Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Supplier Audit F7.4.1e Rev.xlsx

Overview

General Information

Sample name:Supplier Audit F7.4.1e Rev.xlsx
Analysis ID:1500123
MD5:be05ca0309e6728031853679b3601a9b
SHA1:c26adb5dd976851c3f4fa4da962bcc3525730d20
SHA256:08142af579be18b46194c9710c5747ccdde6c6a4bb73e261c496ea0585223241
Infos:

Detection

Score:4
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Excel Network Connections
Sigma detected: Suspicious Office Outbound Connections

Classification

  • System is w10x64
  • EXCEL.EXE (PID: 7920 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding MD5: 4A871771235598812032C822E6F68F19)
    • splwow64.exe (PID: 3300 cmdline: C:\Windows\splwow64.exe 12288 MD5: 77DE7761B037061C7C112FD3C5B91E73)
  • cleanup
No configs have been found
No yara matches
Source: Network ConnectionAuthor: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0", Tim Shelton: Data: DestinationIp: 13.107.246.60, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE, Initiated: true, ProcessId: 7920, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49752
Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.4, DestinationIsIpv6: false, DestinationPort: 49752, EventID: 3, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE, Initiated: true, ProcessId: 7920, Protocol: tcp, SourceIp: 13.107.246.60, SourceIsIpv6: false, SourcePort: 443
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile opened: C:\Program Files (x86)\Microsoft Office\root\vfs\SystemX86\MSVCR100.dllJump to behavior
Source: unknownHTTPS traffic detected: 13.107.246.60:443 -> 192.168.2.4:49754 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.246.60:443 -> 192.168.2.4:49753 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.246.60:443 -> 192.168.2.4:49752 version: TLS 1.2
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49752 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49752 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49752 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49752 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49752 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49752 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49752 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49752 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49752 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49752 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49752 -> 13.107.246.60:443
Source: global trafficTCP traffic: 13.107.246.60:443 -> 192.168.2.4:49752
Source: global trafficTCP traffic: 192.168.2.4:49752 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.246.60:443
Source: global trafficTCP traffic: 13.107.246.60:443 -> 192.168.2.4:49753
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.246.60:443
Source: global trafficTCP traffic: 13.107.246.60:443 -> 192.168.2.4:49754
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49752 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.246.60:443
Source: global trafficTCP traffic: 13.107.246.60:443 -> 192.168.2.4:49752
Source: global trafficTCP traffic: 13.107.246.60:443 -> 192.168.2.4:49753
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.246.60:443
Source: global trafficTCP traffic: 13.107.246.60:443 -> 192.168.2.4:49754
Source: global trafficTCP traffic: 13.107.246.60:443 -> 192.168.2.4:49754
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.246.60:443
Source: global trafficTCP traffic: 13.107.246.60:443 -> 192.168.2.4:49754
Source: global trafficTCP traffic: 13.107.246.60:443 -> 192.168.2.4:49754
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.246.60:443
Source: global trafficTCP traffic: 13.107.246.60:443 -> 192.168.2.4:49753
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.246.60:443
Source: global trafficTCP traffic: 13.107.246.60:443 -> 192.168.2.4:49753
Source: global trafficTCP traffic: 13.107.246.60:443 -> 192.168.2.4:49753
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.246.60:443
Source: global trafficTCP traffic: 13.107.246.60:443 -> 192.168.2.4:49752
Source: global trafficTCP traffic: 192.168.2.4:49752 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49752 -> 13.107.246.60:443
Source: global trafficTCP traffic: 13.107.246.60:443 -> 192.168.2.4:49752
Source: global trafficTCP traffic: 13.107.246.60:443 -> 192.168.2.4:49752
Source: global trafficTCP traffic: 192.168.2.4:49752 -> 13.107.246.60:443
Source: global trafficTCP traffic: 13.107.246.60:443 -> 192.168.2.4:49754
Source: global trafficTCP traffic: 13.107.246.60:443 -> 192.168.2.4:49753
Source: global trafficTCP traffic: 13.107.246.60:443 -> 192.168.2.4:49752
Source: global trafficTCP traffic: 13.107.246.60:443 -> 192.168.2.4:49754
Source: global trafficTCP traffic: 13.107.246.60:443 -> 192.168.2.4:49754
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.246.60:443
Source: global trafficTCP traffic: 13.107.246.60:443 -> 192.168.2.4:49753
Source: global trafficTCP traffic: 13.107.246.60:443 -> 192.168.2.4:49753
Source: global trafficTCP traffic: 13.107.246.60:443 -> 192.168.2.4:49753
Source: global trafficTCP traffic: 13.107.246.60:443 -> 192.168.2.4:49753
Source: global trafficTCP traffic: 13.107.246.60:443 -> 192.168.2.4:49752
Source: global trafficTCP traffic: 13.107.246.60:443 -> 192.168.2.4:49752
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49752 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49752 -> 13.107.246.60:443
Source: global trafficTCP traffic: 13.107.246.60:443 -> 192.168.2.4:49752
Source: global trafficTCP traffic: 192.168.2.4:49752 -> 13.107.246.60:443
Source: global trafficTCP traffic: 13.107.246.60:443 -> 192.168.2.4:49752
