Edit tour

Windows Analysis Report
RFQ No. M109241 22.04.2025.xlsx

Overview

General Information

Sample name:RFQ No. M109241 22.04.2025.xlsx
Analysis ID:1671005
MD5:607bc92c894b4d8f1e3519488e5af69e
SHA1:9aef9d5bdc07d8266900d2efd2378a2b79a144e8
SHA256:5b6787d5068199e43006b0918523a3685d9962f5c0a75113656051b3aa74b360
Tags:RFQxlsxuser-cocaman
Infos:

Detection

Score:64
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Excel Network Connections
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w11x64_office
  • EXCEL.EXE (PID: 7400 cmdline: "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding MD5: F9F7B6C42211B06E7AC3E4B60AA8FB77)
    • splwow64.exe (PID: 8432 cmdline: C:\Windows\splwow64.exe 12288 MD5: AF4A7EBF6114EE9E6FBCC910EC3C96E6)
  • appidpolicyconverter.exe (PID: 1260 cmdline: "C:\Windows\system32\appidpolicyconverter.exe" MD5: 6567D9CF2545FAAC60974D9D682700D4)
    • conhost.exe (PID: 6696 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 9698384842DA735D80D278A427A229AB)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
sheet1.xmlINDICATOR_XML_LegacyDrawing_AutoLoad_Documentdetects AutoLoad documents using LegacyDrawingditekSHen
  • 0x1bb:$s1: <legacyDrawing r:id="
  • 0x1e3:$s2: <oleObject progId="
  • 0x229:$s3: autoLoad="true"

System Summary

barindex
Source: Network ConnectionAuthor: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0", Tim Shelton: Data: DestinationIp: 13.107.246.71, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE, Initiated: true, ProcessId: 7400, Protocol: tcp, SourceIp: 192.168.2.25, SourceIsIpv6: false, SourcePort: 49698
Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.25, DestinationIsIpv6: false, DestinationPort: 49698, EventID: 3, Image: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE, Initiated: true, ProcessId: 7400, Protocol: tcp, SourceIp: 13.107.246.71, SourceIsIpv6: false, SourcePort: 443
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: RFQ No. M109241 22.04.2025.xlsxAvira: detected
Source: RFQ No. M109241 22.04.2025.xlsxVirustotal: Detection: 53%Perma Link
Source: RFQ No. M109241 22.04.2025.xlsxReversingLabs: Detection: 72%
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEDirectory created: C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xmlJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile opened: C:\Program Files\Microsoft Office\root\vfs\System\MSVCR100.dllJump to behavior
Source: unknownHTTPS traffic detected: 13.107.246.71:443 -> 192.168.2.25:49698 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.246.71:443 -> 192.168.2.25:49699 version: TLS 1.2
Source: global trafficDNS query: name: otelrules.svc.static.microsoft
Source: global trafficTCP traffic: 192.168.2.25:49699 -> 13.107.246.71:443
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.71:443
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.71:443
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.71:443
Source: global trafficTCP traffic: 192.168.2.25:49699 -> 13.107.246.71:443
Source: global trafficTCP traffic: 192.168.2.25:49699 -> 13.107.246.71:443
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.71:443
Source: global trafficTCP traffic: 192.168.2.25:49699 -> 13.107.246.71:443
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.71:443
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.71:443
Source: global trafficTCP traffic: 192.168.2.25:49699 -> 13.107.246.71:443
Source: global trafficTCP traffic: 192.168.2.25:49699 -> 13.107.246.71:443
Source: global trafficTCP traffic: 192.168.2.25:49699 -> 13.107.246.71:443
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.71:443
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.71:443
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.71:443
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.71:443
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.71:443
Source: global trafficTCP traffic: 192.168.2.25:49699 -> 13.107.246.71:443
Source: global trafficTCP traffic: 192.168.2.25:49699 -> 13.107.246.71:443
Source: global trafficTCP traffic: 192.168.2.25:49699 -> 13.107.246.71:443
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.71:443
Source: global trafficTCP traffic: 13.107.246.71:443 -> 192.168.2.25:49698
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.71:443
Source: global trafficTCP traffic: 192.168.2.25:49699 -> 13.107.246.71:443
Source: global trafficTCP traffic: 13.107.246.71:443 -> 192.168.2.25:49699
Source: global trafficTCP traffic: 192.168.2.25:49699 -> 13.107.246.71:443
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.71:443
Source: global trafficTCP traffic: 13.107.246.71:443 -> 192.168.2.25:49698
Source: global trafficTCP traffic: 192.168.2.25:49699 -> 13.107.246.71:443
Source: global trafficTCP traffic: 13.107.246.71:443 -> 192.168.2.25:49699
Source: global trafficTCP traffic: 13.107.246.71:443 -> 192.168.2.25:49698
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.71:443
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.71:443
Source: global trafficTCP traffic: 13.107.246.71:443 -> 192.168.2.25:49698
Source: global trafficTCP traffic: 13.107.246.71:443 -> 192.168.2.25:49699
Source: global trafficTCP traffic: 13.107.246.71:443 -> 192.168.2.25:49698
Source: global trafficTCP traffic: 192.168.2.25:49699 -> 13.107.246.71:443
Source: global trafficTCP traffic: 192.168.2.25:49699 -> 13.107.246.71:443
Source: global trafficTCP traffic: 13.107.246.71:443 -> 192.168.2.25:49699
Source: global trafficTCP traffic: 13.107.246.71:443 -> 192.168.2.25:49699
Source: global trafficTCP traffic: 192.168.2.25:49699 -> 13.107.246.71:443
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.71:443
Source: global trafficTCP traffic: 13.107.246.71:443 -> 192.168.2.25:49698
Source: global trafficTCP traffic: 13.107.246.71:443 -> 192.168.2.25:49699
Source: global trafficTCP traffic: 13.107.246.71:443 -> 192.168.2.25:49698
Source: global trafficTCP traffic: 13.107.246.71:443 -> 192.168.2.25:49698
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.71:443
Source: global trafficTCP traffic: 13.107.246.71:443 -> 192.168.2.25:49698
Source: global trafficTCP traffic: 13.107.246.71:443 -> 192.168.2.25:49698
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.71:443
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.71:443
Source: global trafficTCP traffic: 13.107.246.71:443 -> 192.168.2.25:49698
Source: global trafficTCP traffic: 192.168.2.25:49698 -> 13.107.246.71:443
Source: global trafficTCP traffic: 13.107.246.71:443 -> 192.168.2.25:49698
Source: global trafficTCP traffic: 13.107.246.71:443 -> 192.168.2.25:49699
Source: global trafficTCP traffic: 13.107.246.71:443 -> 192.168.2.25:49699
Source: global trafficTCP traffic: 192.168.2.25:49699 -> 13.107.246.71:443
Source: global trafficTCP traffic: 192.168.2.25:49699 -> 13.107.246.71:443
Source: global trafficTCP traffic: 13.107.246.71:443 -> 192.168.2.25:49699
Source: global trafficTCP traffic: 192.168.2.25:49699 -> 13.107.246.71:443
Source: global trafficTCP traffic: 13.107.246.71:443 -> 192.168.2.25:49699
Source: Joe Sandbox ViewIP Address: 13.107.246.71 13.107.246.71
Source: Joe Sandbox ViewJA3 fingerprint: 258a5a1e95b8a911872bae9081526644
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /rules/rule170146v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.18129; Pro)Host: otelrules.svc.static.microsoft
Source: global trafficHTTP traffic detected: GET /rules/rule120201v19s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.18129; Pro)Host: otelrules.svc.static.microsoft
Source: global trafficDNS traffic detected: DNS query: otelrules.svc.static.microsoft
Source: Primary1745322347237223500_0633C774-F186-4BAB-8D99-327ADBA41054.log.0.drString found in binary or memory: https://res.cdn.office.net/mro1cdnstorage/fonts/prod/4.41/flatfontassets.pkg
Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
Source: unknownHTTPS traffic detected: 13.107.246.71:443 -> 192.168.2.25:49698 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.246.71:443 -> 192.168.2.25:49699 version: TLS 1.2

