001244068 CEST4434969813.107.246.40192.168.2.25
            Apr 10, 2025 20:57:22.001369953 CEST4434969713.107.246.40192.168.2.25
            Apr 10, 2025 20:57:22.001538038 CEST4434969813.107.246.40192.168.2.25
            Apr 10, 2025 20:57:22.011171103 CEST49697443192.168.2.2513.107.246.40
            Apr 10, 2025 20:57:22.011205912 CEST49698443192.168.2.2513.107.246.40
            Apr 10, 2025 20:57:22.056271076 CEST4434969813.107.246.40192.168.2.25
            Apr 10, 2025 20:57:22.056472063 CEST4434969713.107.246.40192.168.2.25
            Apr 10, 2025 20:57:22.185206890 CEST4434969813.107.246.40192.168.2.25
            Apr 10, 2025 20:57:22.185281038 CEST4434969713.107.246.40192.168.2.25
            Apr 10, 2025 20:57:22.185290098 CEST4434969813.107.246.40192.168.2.25
            Apr 10, 2025 20:57:22.185316086 CEST4434969713.107.246.40192.168.2.25
            Apr 10, 2025 20:57:22.185369015 CEST49698443192.168.2.2513.107.246.40
            Apr 10, 2025 20:57:22.185401917 CEST49697443192.168.2.2513.107.246.40
            Apr 10, 2025 20:57:22.185422897 CEST4434969713.107.246.40192.168.2.25
            Apr 10, 2025 20:57:22.185846090 CEST4434969713.107.246.40192.168.2.25
            Apr 10, 2025 20:57:22.185904026 CEST49697443192.168.2.2513.107.246.40
            Apr 10, 2025 20:57:22.186582088 CEST49698443192.168.2.2513.107.246.40
            Apr 10, 2025 20:57:22.186598063 CEST49697443192.168.2.2513.107.246.40
            Apr 10, 2025 20:57:22.186609983 CEST4434969713.107.246.40192.168.2.25
            Apr 10, 2025 20:57:22.186611891 CEST4434969813.107.246.40192.168.2.25
            Apr 10, 2025 20:57:22.186628103 CEST49698443192.168.2.2513.107.246.40
            Apr 10, 2025 20:57:22.186635017 CEST4434969813.107.246.40192.168.2.25
            Apr 10, 2025 20:57:22.186639071 CEST49697443192.168.2.2513.107.246.40
            Apr 10, 2025 20:57:22.186645031 CEST4434969713.107.246.40192.168.2.25
            TimestampSource PortDest PortSource IPDest IP
            Apr 10, 2025 20:56:46.205317020 CEST5358789162.159.36.2192.168.2.25
            Apr 10, 2025 20:57:21.584547997 CEST6239053192.168.2.251.1.1.1
            Apr 10, 2025 20:57:21.678791046 CEST53623901.1.1.1192.168.2.25
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Apr 10, 2025 20:57:21.584547997 CEST192.168.2.251.1.1.10x5eb9Standard query (0)otelrules.svc.static.microsoftA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Apr 10, 2025 20:56:16.861721039 CEST1.1.1.1192.168.2.250x7245No error (0)ecs-office.s-0005.dual-s-msedge.netshed.s-0005.dual-s-dc-msedge.netCNAME (Canonical name)IN (0x0001)false
            Apr 10, 2025 20:56:16.861721039 CEST1.1.1.1192.168.2.250x7245No error (0)shed.s-0005.dual-s-dc-msedge.nets-0005.dual-s-dc-msedge.netCNAME (Canonical name)IN (0x0001)false
            Apr 10, 2025 20:56:16.861721039 CEST1.1.1.1192.168.2.250x7245No error (0)s-0005.dual-s-dc-msedge.net52.123.130.14A (IP address)IN (0x0001)false
            Apr 10, 2025 20:56:16.861721039 CEST1.1.1.1192.168.2.250x7245No error (0)s-0005.dual-s-dc-msedge.net52.123.131.14A (IP address)IN (0x0001)false
            Apr 10, 2025 20:57:21.678791046 CEST1.1.1.1192.168.2.250x5eb9No error (0)otelrules.svc.static.microsoftotelrules-bzhndjfje8dvh5fd.z01.azurefd.netCNAME (Canonical name)IN (0x0001)false
            Apr 10, 2025 20:57:21.678791046 CEST1.1.1.1192.168.2.250x5eb9No error (0)otelrules-bzhndjfje8dvh5fd.z01.azurefd.netstar-azurefd-prod.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
            Apr 10, 2025 20:57:21.678791046 CEST1.1.1.1192.168.2.250x5eb9No error (0)star-azurefd-prod.trafficmanager.netshed.dual-low.s-part-0012.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
            Apr 10, 2025 20:57:21.678791046 CEST1.1.1.1192.168.2.250x5eb9No error (0)shed.dual-low.s-part-0012.t-0009.t-msedge.nets-part-0012.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
            Apr 10, 2025 20:57:21.678791046 CEST1.1.1.1192.168.2.250x5eb9No error (0)s-part-0012.t-0009.t-msedge.net13.107.246.40A (IP address)IN (0x0001)false
            • otelrules.svc.static.microsoft
            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            0192.168.2.254969713.107.246.404437548C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
            TimestampBytes transferredDirectionData
            2025-04-10 18:57:22 UTC215OUTGET /rules/rule120201v19s19.xml HTTP/1.1
            Connection: Keep-Alive
            Accept-Encoding: gzip
            User-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.18129; Pro)
            Host: otelrules.svc.static.microsoft
            2025-04-10 18:57:22 UTC494INHTTP/1.1 200 OK
            Date: Thu, 10 Apr 2025 18:57:22 GMT
            Content-Type: text/xml
            Content-Length: 2781
            Connection: close
            Vary: Accept-Encoding
            Cache-Control: public, max-age=604800, immutable
            Last-Modified: Tue, 31 Dec 2024 22:07:50 GMT
            ETag: "0x8DD29E791389B5C"
            x-ms-request-id: 9028f514-f01e-0099-0e31-aa9171000000
            x-ms-version: 2018-03-28
            x-azure-ref: 20250410T185722Z-15cd899dcddrpnm5hC1NYC4mzs0000000f60000000003dpy
            x-fd-int-roxy-purgeid: 0
            X-Cache: TCP_HIT
            Accept-Ranges: bytes
            2025-04-10 18:57:22 UTC2781INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 32 30 31 22 20 56 3d 22 31 39 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 53 79 73 74 65 6d 2e 53 79 73 74 65 6d 48 65 61 6c 74 68 55 73 61 67 65 2e 43 6c 69 63 6b 53 74 72 65 61 6d 22 20 41 54 54 3d 22 63 64 38 33 36 36 32 36 36 31 31 63 34 63 61 61 61 38 66 63 35 62 32 65 37 32 38 65 65 38 31 64 2d 33 62 36 64 36 63 34 35 2d 36 33 37 37 2d 34 62 66 35 2d 39 37 39 32 2d 64 62 66 38 65 31 38 38 31 30 38 38 2d 37 35 32 31 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 55 73 61 67 65 22 20 44 43 61 3d 22 50 53 55 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20
            Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120201" V="19" DC="SM" EN="Office.System.SystemHealthUsage.ClickStream" ATT="cd836626611c4caaa8fc5b2e728ee81d-3b6d6c45-6377-4bf5-9792-dbf8e1881088-7521" SP="CriticalUsage" DCa="PSU" xmlns=""> <RIS>


