Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO-070-2024 EXW.docx

Overview

General Information

Sample name:PO-070-2024 EXW.docx
Analysis ID:1525993
MD5:ec393bad7364db40b4fb1d07a654ec54
SHA1:b51e6d26528e3667e87c29672dec312a6f4d7a90
SHA256:b36248f2e24e6ac7fa34c51336c87b0564f566bf37e4f80010ecffc0baf77986
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Microsoft Office launches external ms-search protocol handler (WebDAV)
Contains an external reference to another file
Office viewer loads remote template
Document misses a certain OLE stream usually present in this Microsoft Office document type
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Sigma detected: Suspicious Office Outbound Connections
Uses a known web browser user agent for HTTP communication
Uses insecure TLS / SSL version for HTTPS connection

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 3520 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
  • cleanup
No configs have been found
No yara matches
Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49161, EventID: 3, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, Initiated: true, ProcessId: 3520, Protocol: tcp, SourceIp: 213.183.76.22, SourceIsIpv6: false, SourcePort: 443
Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 3520, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 3520, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: unknownHTTPS traffic detected: 213.183.76.21:443 -> 192.168.2.22:49162 version: TLS 1.0
Source: unknownHTTPS traffic detected: 213.183.76.22:443 -> 192.168.2.22:49164 version: TLS 1.0
Source: unknownHTTPS traffic detected: 213.183.76.21:443 -> 192.168.2.22:49165 version: TLS 1.0
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: unknownHTTPS traffic detected: 213.183.76.22:443 -> 192.168.2.22:49161 version: TLS 1.2
Source: global trafficDNS query: name: stylite.io
Source: global trafficDNS query: name: stylite.io
Source: global trafficDNS query: name: stylite.io
Source: global trafficDNS query: name: stylite.io
Source: global trafficDNS query: name: stylite.io
Source: global trafficDNS query: name: stylite.io
Source: global trafficDNS query: name: stylite.io
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49166 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49166 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49166 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49166 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49166 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49166 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49166 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 213.183.76.22:443
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 213.183.76.22:443
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 213.183.76.22:443
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 213.183.76.22:443
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 213.183.76.22:443
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 213.183.76.21:443
Source: global trafficTCP traffic: 213.183.76.21:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 213.183.76.21:443
Source: global trafficTCP traffic: 213.183.76.21:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 213.183.76.21:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 213.183.76.21:443
Source: global trafficTCP traffic: 213.183.76.21:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 213.183.76.21:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 213.183.76.21:443
Source: global trafficTCP traffic: 213.183.76.21:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 213.183.76.21:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 213.183.76.21:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 213.183.76.21:443
Source: global trafficTCP traffic: 213.183.76.21:443 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 213.183.76.21:443
Source: global trafficTCP traffic: 213.183.76.21:443 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 213.183.76.21:443
Source: global trafficTCP traffic: 213.183.76.21:443 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 213.183.76.21:443 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 213.183.76.21:443
Source: global trafficTCP traffic: 213.183.76.21:443 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 213.183.76.21:443
Source: global trafficTCP traffic: 213.183.76.21:443 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 213.183.76.21:443 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 213.183.76.21:443 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 213.183.76.21:443
Source: global trafficTCP traffic: 213.183.76.21:443 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 213.183.76.22:443
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49164
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 213.183.76.22:443
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49164
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49164
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 213.183.76.22:443
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49164
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49164
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 213.183.76.22:443
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49164
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49164
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49164
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 213.183.76.22:443
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49164
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 213.183.76.21:443
Source: global trafficTCP traffic: 213.183.76.21:443 -> 192.168.2.22:49165
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 213.183.76.21:443
Source: global trafficTCP traffic: 213.183.76.21:443 -> 192.168.2.22:49165
Source: global trafficTCP traffic: 213.183.76.21:443 -> 192.168.2.22:49165
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 213.183.76.21:443
Source: global trafficTCP traffic: 213.183.76.21:443 -> 192.168.2.22:49165
Source: global trafficTCP traffic: 213.183.76.21:443 -> 192.168.2.22:49165
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 213.183.76.21:443
Source: global trafficTCP traffic: 213.183.76.21:443 -> 192.168.2.22:49165
Source: global trafficTCP traffic: 213.183.76.21:443 -> 192.168.2.22:49165
Source: global trafficTCP traffic: 213.183.76.21:443 -> 192.168.2.22:49165
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 213.183.76.21:443
Source: global trafficTCP traffic: 213.183.76.21:443 -> 192.168.2.22:49165
Source: global trafficTCP traffic: 192.168.2.22:49166 -> 213.183.76.21:443
Source: global trafficTCP traffic: 213.183.76.21:443 -> 192.168.2.22:49166
Source: global trafficTCP traffic: 192.168.2.22:49166 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49166 -> 213.183.76.21:443
Source: global trafficTCP traffic: 213.183.76.21:443 -> 192.168.2.22:49166
Source: global trafficTCP traffic: 213.183.76.21:443 -> 192.168.2.22:49166
Source: global trafficTCP traffic: 192.168.2.22:49166 -> 213.183.76.21:443
Source: global trafficTCP traffic: 213.183.76.21:443 -> 192.168.2.22:49166
Source: global trafficTCP traffic: 192.168.2.22:49166 -> 213.183.76.21:443
Source: global trafficTCP traffic: 213.183.76.21:443 -> 192.168.2.22:49166
Source: global trafficTCP traffic: 213.183.76.21:443 -> 192.168.2.22:49166
Source: global trafficTCP traffic: 213.183.76.21:443 -> 192.168.2.22:49166
Source: global trafficTCP traffic: 192.168.2.22:49166 -> 213.183.76.21:443
Source: global trafficTCP traffic: 192.168.2.22:49166 -> 213.183.76.21:443
Source: global trafficTCP traffic: 213.183.76.21:443 -> 192.168.2.22:49166
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 213.183.76.22:443
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49167