System Summary

barindex
Source: sheet1.xml, type: SAMPLEMatched rule: detects AutoLoad documents using LegacyDrawing Author: ditekSHen
Source: sheet1.xml, type: SAMPLEMatched rule: INDICATOR_XML_LegacyDrawing_AutoLoad_Document author = ditekSHen, description = detects AutoLoad documents using LegacyDrawing
Source: classification engineClassification label: mal64.winXLSX@5/6@1/1
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xmlJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Users\user\Desktop\~$RFQ No. M109241 22.04.2025.xlsxJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:6696:120:WilError_03
Source: C:\Windows\System32\appidpolicyconverter.exeMutant created: PolicyMutex
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\{0633C774-F186-4BAB-8D99-327ADBA41054} - OProcSessId.datJump to behavior
Source: RFQ No. M109241 22.04.2025.xlsxOLE indicator, Workbook stream: true
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\appidpolicyconverter.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: RFQ No. M109241 22.04.2025.xlsxVirustotal: Detection: 53%
Source: RFQ No. M109241 22.04.2025.xlsxReversingLabs: Detection: 72%
Source: unknownProcess created: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
Source: unknownProcess created: C:\Windows\System32\appidpolicyconverter.exe "C:\Windows\system32\appidpolicyconverter.exe"
Source: C:\Windows\System32\appidpolicyconverter.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288Jump to behavior
Source: C:\Windows\System32\appidpolicyconverter.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\appidpolicyconverter.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\appidpolicyconverter.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\appidpolicyconverter.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Windows\System32\appidpolicyconverter.exeSection loaded: gpapi.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\CommonJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEDirectory created: C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xmlJump to behavior
Source: RFQ No. M109241 22.04.2025.xlsxStatic file information: File size 1491125 > 1048576
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile opened: C:\Program Files\Microsoft Office\root\vfs\System\MSVCR100.dllJump to behavior
Source: RFQ No. M109241 22.04.2025.xlsxInitial sample: OLE indicators vbamacros = False
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeWindow / User API: threadDelayed 818Jump to behavior
Source: C:\Windows\splwow64.exeLast function: Thread delayed
Source: C:\Windows\splwow64.exeLast function: Thread delayed
Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information queried: ProcessInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
Exploitation for Client Execution
1
DLL Side-Loading
1
Process Injection
3
Masquerading
OS Credential Dumping1
Process Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets2
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1671005 Sample: RFQ No. M109241  22.04.2025.xlsx Startdate: 22/04/2025 Architecture: WINDOWS Score: 64 19 star-azurefd-prod.trafficmanager.net 2->19 21 shed.dual-low.s-part-0043.t-0009.t-msedge.net 2->21 23 3 other IPs or domains 2->23 27 Malicious sample detected (through community Yara rule) 2->27 29 Antivirus / Scanner detection for submitted sample 2->29 31 Multi AV Scanner detection for submitted file 2->31 7 EXCEL.EXE 504 62 2->7         started        11 appidpolicyconverter.exe 1 2->11         started        signatures3 process4 dnsIp5 25 s-part-0043.t-0009.t-msedge.net 13.107.246.71, 443, 49698, 49699 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 7->25 17 C:\...\~$RFQ No. M109241  22.04.2025.xlsx, data 7->17 dropped 13 splwow64.exe 7->13         started        15 conhost.exe 11->15         started        file6 process7