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.246.60:443
Source: global trafficTCP traffic: 13.107.246.60:443 -> 192.168.2.4:49753
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.246.60:443
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.246.60:443
Source: global trafficTCP traffic: 13.107.246.60:443 -> 192.168.2.4:49753
Source: global trafficTCP traffic: 13.107.246.60:443 -> 192.168.2.4:49754
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.246.60:443
Source: global trafficTCP traffic: 13.107.246.60:443 -> 192.168.2.4:49754
Source: excel.exeMemory has grown: Private usage: 2MB later: 73MB
Source: Joe Sandbox ViewIP Address: 13.107.246.60 13.107.246.60
Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
Source: global trafficHTTP traffic detected: GET /rules/rule170012v12s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.16827; Pro)Host: otelrules.azureedge.net
Source: global trafficHTTP traffic detected: GET /rules/rule63067v4s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.16827; Pro)Host: otelrules.azureedge.net
Source: global trafficHTTP traffic detected: GET /rules/rule170022v2s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.16827; Pro)Host: otelrules.azureedge.net
Source: 57C8EDB95DF3F0AD4EE2DC2B8CFD4157.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownHTTPS traffic detected: 13.107.246.60:443 -> 192.168.2.4:49754 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.246.60:443 -> 192.168.2.4:49753 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.246.60:443 -> 192.168.2.4:49752 version: TLS 1.2
Source: classification engineClassification label: clean4.winXLSX@3/3@0/1
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Program Files (x86)\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xmlJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Users\user\Desktop\~$Supplier Audit F7.4.1e Rev.xlsxJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\{7AE56342-BB04-429D-8C6F-57FB19ECFFF5} - OProcSessId.datJump to behavior
Source: Supplier Audit F7.4.1e Rev.xlsxOLE indicator, Workbook stream: true
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: Supplier Audit F7.4.1e Rev.xlsxInitial sample: OLE zip file path = xl/calcChain.xml
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\CommonJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile opened: C:\Program Files (x86)\Microsoft Office\root\vfs\SystemX86\MSVCR100.dllJump to behavior
Source: Supplier Audit F7.4.1e Rev.xlsxInitial sample: OLE indicators vbamacros = False
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeWindow / User API: threadDelayed 965Jump to behavior
Source: C:\Windows\splwow64.exeLast function: Thread delayed
Source: C:\Windows\splwow64.exeLast function: Thread delayed
Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information queried: ProcessInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Exploitation for Client Execution
Path Interception1
Process Injection
2
Masquerading
OS Credential Dumping1
Process Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Extra Window Memory Injection
1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Extra Window Memory Injection
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput Capture2
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.210.172
truefalse
    unknown
    s-part-0032.t-0009.t-msedge.net
    13.107.246.60
    truefalse
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      13.107.246.60
      s-part-0032.t-0009.t-msedge.netUnited States
      8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1500123
      Start date and time:2024-08-27 22:48:56 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 4m 7s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:defaultwindowsofficecookbook.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Run name:Potential for more IOCs and behavior
      Number of analysed new started processes analysed:7
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:Supplier Audit F7.4.1e Rev.xlsx
      Detection:CLEAN
      Classification:clean4.winXLSX@3/3@0/1
      EGA Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .xlsx
      • Found Word or Excel or PowerPoint or XPS Viewer
      • Attach to Office via COM
      • Scroll down
      • Close Viewer
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 52.109.89.18, 52.109.68.129, 52.113.194.132, 184.28.90.27, 199.232.210.172, 20.42.65.90
      • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.afd.azureedge.net, onedscolprdeus14.eastus.cloudapp.azure.com, weu-azsc-config.officeapps.live.com, eur.roaming1.live.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, ecs-office.s-0005.s-msedge.net, roaming.officeapps.live.com, ocsp.digicert.com, login.live.com, e16604.g.akamaiedge.net, frc-azsc-000.roaming.officeapps.live.com, officeclient.microsoft.com, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net, ecs.office.com, self-events-data.trafficmanager.net, fs.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, otelrules.azureedge.net, prod.configsvc1.live.com.akadns.net, self.events.data.microsoft.com, osiprod-frc-buff-azsc-000.francecentral.cloudapp.azure.com, ctldl.windowsupdate.com, prod.roaming1.live.com.akadns.net, s-0005-office.config.skype.com, fe3cr.delivery.mp.microsoft.com, s-0005.s-msedge.net, config.officeapps.live.com, azur
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtCreateKey calls found.
      • Report size getting too big, too many NtQueryAttributesFile calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      • Report size getting too big, too many NtReadVirtualMemory calls found.