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 213.183.76.22:443
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49167
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49167
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 213.183.76.22:443
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49167
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 213.183.76.22:443
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49167
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49167
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49167
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 213.183.76.22:443
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49167
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 213.183.76.22:443
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49168
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 213.183.76.22:443
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49168
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49168
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 213.183.76.22:443
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49168
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 213.183.76.22:443
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49168
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49168
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49168
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49168
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 213.183.76.22:443
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49168
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 213.183.76.22:443
Source: global trafficTCP traffic: 213.183.76.22:443 -> 192.168.2.22:49168
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 213.183.76.22:443
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 213.183.76.22:443
Source: Joe Sandbox ViewASN Name: PFALZKOM-NETKoschatplatz1DE PFALZKOM-NETKoschatplatz1DE
Source: Joe Sandbox ViewJA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d
Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
Source: global trafficHTTP traffic detected: GET /G2eK HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: stylite.ioConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /404 HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: stylite.ioConnection: Keep-Alive
Source: unknownHTTPS traffic detected: 213.183.76.21:443 -> 192.168.2.22:49162 version: TLS 1.0
Source: unknownHTTPS traffic detected: 213.183.76.22:443 -> 192.168.2.22:49164 version: TLS 1.0
Source: unknownHTTPS traffic detected: 213.183.76.21:443 -> 192.168.2.22:49165 version: TLS 1.0
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{C5D7766F-BCC3-4F8D-B0D1-2EF8DB43D0A9}.tmpJump to behavior
Source: global trafficHTTP traffic detected: GET /G2eK HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: stylite.ioConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /404 HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: stylite.ioConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: stylite.io
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Length: 4645Content-Type: text/html; charset=utf-8Date: Fri, 04 Oct 2024 14:32:21 GMTEtag: "1225-4lR+8o8+z0M1Iq6OMuNgxAtPjT8"Strict-Transport-Security: max-age=15552000; includeSubDomainsVary: Accept-EncodingX-Content-Type-Options: nosniffX-Dns-Prefetch-Control: offX-Download-Options: noopenX-Frame-Options: SAMEORIGINX-Powered-By: Next.jsX-Xss-Protection: 1; mode=blockConnection: close
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Length: 144Content-Security-Policy: default-src 'none'Content-Type: text/html; charset=utf-8Date: Fri, 04 Oct 2024 14:32:26 GMTStrict-Transport-Security: max-age=15552000; includeSubDomainsX-Content-Type-Options: nosniffX-Dns-Prefetch-Control: offX-Download-Options: noopenX-Frame-Options: SAMEORIGINX-Xss-Protection: 1; mode=blockConnection: close
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Length: 144Content-Security-Policy: default-src 'none'Content-Type: text/html; charset=utf-8Date: Fri, 04 Oct 2024 14:32:28 GMTStrict-Transport-Security: max-age=15552000; includeSubDomainsX-Content-Type-Options: nosniffX-Dns-Prefetch-Control: offX-Download-Options: noopenX-Frame-Options: SAMEORIGINX-Xss-Protection: 1; mode=blockConnection: close
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=utf-8Date: Fri, 04 Oct 2024 14:32:30 GMTEtag: "1225-4lR+8o8+z0M1Iq6OMuNgxAtPjT8"Strict-Transport-Security: max-age=15552000; includeSubDomainsVary: Accept-EncodingX-Content-Type-Options: nosniffX-Dns-Prefetch-Control: offX-Download-Options: noopenX-Frame-Options: SAMEORIGINX-Powered-By: Next.jsX-Xss-Protection: 0Connection: closeTransfer-Encoding: chunked
Source: unknownNetwork traffic detected: HTTP traffic on port 49161 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49163 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49168
Source: unknownNetwork traffic detected: HTTP traffic on port 49162 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49167
Source: unknownNetwork traffic detected: HTTP traffic on port 49164 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49166
Source: unknownNetwork traffic detected: HTTP traffic on port 49165 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49165
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49164
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49163
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49162
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49161
Source: unknownNetwork traffic detected: HTTP traffic on port 49168 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49167 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49166 -> 443
Source: unknownHTTPS traffic detected: 213.183.76.22:443 -> 192.168.2.22:49161 version: TLS 1.2
Source: ~WRF{D9F34C1E-4854-4139-A8B6-41A439905E70}.tmp.1.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: classification engineClassification label: mal56.evad.winDOCX@1/16@7/2
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$-070-2024 EXW.docxJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRB940.tmpJump to behavior
Source: PO-070-2024 EXW.docxOLE indicator, Word Document stream: true
Source: ~WRD0000.tmp.1.drOLE indicator, Word Document stream: true
Source: PO-070-2024 EXW.docxOLE document summary: title field not present or empty
Source: ~WRF{D9F34C1E-4854-4139-A8B6-41A439905E70}.tmp.1.drOLE document summary: title field not present or empty
Source: ~WRF{D9F34C1E-4854-4139-A8B6-41A439905E70}.tmp.1.drOLE document summary: edited time not present or 0
Source: ~WRD0000.tmp.1.drOLE document summary: title field not present or empty
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: PO-070-2024 EXW.LNK.1.drLNK file: ..\..\..\..\..\Desktop\PO-070-2024 EXW.docx
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: PO-070-2024 EXW.docxInitial sample: OLE zip file path = word/_rels/footer2.xml.rels
Source: PO-070-2024 EXW.docxInitial sample: OLE zip file path = word/media/image3.emf
Source: PO-070-2024 EXW.docxInitial sample: OLE zip file path = word/media/image2.emf
Source: PO-070-2024 EXW.docxInitial sample: OLE zip file path = word/_rels/settings.xml.rels
Source: ~WRD0000.tmp.1.drInitial sample: OLE zip file path = word/_rels/footer2.xml.rels
Source: ~WRD0000.tmp.1.drInitial sample: OLE zip file path = word/embeddings/Microsoft_Excel_Worksheet2.xlsx
Source: ~WRD0000.tmp.1.drInitial sample: OLE zip file path = word/embeddings/Microsoft_Excel_Worksheet1.xlsx
Source: ~WRD0000.tmp.1.drInitial sample: OLE zip file path = word/media/image2.emf
Source: ~WRD0000.tmp.1.drInitial sample: OLE zip file path = word/media/image3.emf
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: PO-070-2024 EXW.docxInitial sample: OLE indicators vbamacros = False