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
RFQ No. M109241 22.04.2025.xlsx53%VirustotalBrowse
RFQ No. M109241 22.04.2025.xlsx72%ReversingLabsDocument-Office.Exploit.CVE-2017-11882
RFQ No. M109241 22.04.2025.xlsx100%AviraEXP/CVE-2017-11882.Gen
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.210.172
truefalse
    high
    a726.dscd.akamai.net
    23.209.84.82
    truefalse
      high
      s-0005.dual-s-msedge.net
      52.123.129.14
      truefalse
        high
        s-part-0043.t-0009.t-msedge.net
        13.107.246.71
        truefalse
          high
          otelrules.svc.static.microsoft
          unknown
          unknownfalse
            high
            NameMaliciousAntivirus DetectionReputation
            https://otelrules.svc.static.microsoft/rules/rule170146v0s19.xmlfalse
              high
              https://otelrules.svc.static.microsoft/rules/rule120201v19s19.xmlfalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                13.107.246.71
                s-part-0043.t-0009.t-msedge.netUnited States
                8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                Joe Sandbox version:42.0.0 Malachite
                Analysis ID:1671005
                Start date and time:2025-04-22 13:44:43 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 5m 11s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:defaultwindowsofficecookbook.jbs
                Analysis system description:Windows 11 23H2 with Office Professional Plus 2021, Chrome 131, Firefox 133, Adobe Reader DC 24, Java 8 Update 431, 7zip 24.09
                Run name:Potential for more IOCs and behavior
                Number of analysed new started processes analysed:20
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:RFQ No. M109241 22.04.2025.xlsx
                Detection:MAL
                Classification:mal64.winXLSX@5/6@1/1
                EGA Information:Failed
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .xlsx
                • Found Word or Excel or PowerPoint or XPS Viewer
                • Attach to Office via COM
                • Active ActiveX Object
                • Scroll down
                • Close Viewer
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, SIHClient.exe, conhost.exe, appidcertstorecheck.exe, svchost.exe
                • Excluded IPs from analysis (whitelisted): 52.109.8.89, 52.109.0.140, 52.109.0.142, 23.220.73.6, 23.220.73.19, 13.89.179.9, 52.123.129.14, 23.209.84.82, 20.190.151.67, 4.175.87.197, 184.29.183.29
                • Excluded domains from analysis (whitelisted): odc.officeapps.live.com, slscr.update.microsoft.com, osiprod-wus-bronze-azsc-000.westus.cloudapp.azure.com, cus-config.officeapps.live.com, res-1.cdn.office.net, a767.dspw65.akamai.net, osiprod-wus-buff-azsc-000.westus.cloudapp.azure.com, mobile.events.data.microsoft.com, roaming.officeapps.live.com, onedscolprdcus09.centralus.cloudapp.azure.com, wus-azsc-000.roaming.officeapps.live.com, dual-s-0005-office.config.skype.com, login.live.com, officeclient.microsoft.com, c.pki.goog, wu-b-net.trafficmanager.net, wus-azsc-000.odc.officeapps.live.com, ecs.office.com, fs.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, prod.configsvc1.live.com.akadns.net, us2.roaming1.live.com.akadns.net, ctldl.windowsupdate.com, prod.roaming1.live.com.akadns.net, res-stls-prod.edgesuite.net, fe3cr.delivery.mp.microsoft.com, download.windowsupdate.com.edgesuite.net, us2.odcsm1.live.com.akadns.net, res-prod.trafficmanager.net, config.officeapps.live.com, us.configsvc1.live.co
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtCreateKey calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • Report size getting too big, too many NtReadVirtualMemory calls found.
                • Report size getting too big, too many NtSetValueKey calls found.
                TimeTypeDescription
                07:46:49API Interceptor841x Sleep call for process: splwow64.exe modified
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                13.107.246.71https://forms.office.com/e/UGN9kJGkPbGet hashmaliciousTycoon2FABrowse
                  https://gentlecareservices.com.au/Get hashmaliciousCAPTCHA Scam ClickFixBrowse
                    https://app.powerbi.com/view?r=eyJrIjoiZTY3OTUxZDctMzZiMS00ZDU1LThkODEtYmZkMTdhNjQyN2U3IiwidCI6ImY5ZTBjOGIyLTk2NTgtNDE1ZS1iMzQyLThiYjhhMDJlZjhlOCIsImMiOjN9&embedImagePlaceholder=trueGet hashmaliciousInvisible JS, Tycoon2FABrowse
                      https://app.powerbi.com/view?r=eyJrIjoiZTY3OTUxZDctMzZiMS00ZDU1LThkODEtYmZkMTdhNjQyN2U3IiwidCI6ImY5ZTBjOGIyLTk2NTgtNDE1ZS1iMzQyLThiYjhhMDJlZjhlOCIsImMiOjN9&embedImagePlaceholder=trueGet hashmaliciousInvisible JS, Tycoon2FABrowse
                        http://url7554.impulseup.com/ls/click?upn=u001.9-2FTADgI74e2OWE2P3fvtm3ks0lxIlIFyP5IwbLoDgBuxxxaTOIUzJMW49-2B9jqW6yELBC1ZQRMe6TWLgjPYTu0LiDQ0w3txTcOK6-2FV2ifPZbRaLIwmmOQ1GMQC9dU6RWb2aeLLtDeODHngY3VjjXvJO6oKDlYY-2FrsIGLii2s3kEKAZFDtf-2BL31aMPuCVwlwPCr7PEQRptcwz1QBhdaSd2LGMdK1VJSRTe40dM32Z7Jz2jBBbK0UwZYo0lLPRxihoyt5eczvkRV2tuefWun26R7i639CvHIPVt6rH7EVtY4Yq4-2BX81bSKNRYMont-2BURzxOXvIrvc-2FmXDxBQFquNv8hCg-3D-3DPxtu_kuLj0dlFrLQsusO5Mbu6XvxpF4v8Jh1YKIsyjo7kzqXHRNE-2FOEVeSM0JICDQ5Tjy3bDgrl5OEVa68odvHNoZBJ6QfGYxcZ7BcXQ0WuvBPrC4VIuEfyEiZxZfLfZFvQ5wdhpAQB1fL-2FQ-2FmD3MevXlsgh-2FpnZWiDIriKQI8exmRbTtK9cjB1NJ40PcJ-2B0p5yN6nYDdiFYbxlYib2Opu1bSYg-3D-3DGet hashmaliciousHTMLPhisherBrowse
                          http://url7554.impulseup.com/ls/click?upn=u001.9-2FTADgI74e2OWE2P3fvtm3ks0lxIlIFyP5IwbLoDgBuxxxaTOIUzJMW49-2B9jqW6yELBC1ZQRMe6TWLgjPYTu0LiDQ0w3txTcOK6-2FV2ifPZbRaLIwmmOQ1GMQC9dU6RWb2aeLLtDeODHngY3VjjXvJO6oKDlYY-2FrsIGLii2s3kEKAZFDtf-2BL31aMPuCVwlwPCr7PEQRptcwz1QBhdaSd2LGMdK1VJSRTe40dM32Z7Jz2jBBbK0UwZYo0lLPRxihoyt5eczvkRV2tuefWun26R7i639CvHIPVt6rH7EVtY4Yq4-2BX81bSKNRYMont-2BURzxOXvIrvc-2FmXDxBQFquNv8hCg-3D-3DOf7V_1bLtnK9VzA81xTl66e5cQEfeWNrWDvGojS6qzpbIWVBQ7lKG2g0aCCOyVobSDuVrLebffHMB5eRckn5ACwa2iQeUse2Dj4VAB-2FABJ1Acb1YvF-2FbDnBdetKvvIMzpE5RxgQY2IAbwQdJhLDSLJUr91tf1539-2Ft7it4uBG8JH-2Fo6agurxFXC9oi5BHuPPJfC2Yg7NXAY-2BcEwb3vDWUgys5pw-3D-3DGet hashmaliciousHTMLPhisherBrowse