      • VT rate limit hit for: Supplier Audit F7.4.1e Rev.xlsx
      TimeTypeDescription
      16:50:50API Interceptor990x Sleep call for process: splwow64.exe modified
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      13.107.246.60https://protect-us.mimecast.com/s/wFHoCqxrAnt7V914iZaD1vGet hashmaliciousUnknownBrowse
      • www.mimecast.com/Customers/Support/Contact-support/
      http://wellsfargo.dealogic.com/clientportal/Conferences/Registration/Form/368?menuItemId=5Get hashmaliciousUnknownBrowse
      • wellsfargo.dealogic.com/clientportal/Conferences/Registration/Form/368?menuItemId=5
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      s-part-0032.t-0009.t-msedge.netfile.exeGet hashmaliciousUnknownBrowse
      • 13.107.246.60
      DOC-71275297.pdfGet hashmaliciousHTMLPhisherBrowse
      • 13.107.246.60
      DOC-80697077.pdfGet hashmaliciousHTMLPhisherBrowse
      • 13.107.246.60
      file.exeGet hashmaliciousUnknownBrowse
      • 13.107.246.60
      https://aka.ms/LearnAboutSenderIdentificationGet hashmaliciousHTMLPhisherBrowse
      • 13.107.246.60
      Madisonwellsmedia546.pdfGet hashmaliciousHTMLPhisherBrowse
      • 13.107.246.60
      https://12dec6c2-3c78-e425-b87e-b20197f5da10.powerappsportals.com/Get hashmaliciousUnknownBrowse
      • 13.107.246.60
      http://esc-dot-wind-blade-416540.uk.r.appspot.comGet hashmaliciousHTMLPhisherBrowse
      • 13.107.246.60
      file.exeGet hashmaliciousUnknownBrowse
      • 13.107.246.60
      https://email-10.moengage.com/v1/emailclick?q=J9hmu1r6QKZrUydA7M0LhmLQ5i7Dg0Nl6MHK33dlRRiHDGLaUmrV29w-y9KVmRzhTLgNQhsm45GxW8V8xKrQoKNDHjB7CRmg_1cweH.uPLe.3eHt_gc8HUYJyNafgEERmJL2LxAT8X7OcG6eGtfAfBO9PAxgYyMwORkMW2Shu_8EgxVomZ4n5YVrJ6BeKFaCmD6d2Q4-0na_EglsL0Brj6yR2v6QG0HeFNJCVHWIDqcMyqe_r88-cETjiVnbQ8n6AdsU8zQ3H7iztnEZXRzETHYdGTm5hvYgsr5Sg7bkrF81eht6fM_e-ibIZP2oMLvBT1zWn_xe_wasEim1gTvVJRTqev1AuuHjN-EARFMZfriSXRqAx2EgGZLcoc2EiPI4kOQISdubWyzK9Xtj10aCP_wAt6KxwJRnrrWNRvn3blBJWnngxtQFXjDGd_qwCgdLvQwPLy5R0skEjnG0HC7MA#V2xjMVEyVlhTWHBSYlhocVRVVktkbGRXWkRSak1XdDVUMVJHYVdKc1NURlVSekExWlZad00xQlVNRDA9Get hashmaliciousHTMLPhisherBrowse
      • 13.107.246.60
      bg.microsoft.map.fastly.nethttp://www.coredc.comGet hashmaliciousUnknownBrowse
      • 199.232.214.172
      (No subject) (60).emlGet hashmaliciousHTMLPhisherBrowse
      • 199.232.214.172
      Madisonwellsmedia546.pdfGet hashmaliciousHTMLPhisherBrowse
      • 199.232.214.172
      https://email-10.moengage.com/v1/emailclick?q=J9hmu1r6QKZrUydA7M0LhmLQ5i7Dg0Nl6MHK33dlRRiHDGLaUmrV29w-y9KVmRzhTLgNQhsm45GxW8V8xKrQoKNDHjB7CRmg_1cweH.uPLe.3eHt_gc8HUYJyNafgEERmJL2LxAT8X7OcG6eGtfAfBO9PAxgYyMwORkMW2Shu_8EgxVomZ4n5YVrJ6BeKFaCmD6d2Q4-0na_EglsL0Brj6yR2v6QG0HeFNJCVHWIDqcMyqe_r88-cETjiVnbQ8n6AdsU8zQ3H7iztnEZXRzETHYdGTm5hvYgsr5Sg7bkrF81eht6fM_e-ibIZP2oMLvBT1zWn_xe_wasEim1gTvVJRTqev1AuuHjN-EARFMZfriSXRqAx2EgGZLcoc2EiPI4kOQISdubWyzK9Xtj10aCP_wAt6KxwJRnrrWNRvn3blBJWnngxtQFXjDGd_qwCgdLvQwPLy5R0skEjnG0HC7MA#V2xjMVEyVlhTWHBSYlhocVRVVktkbGRXWkRSak1XdDVUMVJHYVdKc1NURlVSekExWlZad00xQlVNRDA9Get hashmaliciousHTMLPhisherBrowse
      • 199.232.210.172
      signature.pdfGet hashmaliciousUnknownBrowse
      • 199.232.214.172
      17247721854992a239a10dc9d698a853fc08f17659bf477258150484d560d105950a258f8e379.dat-decoded.exeGet hashmaliciousAsyncRAT, DcRatBrowse
      • 199.232.214.172