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            1192.168.2.254969813.107.246.404437548C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
            TimestampBytes transferredDirectionData
            2025-04-10 18:57:22 UTC214OUTGET /rules/rule170146v0s19.xml HTTP/1.1
            Connection: Keep-Alive
            Accept-Encoding: gzip
            User-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.18129; Pro)
            Host: otelrules.svc.static.microsoft
            2025-04-10 18:57:22 UTC491INHTTP/1.1 200 OK
            Date: Thu, 10 Apr 2025 18:57:22 GMT
            Content-Type: text/xml
            Content-Length: 461
            Connection: close
            Cache-Control: public, max-age=604800, immutable
            Last-Modified: Thu, 14 Nov 2024 16:14:57 GMT
            ETag: "0x8DD04C77BDE7614"
            x-ms-request-id: 055a61b7-c01e-00a2-0733-aa2327000000
            x-ms-version: 2018-03-28
            x-azure-ref: 20250410T185722Z-15cd899dcdds9j9khC1NYC7hc40000000ey000000000407m
            x-fd-int-roxy-purgeid: 0
            X-Cache: TCP_HIT
            X-Cache-Info: L1_T2
            Accept-Ranges: bytes
            2025-04-10 18:57:22 UTC461INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 37 30 31 34 36 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 47 72 61 70 68 69 63 73 2e 45 78 70 6f 72 74 42 75 6c 6c 65 74 42 6c 69 70 43 45 78 63 65 70 74 69 6f 6e 22 20 41 54 54 3d 22 63 66 63 66 64 62 39 31 63 36 38 63 34 33 32 39 62 62 38 62 37 63 62 37 62 61 62 62 33 63 66 37 2d 65 30 38 32 63 32 66 32 2d 65 66 31 64 2d 34 32 37 61 2d 61 63 34 64 2d 62 30 62 37 30 30 61 66 65 37 61 37 2d 37 36 35 35 22 20 44 43 61 3d 22 50 53 55 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 54 53 20 54 3d 22 31 22 20 49 64 3d 22 34 38 39 66 34 22 20
            Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="170146" V="0" DC="SM" EN="Office.Graphics.ExportBulletBlipCException" ATT="cfcfdb91c68c4329bb8b7cb7babb3cf7-e082c2f2-ef1d-427a-ac4d-b0b700afe7a7-7655" DCa="PSU" xmlns=""> <S> <UTS T="1" Id="489f4"


            Click to jump to process

            Click to jump to process

            • File
            • Registry

            Click to dive into process behavior distribution

            Target ID:0
            Start time:14:56:12
            Start date:10/04/2025
            Path:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
            Wow64 process (32bit):false
            Commandline:"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
            Imagebase:0x7ff639470000
            File size:70'082'712 bytes
            MD5 hash:F9F7B6C42211B06E7AC3E4B60AA8FB77
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:moderate
            Has exited:false
            There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
            There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
            There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
            There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
            There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

            Target ID:6
            Start time:14:56:21
            Start date:10/04/2025
            Path:C:\Windows\System32\appidpolicyconverter.exe
            Wow64 process (32bit):false
            Commandline:"C:\Windows\system32\appidpolicyconverter.exe"
            Imagebase:0x7ff6e39d0000
            File size:155'648 bytes
            MD5 hash:6567D9CF2545FAAC60974D9D682700D4
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:moderate
            Has exited:true

            Target ID:7
            Start time:14:56:21
            Start date:10/04/2025
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff729690000
            File size:1'040'384 bytes
            MD5 hash:9698384842DA735D80D278A427A229AB
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:moderate
            Has exited:true

            Target ID:12
            Start time:14:57:15
            Start date:10/04/2025
            Path:C:\Windows\splwow64.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\splwow64.exe 12288
            Imagebase:0x7ff7cab90000
            File size:192'512 bytes
            MD5 hash:AF4A7EBF6114EE9E6FBCC910EC3C96E6
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:moderate
            Has exited:false
            There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
            There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
            There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
            There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
            There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
            There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
            There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

            No disassembly