                            https://url2949.otter.ai/ls/click?upn=u001.RMbZPcqt5dVyBkZNsbL-2FJ-2BjM-2BKNdpQqPcGUwNYYbqs2JrYMwirobzeW77yT2PrYSPck-2Bec7e1JdCaVHULJT-2BnbnOw45-2FVP30rRc-2F0JCGkKr4WNMJlM4ineu9kabfwJzKRjeTN6NS-2BZ3dn32wLn1tXvXFVMvwh7sVbVOrm4914-2B5cwO4qE92snoz6n7HUD5A-2FSFFoo-2F-2FYlwlLzhOTaQR8ExxMbM49gyhktJANEIBToR4ZHf5sD-2BlOp15okEmTxL6BOzNJbbl9MbeKAcbwY-2FGr1iPG9kuUokt6q8-2FzoRfn1YdDeCM-2Bj8hHqceTfCxCoMaQ7v3MklilTuYd9qHjYhchpkbBGHu4LGy-2BsJwvA4TCdtr2X6j-2BXD-2Fc-2FRgb-2FiJwiipUgUAXHfGOb1iszOZcSC6TDMqU1bmzJaHxHYpt-2Fotz-2F3Q-3D0T0h_NlXWs-2B42feVBzxwcr2jP-2FU9XwbsKKp9ZgTgRX4XfstIvHtvCSw20NSSpBQFc2bNfHbqkOaXarj-2F7Jw6HZWimUqcyDJi-2BUy301iOB69rH7-2B1WtEsUplOnmmCpVgCCCFmcU8THSxKMH42giRovcWPJfgv9-2BDgoHrLCVzmkWP-2F-2BiWRKnveX2fsTc3EztXbYRWAzXhXJwZfvoHXFfc0qMJQKNeXaQKjhATBrOgNbz9su3gvTnejcwbCFUZSLcu14P5jPJWzX54s4rDTxujjaiYAiAoQBpcwH417TVG59KekXL6N0RPmAgiGrzfn83yeQrFk3crlZ41CZMhmCzvmJsLI-2ByV7hI6-2F6bW862k4dJn4oCoCjULx0WIwEdlCkxC6PkpTvJDzuW3Lzob0QpG9S60siz6z1UGVJb9rgZb6gzl7LTPaVbZK-2BdrH5d6bT9PBIRHyUk94QLvG6Qck8SLeXhSSi2qVVZNuWctqi1Ay4Th3cz2ckXmoMpmFZUFNYpeLWqmsGAmpyh8gy-2BjFx6kVAkQ41XT6jspv7RXdhNmf2VjiA355azMzGljrg3gF2I4CYfrJl5sETlFohiP8m9PqeFnlxIEd-2F0SxLIv98c4VcIWXHWlk9mhAYrDJtoCor1hnqYzNtOz4BeTOmU1dCPfJEwUgkNExpnQcPCGoUV8aVwmfRrAjQePlJRLN7OcZ-2B5LJySCfBFac-2FcpCb0xYioofJB2Efv-2BgW3VuyidXPNlyxlKqLHHY-3DGet hashmaliciousUnknownBrowse
                              6549372730.pdfGet hashmaliciousUnknownBrowse
                                https://procurementmcfs.powerappsportals.com/en-US/Register?returnUrl=%2fen-US%2fGet hashmaliciousUnknownBrowse
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  a726.dscd.akamai.netSTATEMENT COMPLETED_DOCUMENT.rtfGet hashmaliciousUnknownBrowse
                                  • 23.209.84.80
                                  MLO Ltr (AF-02)04152025_0015.docx.docGet hashmaliciousUnknownBrowse
                                  • 23.219.38.56
                                  https://mirahomehealthcare.com/%201/Get hashmaliciousHTMLPhisher, Invisible JS, Tycoon2FABrowse
                                  • 23.0.175.82
                                  PI-003-2024-AWG-BK.docx.docGet hashmaliciousUnknownBrowse
                                  • 23.48.246.138
                                  _________19.03.docxGet hashmaliciousUnknownBrowse
                                  • 23.0.175.67
                                  Message.emlGet hashmaliciousHTMLPhisherBrowse
                                  • 23.34.82.22
                                  FFL-2025-00947 PAYMENT.docx.docGet hashmaliciousUnknownBrowse
                                  • 23.205.104.9
                                  ofthings.docGet hashmaliciousUnknownBrowse
                                  • 23.0.162.232
                                  91 PO.xlsmGet hashmaliciousUnknownBrowse
                                  • 23.34.82.12
                                  Fax-499584-940.xlsxGet hashmaliciousUnknownBrowse
                                  • 23.192.229.101
                                  s-0005.dual-s-msedge.netNEW ORDER .msgGet hashmaliciousGuLoaderBrowse
                                  • 52.123.128.14
                                  Notice Of Summon Document_01.pptxGet hashmaliciousHTMLPhisherBrowse
                                  • 52.123.129.14
                                  SecuriteInfo.com.Win64.MalwareX-gen.22561.9089.exeGet hashmaliciousLockBit ransomwareBrowse
                                  • 52.123.129.14
                                  SecuriteInfo.com.Win64.MalwareX-gen.15593.21621.exeGet hashmaliciousLockBit ransomwareBrowse
                                  • 52.123.128.14
                                  REQUEST FOR QUOTATION_TRT00355681966_pdf.exeGet hashmaliciousGuLoaderBrowse
                                  • 52.123.128.14
                                  Quarantined Messages.zipGet hashmaliciousHTMLPhisherBrowse
                                  • 52.123.129.14
                                  Urgent Request for Quotation 2025_893487643_pdf.exeGet hashmaliciousGuLoaderBrowse
                                  • 52.123.129.14
                                  RFQ_2025_KYC0997358463721178265_pdf.exeGet hashmaliciousGuLoaderBrowse
                                  • 52.123.128.14
                                  BANK SLIP_SWIFT COPY-0250421_pdf.exeGet hashmaliciousGuLoaderBrowse
                                  • 52.123.128.14
                                  bg.microsoft.map.fastly.netTRxHlAc5qV.msiGet hashmaliciousLummaC StealerBrowse
                                  • 199.232.214.172
                                  DayKovazvL.msiGet hashmaliciousLummaC StealerBrowse
                                  • 199.232.214.172
                                  Abelia_Danger_IMG53524554a.vbsGet hashmaliciousAsyncRAT, PureLog Stealer, zgRATBrowse
                                  • 199.232.210.172
                                  Medbase Employee.pdfGet hashmaliciousHTMLPhisher, Invisible JS, Tycoon2FABrowse
                                  • 199.232.210.172
                                  ps-pulse-win-22.8r1-b31437-64bit-installer.msiGet hashmaliciousUnknownBrowse
                                  • 199.232.210.172
                                  SecuriteInfo.com.Win32.MalwareX-gen.26969.29469.exeGet hashmaliciousUnknownBrowse
                                  • 199.232.210.172
                                  SecuriteInfo.com.Win64.MalwareX-gen.15593.21621.exeGet hashmaliciousLockBit ransomwareBrowse
                                  • 199.232.210.172
                                  Quarantined Messages.zipGet hashmaliciousHTMLPhisherBrowse
                                  • 199.232.214.172
                                  zNaZhcgkj3.ps1Get hashmaliciousAsyncRAT, DcRatBrowse
                                  • 199.232.210.172
                                  5VPZNNjklZ.exeGet hashmaliciousAmadey, LockBit ransomware, LummaC Stealer, VidarBrowse
                                  • 199.232.214.172
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  MICROSOFT-CORP-MSN-AS-BLOCKUShttps://in.xero.com/E9KQqtsIVSY2myKo6g3ochy2gclxXKZccudUv3hb?utm_source=invoiceEmailPayNowButtonSecondary&utm_campaign=classicInvoicesEmailV2PaymentServiceAttached#paynowGet hashmaliciousUnknownBrowse
                                  • 150.171.22.12
                                  https://elektro-master.com/bitrix/redirect.php?goto=https://gamma.app/docs/Du-har-modtaget-et-nyt-PDF-dokument-sc4u1f9byfz7g2b?mode=present#card-elw7h0ndmam6839Get hashmaliciousUnknownBrowse
                                  • 150.171.22.12
                                  k1.elfGet hashmaliciousUnknownBrowse
                                  • 191.239.171.188
                                  Notice Of Summon Document_01.pptxGet hashmaliciousHTMLPhisherBrowse