      https://clickme.thryv.com/ls/click?upn=u001.Als7cfHaJU2yMdsJgpsIFl8RKvJCjgfWXgpyGiQbouwIVFCzJZdO6C7IEJWnFiPmUdkD_OEO3HRIZ3eedLymwLhvJt9sqs3j4T3CqpVCO9A0ZKplqH1W1Ad1lCPdQBrRfbSauZPLLCLTYBsXDRt8yGG5FOZ7NK342oFTufTBA9n-2F9XZOJptL-2BsSl02HxRvbllikFuSJtHHDkVwyIj5AuFgiubBu9sTxc8j0-2BQG5wldcZa7WyDp4BZYdRmFKi1MU2RpCFoGVLX1rLVx-2BFFfe8ZtbBDm0OusvqG9hc8jycErQH9w4yo0iZBNb6ruS35AQpqe-2Bn9sSG0dYdsEjJuPPD68-2FQoiA15kbRIRZcVBuBtywmpClclGh64Ps2rLg6E3U3-2Ft-2B24zaJbCf8tvrjozgadicpaRwQ3KIy53pMZsOUCbTeEqGc-3D#bGFtYmVydC5nZW9yZ2lhQGFpZGIub3JnGet hashmaliciousUnknownBrowse
      • 199.232.214.172
      https://clickme.thryv.com/ls/click?upn=u001.Als7cfHaJU2yMdsJgpsIFl8RKvJCjgfWXgpyGiQbouwIVFCzJZdO6C7IEJWnFiPmUdkD_OEO3HRIZ3eedLymwLhvJt9sqs3j4T3CqpVCO9A0ZKplqH1W1Ad1lCPdQBrRfbSauZPLLCLTYBsXDRt8yGG5FOZ7NK342oFTufTBA9n-2F9XZOJptL-2BsSl02HxRvbllikFuSJtHHDkVwyIj5AuFgiubBu9sTxc8j0-2BQG5wldcZa7WyDp4BZYdRmFKi1MU2RpCFoGVLX1rLVx-2BFFfe8ZtbBDm0OusvqG9hc8jycErQH9w4yo0iZBNb6ruS35AQpqe-2Bn9sSG0dYdsEjJuPPD68-2FQoiA15kbRIRZcVBuBtywmpClclGh64Ps2rLg6E3U3-2Ft-2B24zaJbCf8tvrjozgadicpaRwQ3KIy53pMZsOUCbTeEqGc-3D#bGFtYmVydC5nZW9yZ2lhQGFpZGIub3JnGet hashmaliciousUnknownBrowse
      • 199.232.210.172
      https://clickme.thryv.com/ls/click?upn=u001.Als7cfHaJU2yMdsJgpsIFgXXvv2-2BWxavJhSFh1X9YeE09JxYfGZOrfNXpE1b1zMSec6V_OEO3HRIZ3eedLymwLhvJt9sqs3j4T3CqpVCO9A0ZKplqH1W1Ad1lCPdQBrRfbSauZPLLCLTYBsXDRt8yGG5FOZ7NK342oFTufTBA9n-2F9XZNvtRLmuq9nwTUBLvlyUQLSTjA0dDcTtmNJHz5AQBzdlGtncKRz08-2BYDBtkpKhh0KX17i2fmd5it7ecx-2FWvhsbD-2BwYBTTPKQ3j-2FAyMvTur79Dsx-2FPO7GwMrKARE8VWDjAjvStKY75qeeBLXHuDipEV3KKO3k4ABqkQG2RlytfHIDieNQv9UnoJapwQuVaik0jLuTXarvnnfl3sa3LYFT4h4hVVagLZJwfqoXYBXcReN-2F1X4eM9FZF-2BvVOXIZ-2BqDy2Q-3DGet hashmaliciousHTMLPhisherBrowse
      • 199.232.210.172
      Gov Annual Salary + Employer - Provided Benefits.pdfGet hashmaliciousPhisherBrowse
      • 199.232.210.172
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      MICROSOFT-CORP-MSN-AS-BLOCKUSfile.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
      • 13.107.246.42
      file.exeGet hashmaliciousUnknownBrowse
      • 13.107.246.60
      DOC-71275297.pdfGet hashmaliciousHTMLPhisherBrowse
      • 13.107.246.60
      DOC-80697077.pdfGet hashmaliciousHTMLPhisherBrowse
      • 13.107.246.60
      San Xavier District of the Tohono O#U2019odham Nation.pdfGet hashmaliciousUnknownBrowse
      • 52.108.66.1
      San Xavier District of the Tohono O#U2019odham Nation.pdfGet hashmaliciousUnknownBrowse
      • 52.108.66.1
      file.exeGet hashmaliciousUnknownBrowse
      • 13.107.246.60
      http://www.coredc.comGet hashmaliciousUnknownBrowse
      • 13.107.246.67
      (No subject) (61).emlGet hashmaliciousHTMLPhisherBrowse
      • 104.47.64.28
      nested-ConsultTrustNorth-payment Requisition #42 3L# 1414 18 Dock.pdf..emlGet hashmaliciousUnknownBrowse
      • 52.98.242.242
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      a0e9f5d64349fb13191bc781f81f42e1file.exeGet hashmaliciousLummaC, VidarBrowse
      • 13.107.246.60
      file.exeGet hashmaliciousLummaC, VidarBrowse
      • 13.107.246.60
      file.exeGet hashmaliciousLummaC, VidarBrowse
      • 13.107.246.60
      Setup_v1.43.exeGet hashmaliciousLummaCBrowse
      • 13.107.246.60
      (No subject) (61).emlGet hashmaliciousHTMLPhisherBrowse
      • 13.107.246.60
      https://aka.ms/LearnAboutSenderIdentificationGet hashmaliciousHTMLPhisherBrowse
      • 13.107.246.60
      file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
      • 13.107.246.60
      file.exeGet hashmaliciousLummaC, VidarBrowse