                                  • 52.109.6.53
                                  https://magnificent-saturn-e1b.notion.site/Berthold-Holzapfel-GmbH-1dd193bf112e8030b2c8e0982d62c55d?pvs=4Get hashmaliciousHTMLPhisherBrowse
                                  • 150.171.22.12
                                  https://magnificent-saturn-e1b.notion.site/Berthold-Holzapfel-GmbH-1dd193bf112e8030b2c8e0982d62c55d?pvs=4Get hashmaliciousHTMLPhisherBrowse
                                  • 150.171.22.12
                                  https://forms.office.com/e/UGN9kJGkPbGet hashmaliciousTycoon2FABrowse
                                  • 20.50.80.214
                                  z3hir.armGet hashmaliciousMiraiBrowse
                                  • 13.76.82.198
                                  https://tinyurl.com/3sevwn2nGet hashmaliciousUnknownBrowse
                                  • 150.171.22.12
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  258a5a1e95b8a911872bae9081526644MLO Ltr (AF-02)04152025_0015.docx.docGet hashmaliciousUnknownBrowse
                                  • 13.107.246.71
                                  PI-003-2024-AWG-BK.docx.docGet hashmaliciousUnknownBrowse
                                  • 13.107.246.71
                                  FFL-2025-00947 PAYMENT.docx.docGet hashmaliciousUnknownBrowse
                                  • 13.107.246.71
                                  91 PO.xlsmGet hashmaliciousUnknownBrowse
                                  • 13.107.246.71
                                  Fax-499584-940.xlsxGet hashmaliciousUnknownBrowse
                                  • 13.107.246.71
                                  RFQ-VITOOLGROUP-PURCHASE-ORDER-041725.xlsxGet hashmaliciousUnknownBrowse
                                  • 13.107.246.71
                                  documenti_inviobolle_202503190928330337.xlsGet hashmaliciousUnknownBrowse
                                  • 13.107.246.71
                                  PO.#LTV_100734920.xlam.xlsxGet hashmaliciousUnknownBrowse
                                  • 13.107.246.71
                                  NEW ORDER.docx.docGet hashmaliciousUnknownBrowse
                                  • 13.107.246.71
                                  GEN_ARKASLINE_ORIGINAL_ _BL_PREVIEW.xlsGet hashmaliciousUnknownBrowse
                                  • 13.107.246.71
                                  No context
                                  Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):118
                                  Entropy (8bit):3.5700810731231707
                                  Encrypted:false
                                  SSDEEP:3:QaklTlAlXMLLmHlIlFLlmIK/5lTn84vlJlhlXlDHlA6l3l6Als:QFulcLk04/5p8GVz6QRq
                                  MD5:573220372DA4ED487441611079B623CD
                                  SHA1:8F9D967AC6EF34640F1F0845214FBC6994C0CB80
                                  SHA-256:BE84B842025E4241BFE0C9F7B8F86A322E4396D893EF87EA1E29C74F47B6A22D
                                  SHA-512:F19FA3583668C3AF92A9CEF7010BD6ECEC7285F9C8665F2E9528DBA606F105D9AF9B1DB0CF6E7F77EF2E395943DC0D5CB37149E773319078688979E4024F9DD7
                                  Malicious:false
                                  Reputation:high, very likely benign file
                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.H.e.a.r.t.b.e.a.t.C.a.c.h.e./.>.
                                  Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):20971520
                                  Entropy (8bit):8.112143835430977E-5
                                  Encrypted:false
                                  SSDEEP:3:Tuekk9NJtHFfs1XsExe/t:qeVJ8
                                  MD5:AFDEAC461EEC32D754D8E6017E845D21
                                  SHA1:5D0874C19B70638A0737696AEEE55BFCC80D7ED8
                                  SHA-256:3A96B02F6A09F6A6FAC2A44A5842FF9AEB17EB4D633E48ABF6ADDF6FB447C7E2
                                  SHA-512:CAB6B8F9FFDBD80210F42219BAC8F1124D6C0B6995C5128995F7F48CED8EF0F2159EA06A2CD09B1FDCD409719F94A7DB437C708D3B1FDA01FDC80141A4595FC7
                                  Malicious:false
                                  Reputation:moderate, very likely benign file
                                  Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):20971520
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3::
                                  MD5:8F4E33F3DC3E414FF94E5FB6905CBA8C
                                  SHA1:9674344C90C2F0646F0B78026E127C9B86E3AD77
                                  SHA-256:CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC
                                  SHA-512:7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB
                                  Malicious:false
                                  Reputation:high, very likely benign file
                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                  File Type:ASCII text, with very long lines (28597), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):20971520
                                  Entropy (8bit):0.20911885431298294
                                  Encrypted:false
                                  SSDEEP:1536:rfAgEKXhrDwSHuxiZHqaO0gqj3lEB8dvATyfCHvHO0syCNVgu92/qUkfRYb6ETMi:cg7MCuxwqego28FEOo204WBkU
                                  MD5:6D412BD91937BD3006EEA9F3901572A4
                                  SHA1:A54C4FD53C75844C59EECE4A2EF34517B2106458
                                  SHA-256:F5998E21DBCB3706FEB87FE24C47657A6E4633CFFF8D4265F51089D5C877D2C5
                                  SHA-512:6A6E55E17ACA25EE5A50774247B9CC37BDACDA93CFA4A0E924266EDC40D1FC10467EC141FF4D4C850727F078F1CCB35F67C2D37BEC597B9E9682335D911B969E
                                  Malicious:false
                                  Reputation:low
                                  Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation..04/22/2025 11:45:47.264.EXCEL (0x1CE8).0x1DD8.Microsoft Excel.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Experimentation.FeatureQueryBatched","Flags":33777005812056321,"InternalSequenceNumber":17,"Time":"2025-04-22T11:45:47.264Z","Data.Sequence":0,"Data.Count":128,"Data.Features":"[ { \"ID\" : 1, \"N\" : \"Microsoft.Office.Telemetry.TrackCPSWrites\", \"V\" : false, \"S\" : 1, \"P\" : 0, \"T\" : \"2025-04-22T11:45:46.7799221Z\", \"C\" : \"33\", \"Q\" : 0.0, \"M\" : 0, \"F\" : 5 }, { \"ID\" : 1, \"N\" : \"Microsoft.Office.Telemetry.CPSMaxWrites\", \"V\" : 2, \"S\" : 1, \"P\" : 0, \"T\" : \"2025-04-22T11:45:46.7799221Z\", \"C\" : \"33\", \"Q\" : 0.0, \"M\" : 0, \"F\" : 5 }, { \"ID\" : 1, \"N\" : \"Microsoft.Office.Word.UAEOnSafeModeEnabled\", \"V\" : true, \"S\" : 1, \"P\" : 0, \"T\" : \"2025-04-22T11:45:46.7799221Z\", \"C\" : \"\", \"Q\" : 7.0, \"M\" : 0, \"F\" : 5, \"G\" : \"Opt\" }, { \"ID\" : 1, \"