      • 13.107.246.60
      1YC268KfwD.exeGet hashmaliciousLummaCBrowse
      • 13.107.246.60
      PqyFc2vziL.exeGet hashmaliciousLummaCBrowse
      • 13.107.246.60
      No context
      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):118
      Entropy (8bit):3.5700810731231707
      Encrypted:false
      SSDEEP:3:QaklTlAlXMLLmHlIlFLlmIK/5lTn84vlJlhlXlDHlA6l3l6Als:QFulcLk04/5p8GVz6QRq
      MD5:573220372DA4ED487441611079B623CD
      SHA1:8F9D967AC6EF34640F1F0845214FBC6994C0CB80
      SHA-256:BE84B842025E4241BFE0C9F7B8F86A322E4396D893EF87EA1E29C74F47B6A22D
      SHA-512:F19FA3583668C3AF92A9CEF7010BD6ECEC7285F9C8665F2E9528DBA606F105D9AF9B1DB0CF6E7F77EF2E395943DC0D5CB37149E773319078688979E4024F9DD7
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.H.e.a.r.t.b.e.a.t.C.a.c.h.e./.>.
      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
      File Type:data
      Category:dropped
      Size (bytes):338
      Entropy (8bit):3.453887774916514
      Encrypted:false
      SSDEEP:6:kKJv9r8I9JFN+SkQlPlEGYRMY9z+s3Ql2DUevat:9V2kPlE99SCQl2DUevat
      MD5:15E26458F394795BADE64A662D881B73
      SHA1:780FF366D6EFF9157E601545059F197F012D3072
      SHA-256:8C9FA960371E2D06D7D839339A179C5B187BAF6628136418201DC255FA5EEF18
      SHA-512:3C09A5339311AFA54A3334C91DA518B9EEB9A7250B96079B6A55F79697110FA189008AF939A1E46F345A94893571DDDEC0C6FEE8F98D14148AC4E1EB8130E685
      Malicious:false
      Reputation:low
      Preview:p...... ........q.......(...............................................?f .@... .........p.........$...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.d.i.s.a.l.l.o.w.e.d.c.e.r.t.s.t.l...c.a.b...".7.4.6.7.8.7.a.3.f.0.d.9.1.:.0."...
      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
      File Type:data
      Category:dropped
      Size (bytes):165
      Entropy (8bit):1.4377382811115937
      Encrypted:false
      SSDEEP:3:KVC+cAmltV:KVC+cR
      MD5:9C7132B2A8CABF27097749F4D8447635
      SHA1:71D7F78718A7AFC3EAB22ED395321F6CBE2F9899
      SHA-256:7029AE5479F0CD98D892F570A22B2AE8302747DCFF3465B2DE64D974AE815A83
      SHA-512:333AC8A4987CC7DF5981AE81238A77D123996DB2C4C97053E8BD2048A64FDCF33E1245DEE6839358161F6B5EEA6BFD8D2358BC4A9188D786295C22F79E2D635E
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview:.user ..j.o.n.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
      File type:Microsoft Excel 2007+
      Entropy (8bit):7.650377722302648
      TrID:
      • Excel Microsoft Office Open XML Format document (40004/1) 83.33%
      • ZIP compressed archive (8000/1) 16.67%
      File name:Supplier Audit F7.4.1e Rev.xlsx
      File size:24'462 bytes
      MD5:be05ca0309e6728031853679b3601a9b
      SHA1:c26adb5dd976851c3f4fa4da962bcc3525730d20
      SHA256:08142af579be18b46194c9710c5747ccdde6c6a4bb73e261c496ea0585223241
      SHA512:244a0435a31a2702dd516a2e8aa51e0160dbfac997714c096c8982f60d35fa83da33d4e4058b0c6d10e931b7af13d019cd3be0ba7c4def59acee154329dd69bf
      SSDEEP:384:ptbenwKvT/yJus875CsTTkygjkyKwFAGQd4VoN3utfZjZ6ToiBT:pFenwsOwfCsUytyKwH64V1ZjZuoG
      TLSH:F0B2D0C88275655DD753A0BDC4809674F9D95848E2A099AB3C2CEA4C211E8DBCF5D3CF
      File Content Preview:PK..........!.t6Z.z...........[Content_Types].xml ...(.........................................................................................................................................................................................................
      Icon Hash:35e58a8c0c8a85b9
      Document Type:OpenXML
      Number of OLE Files:1
      Has Summary Info:
      Application Name:
      Encrypted Document:False
      Contains Word Document Stream:False
      Contains Workbook/Book Stream:True
      Contains PowerPoint Document Stream:False
      Contains Visio Document Stream:False
      Contains ObjectPool Stream:False
      Flash Objects Count:0
      Contains VBA Macros:False
      TimestampSource PortDest PortSource IPDest IP
      Aug 27, 2024 22:50:56.152971029 CEST49752443192.168.2.413.107.246.60
      Aug 27, 2024 22:50:56.153027058 CEST4434975213.107.246.60192.168.2.4
      Aug 27, 2024 22:50:56.153152943 CEST49752443192.168.2.413.107.246.60
      Aug 27, 2024 22:50:56.153242111 CEST49753443192.168.2.413.107.246.60
      Aug 27, 2024 22:50:56.153284073 CEST4434975313.107.246.60192.168.2.4
      Aug 27, 2024 22:50:56.153300047 CEST49754443192.168.2.413.107.246.60
      Aug 27, 2024 22:50:56.153307915 CEST4434975413.107.246.60192.168.2.4
      Aug 27, 2024 22:50:56.153362989 CEST49753443192.168.2.413.107.246.60
      Aug 27, 2024 22:50:56.153362989 CEST49754443192.168.2.413.107.246.60
      Aug 27, 2024 22:50:56.153569937 CEST49752443192.168.2.413.107.246.60
      Aug 27, 2024 22:50:56.153574944 CEST49753443192.168.2.413.107.246.60
      Aug 27, 2024 22:50:56.153584003 CEST4434975213.107.246.60192.168.2.4
      Aug 27, 2024 22:50:56.153587103 CEST4434975313.107.246.60192.168.2.4
      Aug 27, 2024 22:50:56.153608084 CEST49754443192.168.2.413.107.246.60
      Aug 27, 2024 22:50:56.153623104 CEST4434975413.107.246.60192.168.2.4
      Aug 27, 2024 22:50:56.804068089 CEST4434975413.107.246.60192.168.2.4
      Aug 27, 2024 22:50:56.804306984 CEST49754443192.168.2.413.107.246.60
      Aug 27, 2024 22:50:56.805905104 CEST49754443192.168.2.413.107.246.60
      Aug 27, 2024 22:50:56.805917978 CEST4434975413.107.246.60192.168.2.4
      Aug 27, 2024 22:50:56.806147099 CEST4434975413.107.246.60192.168.2.4
      Aug 27, 2024 22:50:56.807506084 CEST49754443192.168.2.413.107.246.60
      Aug 27, 2024 22:50:56.815515995 CEST4434975313.107.246.60192.168.2.4
      Aug 27, 2024 22:50:56.815861940 CEST49753443192.168.2.413.107.246.60
      Aug 27, 2024 22:50:56.817318916 CEST49753443192.168.2.413.107.246.60
      Aug 27, 2024 22:50:56.817327976 CEST4434975313.107.246.60192.168.2.4
      Aug 27, 2024 22:50:56.817568064 CEST4434975313.107.246.60192.168.2.4
      Aug 27, 2024 22:50:56.818903923 CEST49753443192.168.2.413.107.246.60
      Aug 27, 2024 22:50:56.829427958 CEST4434975213.107.246.60192.168.2.4
      Aug 27, 2024 22:50:56.830471039 CEST49752443192.168.2.413.107.246.60
      Aug 27, 2024 22:50:56.832443953 CEST49752443192.168.2.413.107.246.60
      Aug 27, 2024 22:50:56.832453966 CEST4434975213.107.246.60192.168.2.4
      Aug 27, 2024 22:50:56.832691908 CEST4434975213.107.246.60192.168.2.4
      Aug 27, 2024 22:50:56.833956957 CEST49752443192.168.2.413.107.246.60
      Aug 27, 2024 22:50:56.852503061 CEST4434975413.107.246.60192.168.2.4
      Aug 27, 2024 22:50:56.864501953 CEST4434975313.107.246.60192.168.2.4
      Aug 27, 2024 22:50:56.880498886 CEST4434975213.107.246.60192.168.2.4
      Aug 27, 2024 22:50:57.100285053 CEST4434975413.107.246.60192.168.2.4
      Aug 27, 2024 22:50:57.100333929 CEST4434975413.107.246.60192.168.2.4
      Aug 27, 2024 22:50:57.100441933 CEST49754443192.168.2.413.107.246.60
      Aug 27, 2024 22:50:57.100661039 CEST4434975313.107.246.60192.168.2.4
      Aug 27, 2024 22:50:57.100676060 CEST4434975313.107.246.60192.168.2.4
      Aug 27, 2024 22:50:57.100699902 CEST4434975313.107.246.60192.168.2.4
      Aug 27, 2024 22:50:57.100712061 CEST4434975313.107.246.60192.168.2.4
      Aug 27, 2024 22:50:57.100713968 CEST4434975213.107.246.60192.168.2.4
      Aug 27, 2024 22:50:57.100780010 CEST4434975213.107.246.60192.168.2.4
      Aug 27, 2024 22:50:57.100780010 CEST49753443192.168.2.413.107.246.60
      Aug 27, 2024 22:50:57.100780010 CEST49753443192.168.2.413.107.246.60
      Aug 27, 2024 22:50:57.100923061 CEST49752443192.168.2.413.107.246.60
      Aug 27, 2024 22:50:57.120462894 CEST49752443192.168.2.413.107.246.60