                                  Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):20971520
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3::
                                  MD5:8F4E33F3DC3E414FF94E5FB6905CBA8C
                                  SHA1:9674344C90C2F0646F0B78026E127C9B86E3AD77
                                  SHA-256:CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC
                                  SHA-512:7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB
                                  Malicious:false
                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):165
                                  Entropy (8bit):1.4377382811115937
                                  Encrypted:false
                                  SSDEEP:3:EVANFN:EqfN
                                  MD5:359140EB88A757E2BBEF2F7D32DCC4E5
                                  SHA1:FD16035441ADF907BBFC594A96470C202E265067
                                  SHA-256:42CDE461F058A0C6F6C5A69BD1D21114CD55929011C77BCB9A025B9CA43ED71F
                                  SHA-512:9ADF6AC24E55AA161D2FFA1AC3BBBF03A7028DEFD8E1722FA52CAF7C730F7CF8AAE2073A50FD8AA004AF46E9A578A3B8088DD89415368E64E1916367CE126741
                                  Malicious:true
                                  Preview:.user ..M.e.r.c.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                  File type:Microsoft Excel 2007+
                                  Entropy (8bit):7.9984457209168305
                                  TrID:
                                  • Excel Microsoft Office Open XML Format document (35004/1) 81.40%
                                  • ZIP compressed archive (8000/1) 18.60%
                                  File name:RFQ No. M109241 22.04.2025.xlsx
                                  File size:1'491'125 bytes
                                  MD5:607bc92c894b4d8f1e3519488e5af69e
                                  SHA1:9aef9d5bdc07d8266900d2efd2378a2b79a144e8
                                  SHA256:5b6787d5068199e43006b0918523a3685d9962f5c0a75113656051b3aa74b360
                                  SHA512:b507700f4d1e915ff77eb569de3dd1c077a7d9faa4a8ba89cfe6e06a54ca39738da3e60a82f268fc3681661181986daf3d4efb03fa0ad91b77d090fdca1947ef
                                  SSDEEP:24576:MIvloKGKtkgWkGKlFS81+C6oV304bmIVeEcMi0V96ZNoUmn3Rma:PoQ2+tVSmc6V9EoNma
                                  TLSH:376533527F32163D3AEABB051F1D9C93AEFBCD900C2A9746D53013A32546B56B093F18
                                  File Content Preview:PK........LB.Z.hD~....e.......[Content_Types].xmlUT....P.h.P.h.P.h.U[K.0.~...%..f.(".>8}.....&g[\...8...I.&.+.....$..|'....2..B...l..Y.V:...`......"...q.........F/k.1#....#.K...C%b.<X...P...0.^........\:.`....]...@...'..AT..W.#.A...........&.7Z.$.|i.....N
                                  Icon Hash:35e58a8c0c8a85b9
                                  Document Type:OpenXML
                                  Number of OLE Files:1
                                  Has Summary Info:
                                  Application Name:
                                  Encrypted Document:False
                                  Contains Word Document Stream:False
                                  Contains Workbook/Book Stream:True
                                  Contains PowerPoint Document Stream:False
                                  Contains Visio Document Stream:False
                                  Contains ObjectPool Stream:False
                                  Flash Objects Count:0
                                  Contains VBA Macros:False
                                  Author:ctrl
                                  Last Saved By:ctrl
                                  Create Time:2022-11-18T02:05:27Z
                                  Last Saved Time:2022-11-18T02:07:12Z
                                  Creating Application:Microsoft Excel
                                  Security:0
                                  Thumbnail Scaling Desired:false
                                  Contains Dirty Links:false
                                  Shared Document:false
                                  Changed Hyperlinks:false
                                  Application Version:12.0000
                                  General
                                  Stream Path:\x1oLe10natIve
                                  CLSID:
                                  File Type:data
                                  Stream Size:1708665
                                  Entropy:7.470485087539536
                                  Base64 Encoded:True
                                  Data ASCII:f j . . H . , . . v } u - W / . ) 6 % @ - . ? . U . o . . . * . 2 D . P @ } . & . . m R . } . A . V . . \\ $ . . f 9 . . . . . t R h U W . ) n e . 8 t _ I & d x [ d . . ; . W 5 [ x . W R & . + { O . . e 7 ? ( 1 P p 6 = ] & . Y 4 . f G 1 Y r . . B . . . . N i U j . . a 1 T . 4 E G % . V S . . * S & 8 ` . k R . 7 O - t 7 . . S . 6 . z 0 F v . I ; Z } d x Q V w < a W S | E X 7 X . ) < . . f , . % X C H f o { Z ] . . . . } . u . . J 9 2 m . R Y 5 . R X x . . 4 r L . 9 . r + " + w . > . _ H 7 . . ) . . M . 6 . .
                                  Data Raw:66 8d 6a 05 02 c7 48 19 2c ea 01 08 76 94 b8 93 7d 75 a1 2d 57 c0 2f a1 8b 08 8b 29 b8 cc 36 25 40 2d 1c cf de 3f 8b 10 55 ff d2 05 f1 e6 6f 1e 05 1f 2a 9c e1 ff e0 96 bb 08 32 80 44 00 50 40 7d 19 26 f3 14 dd db 7f 96 ad 6d f4 52 1b 7d e2 bb 93 d5 cd 41 c1 df 18 97 56 c1 bf bd 19 db a6 a3 5c 24 ba ef 92 18 f5 08 ab eb 66 39 01 1c 91 1b f3 ec aa b7 05 9a c2 df 74 52 68 55 57 19 fc
                                  General
                                  Stream Path:SjX9OrXEG
                                  CLSID:
                                  File Type:empty
                                  Stream Size:0
                                  Entropy:0.0
                                  Base64 Encoded:False
                                  Data ASCII:
                                  Data Raw:

                                  Download Network PCAP: filteredfull

                                  • Total Packets: 20
                                  • 443 (HTTPS)
                                  • 53 (DNS)
                                  TimestampSource PortDest PortSource IPDest IP
                                  Apr 22, 2025 13:46:54.958452940 CEST49698443192.168.2.2513.107.246.71
                                  Apr 22, 2025 13:46:54.958487034 CEST4434969813.107.246.71192.168.2.25
                                  Apr 22, 2025 13:46:54.958650112 CEST49698443192.168.2.2513.107.246.71
                                  Apr 22, 2025 13:46:54.958735943 CEST49699443192.168.2.2513.107.246.71
                                  Apr 22, 2025 13:46:54.958779097 CEST4434969913.107.246.71192.168.2.25
                                  Apr 22, 2025 13:46:54.958929062 CEST49699443192.168.2.2513.107.246.71
                                  Apr 22, 2025 13:46:54.959116936 CEST49698443192.168.2.2513.107.246.71
                                  Apr 22, 2025 13:46:54.959135056 CEST4434969813.107.246.71192.168.2.25
                                  Apr 22, 2025 13:46:54.959166050 CEST49699443192.168.2.2513.107.246.71
                                  Apr 22, 2025 13:46:54.959181070 CEST4434969913.107.246.71192.168.2.25
                                  Apr 22, 2025 13:46:55.394579887 CEST4434969813.107.246.71192.168.2.25
                                  Apr 22, 2025 13:46:55.394701958 CEST49698443192.168.2.2513.107.246.71
                                  Apr 22, 2025 13:46:55.398351908 CEST49698443192.168.2.2513.107.246.71
                                  Apr 22, 2025 13:46:55.398374081 CEST4434969813.107.246.71192.168.2.25
                                  Apr 22, 2025 13:46:55.398562908 CEST4434969913.107.246.71192.168.2.25
                                  Apr 22, 2025 13:46:55.398633957 CEST4434969813.107.246.71192.168.2.25
                                  Apr 22, 2025 13:46:55.398680925 CEST49699443192.168.2.2513.107.246.71
                                  Apr 22, 2025 13:46:55.400796890 CEST49699443192.168.2.2513.107.246.71
                                  Apr 22, 2025 13:46:55.400806904 CEST4434969913.107.246.71192.168.2.25
                                  Apr 22, 2025 13:46:55.401036024 CEST4434969913.107.246.71192.168.2.25
                                  Apr 22, 2025 13:46:55.408117056 CEST49699443192.168.2.2513.107.246.71
                                  Apr 22, 2025 13:46:55.408119917 CEST49698443192.168.2.2513.107.246.71
                                  Apr 22, 2025 13:46:55.452270031 CEST4434969813.107.246.71192.168.2.25
                                  Apr 22, 2025 13:46:55.452289104 CEST4434969913.107.246.71192.168.2.25
                                  Apr 22, 2025 13:46:55.673738956 CEST4434969813.107.246.71192.168.2.25
                                  Apr 22, 2025 13:46:55.673767090 CEST4434969813.107.246.71192.168.2.25
                                  Apr 22, 2025 13:46:55.673823118 CEST49698443192.168.2.2513.107.246.71
                                  Apr 22, 2025 13:46:55.673852921 CEST4434969813.107.246.71192.168.2.25
                                  Apr 22, 2025 13:46:55.673871040 CEST4434969813.107.246.71192.168.2.25
                                  Apr 22, 2025 13:46:55.673919916 CEST49698443192.168.2.2513.107.246.71
                                  Apr 22, 2025 13:46:55.674897909 CEST49698443192.168.2.2513.107.246.71
                                  Apr 22, 2025 13:46:55.674926043 CEST4434969813.107.246.71192.168.2.25
                                  Apr 22, 2025 13:46:55.674947023 CEST49698443192.168.2.2513.107.246.71
                                  Apr 22, 2025 13:46:55.674953938 CEST4434969813.107.246.71192.168.2.25
                                  Apr 22, 2025 13:46:55.694953918 CEST4434969913.107.246.71192.168.2.25
                                  Apr 22, 2025 13:46:55.695271015 CEST4434969913.107.246.71192.168.2.25
                                  Apr 22, 2025 13:46:55.695317030 CEST49699443192.168.2.2513.107.246.71
                                  Apr 22, 2025 13:46:55.695450068 CEST49699443192.168.2.2513.107.246.71
                                  Apr 22, 2025 13:46:55.695467949 CEST4434969913.107.246.71192.168.2.25
                                  Apr 22, 2025 13:46:55.695478916 CEST49699443192.168.2.2513.107.246.71
                                  Apr 22, 2025 13:46:55.695485115 CEST4434969913.107.246.71192.168.2.25
                                  TimestampSource PortDest PortSource IPDest IP
                                  Apr 22, 2025 13:46:54.778395891 CEST6265153192.168.2.251.1.1.1
                                  Apr 22, 2025 13:46:54.957516909 CEST53626511.1.1.1192.168.2.25
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Apr 22, 2025 13:46:54.778395891 CEST192.168.2.251.1.1.10x5352Standard query (0)otelrules.svc.static.microsoftA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Apr 22, 2025 13:45:50.728693962 CEST1.1.1.1192.168.2.250x4879No error (0)ecs-office.s-0005.dual-s-msedge.nets-0005.dual-s-msedge.netCNAME (Canonical name)IN (0x0001)false
                                  Apr 22, 2025 13:45:50.728693962 CEST1.1.1.1192.168.2.250x4879No error (0)s-0005.dual-s-msedge.net52.123.129.14A (IP address)IN (0x0001)false
                                  Apr 22, 2025 13:45:50.728693962 CEST1.1.1.1192.168.2.250x4879No error (0)s-0005.dual-s-msedge.net52.123.128.14A (IP address)IN (0x0001)false
                                  Apr 22, 2025 13:45:51.957933903 CEST1.1.1.1192.168.2.250xf8e1No error (0)res-stls-prod.edgesuite.net.globalredir.akadns88.neta726.dscd.akamai.netCNAME (Canonical name)IN (0x0001)false
                                  Apr 22, 2025 13:45:51.957933903 CEST1.1.1.1192.168.2.250xf8e1No error (0)a726.dscd.akamai.net23.209.84.82A (IP address)IN (0x0001)false
                                  Apr 22, 2025 13:45:51.957933903 CEST1.1.1.1192.168.2.250xf8e1No error (0)a726.dscd.akamai.net23.209.84.19A (IP address)IN (0x0001)false
                                  Apr 22, 2025 13:46:54.039721966 CEST1.1.1.1192.168.2.250xb0c1No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                  Apr 22, 2025 13:46:54.039721966 CEST1.1.1.1192.168.2.250xb0c1No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                  Apr 22, 2025 13:46:54.957516909 CEST1.1.1.1192.168.2.250x5352No error (0)otelrules.svc.static.microsoftotelrules-bzhndjfje8dvh5fd.z01.azurefd.netCNAME (Canonical name)IN (0x0001)false
                                  Apr 22, 2025 13:46:54.957516909 CEST1.1.1.1192.168.2.250x5352No error (0)otelrules-bzhndjfje8dvh5fd.z01.azurefd.netstar-azurefd-prod.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                                  Apr 22, 2025 13:46:54.957516909 CEST1.1.1.1192.168.2.250x5352No error (0)star-azurefd-prod.trafficmanager.netshed.dual-low.s-part-0043.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                  Apr 22, 2025 13:46:54.957516909 CEST1.1.1.1192.168.2.250x5352No error (0)shed.dual-low.s-part-0043.t-0009.t-msedge.nets-part-0043.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                  Apr 22, 2025 13:46:54.957516909 CEST1.1.1.1192.168.2.250x5352No error (0)s-part-0043.t-0009.t-msedge.net13.107.246.71A (IP address)IN (0x0001)false
                                  • otelrules.svc.static.microsoft
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.254969913.107.246.714437400C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                  TimestampBytes transferredDirectionData
                                  2025-04-22 11:46:55 UTC214OUTGET /rules/rule170146v0s19.xml HTTP/1.1
                                  Connection: Keep-Alive
                                  Accept-Encoding: gzip
                                  User-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.18129; Pro)
                                  Host: otelrules.svc.static.microsoft
                                  2025-04-22 11:46:55 UTC491INHTTP/1.1 200 OK
                                  Date: Tue, 22 Apr 2025 11:46:55 GMT
                                  Content-Type: text/xml
                                  Content-Length: 461
                                  Connection: close
                                  Cache-Control: public, max-age=604800, immutable
                                  Last-Modified: Thu, 14 Nov 2024 16:14:57 GMT
                                  ETag: "0x8DD04C77BDE7614"
                                  x-ms-request-id: 32c5a39c-601e-00ab-261c-b266f4000000
                                  x-ms-version: 2018-03-28
                                  x-azure-ref: 20250422T114655Z-r185b9c9945pcbjghC1PHX7q7n0000000peg000000005rze
                                  x-fd-int-roxy-purgeid: 0
                                  X-Cache: TCP_HIT
                                  X-Cache-Info: L1_T2
                                  Accept-Ranges: bytes
                                  2025-04-22 11:46:55 UTC461INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 37 30 31 34 36 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 47 72 61 70 68 69 63 73 2e 45 78 70 6f 72 74 42 75 6c 6c 65 74 42 6c 69 70 43 45 78 63 65 70 74 69 6f 6e 22 20 41 54 54 3d 22 63 66 63 66 64 62 39 31 63 36 38 63 34 33 32 39 62 62 38 62 37 63 62 37 62 61 62 62 33 63 66 37 2d 65 30 38 32 63 32 66 32 2d 65 66 31 64 2d 34 32 37 61 2d 61 63 34 64 2d 62 30 62 37 30 30 61 66 65 37 61 37 2d 37 36 35 35 22 20 44 43 61 3d 22 50 53 55 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 54 53 20 54 3d 22 31 22 20 49 64 3d 22 34 38 39 66 34 22 20
                                  Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="170146" V="0" DC="SM" EN="Office.Graphics.ExportBulletBlipCException" ATT="cfcfdb91c68c4329bb8b7cb7babb3cf7-e082c2f2-ef1d-427a-ac4d-b0b700afe7a7-7655" DCa="PSU" xmlns=""> <S> <UTS T="1" Id="489f4"