      Aug 27, 2024 22:50:57.120488882 CEST4434975213.107.246.60192.168.2.4
      Aug 27, 2024 22:50:57.120549917 CEST49752443192.168.2.413.107.246.60
      Aug 27, 2024 22:50:57.120556116 CEST4434975213.107.246.60192.168.2.4
      Aug 27, 2024 22:50:57.120670080 CEST49753443192.168.2.413.107.246.60
      Aug 27, 2024 22:50:57.120685101 CEST4434975313.107.246.60192.168.2.4
      Aug 27, 2024 22:50:57.120944023 CEST49753443192.168.2.413.107.246.60
      Aug 27, 2024 22:50:57.120944023 CEST49754443192.168.2.413.107.246.60
      Aug 27, 2024 22:50:57.120954037 CEST4434975313.107.246.60192.168.2.4
      Aug 27, 2024 22:50:57.120961905 CEST4434975413.107.246.60192.168.2.4
      Aug 27, 2024 22:50:57.120969057 CEST49754443192.168.2.413.107.246.60
      Aug 27, 2024 22:50:57.120971918 CEST4434975413.107.246.60192.168.2.4
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Aug 27, 2024 22:49:52.785501003 CEST1.1.1.1192.168.2.40xdac1No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
      Aug 27, 2024 22:49:52.785501003 CEST1.1.1.1192.168.2.40xdac1No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
      Aug 27, 2024 22:50:56.152168989 CEST1.1.1.1192.168.2.40xad73No error (0)shed.dual-low.s-part-0032.t-0009.t-msedge.nets-part-0032.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
      Aug 27, 2024 22:50:56.152168989 CEST1.1.1.1192.168.2.40xad73No error (0)s-part-0032.t-0009.t-msedge.net13.107.246.60A (IP address)IN (0x0001)false
      • otelrules.azureedge.net
      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      0192.168.2.44975413.107.246.604437920C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
      TimestampBytes transferredDirectionData
      2024-08-27 20:50:56 UTC208OUTGET /rules/rule170012v12s19.xml HTTP/1.1
      Connection: Keep-Alive
      Accept-Encoding: gzip
      User-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.16827; Pro)
      Host: otelrules.azureedge.net
      2024-08-27 20:50:57 UTC584INHTTP/1.1 200 OK
      Date: Tue, 27 Aug 2024 20:50:56 GMT
      Content-Type: text/xml
      Content-Length: 1353
      Connection: close
      Vary: Accept-Encoding
      Vary: Accept-Encoding
      Vary: Accept-Encoding
      Vary: Accept-Encoding
      Cache-Control: public, max-age=604800, immutable
      Last-Modified: Sat, 25 May 2024 18:28:18 GMT
      ETag: "0x8DC7CE8734A2850"
      x-ms-request-id: 5d3416d4-e01e-000f-3397-f6d35b000000
      x-ms-version: 2018-03-28
      x-azure-ref: 20240827T205056Z-15c77d89844lpwvj5ntbmq1cg80000000k3g00000000qbws
      x-fd-int-roxy-purgeid: 0
      X-Cache-Info: L1_T2
      X-Cache: TCP_HIT
      Accept-Ranges: bytes
      2024-08-27 20:50:57 UTC1353INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 37 30 30 31 32 22 20 56 3d 22 31 32 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 47 72 61 70 68 69 63 73 2e 47 56 69 7a 49 6e 6b 53 74 72 6f 6b 65 22 20 41 54 54 3d 22 63 66 63 66 64 62 39 31 63 36 38 63 34 33 32 39 62 62 38 62 37 63 62 37 62 61 62 62 33 63 66 37 2d 65 30 38 32 63 32 66 32 2d 65 66 31 64 2d 34 32 37 61 2d 61 63 34 64 2d 62 30 62 37 30 30 61 66 65 37 61 37 2d 37 36 35 35 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 43 61 3d 22 50 53 55 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 54 53 20 54
      Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="170012" V="12" DC="SM" EN="Office.Graphics.GVizInkStroke" ATT="cfcfdb91c68c4329bb8b7cb7babb3cf7-e082c2f2-ef1d-427a-ac4d-b0b700afe7a7-7655" SP="CriticalBusinessImpact" DCa="PSU" xmlns=""> <S> <UTS T


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      1192.168.2.44975313.107.246.604437920C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
      TimestampBytes transferredDirectionData
      2024-08-27 20:50:56 UTC206OUTGET /rules/rule63067v4s19.xml HTTP/1.1
      Connection: Keep-Alive
      Accept-Encoding: gzip
      User-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.16827; Pro)
      Host: otelrules.azureedge.net
      2024-08-27 20:50:57 UTC591INHTTP/1.1 200 OK
      Date: Tue, 27 Aug 2024 20:50:56 GMT
      Content-Type: text/xml
      Content-Length: 2871
      Connection: close
      Vary: Accept-Encoding
      Vary: Accept-Encoding
      Vary: Accept-Encoding
      Vary: Accept-Encoding
      Cache-Control: public, max-age=604800, immutable
      Last-Modified: Tue, 09 Apr 2024 00:28:05 GMT
      ETag: "0x8DC582BEC5E84E0"
      x-ms-request-id: 8b57f008-401e-0074-0720-f591c7000000
      x-ms-version: 2018-03-28
      x-azure-ref: 20240827T205056Z-15c77d89844n564ch5vmt0hbn00000000hv0000000000tax
      x-fd-int-roxy-purgeid: 0
      X-Cache-Info: L2_T2
      X-Cache: TCP_REMOTE_HIT
      Accept-Ranges: bytes
      2024-08-27 20:50:57 UTC2871INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 36 33 30 36 37 22 20 56 3d 22 34 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 49 64 65 6e 74 69 74 79 2e 53 73 70 69 50 72 6f 6d 70 74 57 69 6e 33 32 22 20 41 54 54 3d 22 35 63 36 35 62 62 63 34 65 64 62 66 34 38 30 64 39 36 33 37 61 63 65 30 34 64 36 32 62 64 39 38 2d 31 32 38 34 34 38 39 33 2d 38 61 62 39 2d 34 64 64 65 2d 62 38 35 30 2d 35 36 31 32 63 62 31 32 65 30 66 32 2d 37 38 32 32 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 4c 3d 22 41 22 20 44 43 61 3d 22 44 43 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20
      Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="63067" V="4" DC="SM" EN="Office.Identity.SspiPromptWin32" ATT="5c65bbc4edbf480d9637ace04d62bd98-12844893-8ab9-4dde-b850-5612cb12e0f2-7822" SP="CriticalBusinessImpact" DL="A" DCa="DC" xmlns=""> <S>


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      2192.168.2.44975213.107.246.604437920C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
      TimestampBytes transferredDirectionData
      2024-08-27 20:50:56 UTC207OUTGET /rules/rule170022v2s19.xml HTTP/1.1
      Connection: Keep-Alive
      Accept-Encoding: gzip
      User-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.16827; Pro)
      Host: otelrules.azureedge.net
      2024-08-27 20:50:57 UTC498INHTTP/1.1 200 OK
      Date: Tue, 27 Aug 2024 20:50:56 GMT
      Content-Type: text/xml
      Content-Length: 756
      Connection: close
      Cache-Control: public, max-age=604800, immutable
      Last-Modified: Sat, 27 Jul 2024 15:36:11 GMT
      ETag: "0x8DCAE51D7B4AB9D"
      x-ms-request-id: 0b7db1d9-101e-0017-1120-f547c7000000
      x-ms-version: 2018-03-28
      x-azure-ref: 20240827T205056Z-15c77d89844678z85cxpgnswe00000000hcg00000000e1m9
      x-fd-int-roxy-purgeid: 0
      X-Cache-Info: L2_T2
      X-Cache: TCP_REMOTE_HIT
      Accept-Ranges: bytes
      2024-08-27 20:50:57 UTC756INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 37 30 30 32 32 22 20 56 3d 22 32 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 47 72 61 70 68 69 63 73 2e 47 56 69 73 49 6e 6b 4c 6f 61 64 22 20 41 54 54 3d 22 63 66 63 66 64 62 39 31 63 36 38 63 34 33 32 39 62 62 38 62 37 63 62 37 62 61 62 62 33 63 66 37 2d 65 30 38 32 63 32 66 32 2d 65 66 31 64 2d 34 32 37 61 2d 61 63 34 64 2d 62 30 62 37 30 30 61 66 65 37 61 37 2d 37 36 35 35 22 20 53 3d 22 31 22 20 44 43 61 3d 22 50 53 55 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 54 53 20 54 3d 22 31 22 20 49 64 3d 22 62 38 69 70 6a 22 20 41 3d 22 61 6e 75 69 35 22
      Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="170022" V="2" DC="SM" EN="Office.Graphics.GVisInkLoad" ATT="cfcfdb91c68c4329bb8b7cb7babb3cf7-e082c2f2-ef1d-427a-ac4d-b0b700afe7a7-7655" S="1" DCa="PSU" xmlns=""> <S> <UTS T="1" Id="b8ipj" A="anui5"


      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:16:49:46
      Start date:27/08/2024
      Path:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
      Wow64 process (32bit):true
      Commandline:"C:\Program Files (x86)\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
      Imagebase:0x150000
      File size:53'161'064 bytes
      MD5 hash:4A871771235598812032C822E6F68F19
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:false

      Target ID:4
      Start time:16:50:50
      Start date:27/08/2024
      Path:C:\Windows\splwow64.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\splwow64.exe 12288
      Imagebase:0x7ff61d3c0000
      File size:163'840 bytes
      MD5 hash:77DE7761B037061C7C112FD3C5B91E73
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:false

      No disassembly