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  1192.168.2.254969813.107.246.714437400C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                  TimestampBytes transferredDirectionData
                                  2025-04-22 11:46:55 UTC215OUTGET /rules/rule120201v19s19.xml HTTP/1.1
                                  Connection: Keep-Alive
                                  Accept-Encoding: gzip
                                  User-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.18129; Pro)
                                  Host: otelrules.svc.static.microsoft
                                  2025-04-22 11:46:55 UTC515INHTTP/1.1 200 OK
                                  Date: Tue, 22 Apr 2025 11:46:55 GMT
                                  Content-Type: text/xml
                                  Content-Length: 2781
                                  Connection: close
                                  Vary: Accept-Encoding
                                  Cache-Control: public, max-age=604800, immutable
                                  Last-Modified: Tue, 31 Dec 2024 22:07:50 GMT
                                  ETag: "0x8DD29E791389B5C"
                                  x-ms-request-id: ccf67a5f-501e-0078-711c-b206cf000000
                                  x-ms-version: 2018-03-28
                                  x-azure-ref: 20250422T114655Z-r185b9c994567gs9hC1PHXkt0s0000000evg000000003mn9
                                  x-fd-int-roxy-purgeid: 0
                                  X-Cache: TCP_HIT
                                  X-Cache-Info: L1_T2
                                  Accept-Ranges: bytes
                                  2025-04-22 11:46:55 UTC2781INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 32 30 31 22 20 56 3d 22 31 39 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 53 79 73 74 65 6d 2e 53 79 73 74 65 6d 48 65 61 6c 74 68 55 73 61 67 65 2e 43 6c 69 63 6b 53 74 72 65 61 6d 22 20 41 54 54 3d 22 63 64 38 33 36 36 32 36 36 31 31 63 34 63 61 61 61 38 66 63 35 62 32 65 37 32 38 65 65 38 31 64 2d 33 62 36 64 36 63 34 35 2d 36 33 37 37 2d 34 62 66 35 2d 39 37 39 32 2d 64 62 66 38 65 31 38 38 31 30 38 38 2d 37 35 32 31 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 55 73 61 67 65 22 20 44 43 61 3d 22 50 53 55 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20
                                  Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120201" V="19" DC="SM" EN="Office.System.SystemHealthUsage.ClickStream" ATT="cd836626611c4caaa8fc5b2e728ee81d-3b6d6c45-6377-4bf5-9792-dbf8e1881088-7521" SP="CriticalUsage" DCa="PSU" xmlns=""> <RIS>


                                  Click to jump to process

                                  Click to jump to process

                                  • File
                                  • Registry

                                  Click to dive into process behavior distribution

                                  Target ID:0
                                  Start time:07:45:45
                                  Start date:22/04/2025
                                  Path:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
                                  Imagebase:0x7ff70a000000
                                  File size:70'082'712 bytes
                                  MD5 hash:F9F7B6C42211B06E7AC3E4B60AA8FB77
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:false
                                  There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                  There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                  There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                  There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                  There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                                  Target ID:6
                                  Start time:07:45:58
                                  Start date:22/04/2025
                                  Path:C:\Windows\System32\appidpolicyconverter.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Windows\system32\appidpolicyconverter.exe"
                                  Imagebase:0x7ff6a4810000
                                  File size:155'648 bytes
                                  MD5 hash:6567D9CF2545FAAC60974D9D682700D4
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:7
                                  Start time:07:45:58
                                  Start date:22/04/2025
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff729690000
                                  File size:1'040'384 bytes
                                  MD5 hash:9698384842DA735D80D278A427A229AB
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:12
                                  Start time:07:46:49
                                  Start date:22/04/2025
                                  Path:C:\Windows\splwow64.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\splwow64.exe 12288
                                  Imagebase:0x7ff75e4e0000
                                  File size:192'512 bytes
                                  MD5 hash:AF4A7EBF6114EE9E6FBCC910EC3C96E6
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:false
                                  There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                  There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                  There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                  There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                  There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                  There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                  There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                                  No disassembly