Persistence and Installation Behavior

barindex
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \Device\RdpDr\;:1\stylite.io@SSL\DavWWWRootJump to behavior
Source: settings.xml.relsExtracted files from sample: https://stylite.io/g2ek
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXESection loaded: netapi32.dll and davhlpr.dll loadedJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: ~WRF{D9F34C1E-4854-4139-A8B6-41A439905E70}.tmp.1.drStream path '_1789543103/Package' entropy: 7.94289414861 (max. 8.0)
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
Exploitation for Client Execution
Path InterceptionPath Interception1
Masquerading
OS Credential Dumping1
File and Directory Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Obfuscated Files or Information
LSASS Memory2
System Information Discovery
Remote Desktop ProtocolData from Removable Media3
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive14
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture4
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
PO-070-2024 EXW.docx11%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
stylite.io
213.183.76.22
truetrue
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://stylite.io/G2eKfalse
      unknown
      https://stylite.io/404false
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        213.183.76.22
        stylite.ioGermany
        15945PFALZKOM-NETKoschatplatz1DEtrue
        213.183.76.21
        unknownGermany
        15945PFALZKOM-NETKoschatplatz1DEfalse
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1525993
        Start date and time:2024-10-04 16:31:01 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 4m 50s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:defaultwindowsofficecookbook.jbs
        Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
        Number of analysed new started processes analysed:9
        Number of new started drivers analysed:1
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:PO-070-2024 EXW.docx
        Detection:MAL
        Classification:mal56.evad.winDOCX@1/16@7/2
        EGA Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .docx
        • Found Word or Excel or PowerPoint or XPS Viewer
        • Attach to Office via COM
        • Scroll down
        • Close Viewer
        • Exclude process from analysis (whitelisted): mrxdav.sys, dllhost.exe, rundll32.exe, WMIADAP.exe
        • Report size getting too big, too many NtQueryValueKey calls found.
        • VT rate limit hit for: PO-070-2024 EXW.docx
        No simulations
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        213.183.76.22DHL Shipment Doc's.xlsGet hashmaliciousRemcosBrowse
          TTXAPPLICATION.xlsGet hashmaliciousSnake KeyloggerBrowse
            213.183.76.21DHL Shipment Doc's.xlsGet hashmaliciousRemcosBrowse
              TTXAPPLICATION.xlsGet hashmaliciousSnake KeyloggerBrowse
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                stylite.ioDHL Shipment Doc's.xlsGet hashmaliciousRemcosBrowse
                • 213.183.76.21
                TTXAPPLICATION.xlsGet hashmaliciousSnake KeyloggerBrowse
                • 213.183.76.21
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                PFALZKOM-NETKoschatplatz1DEDHL Shipment Doc's.xlsGet hashmaliciousRemcosBrowse
                • 213.183.76.21
                TTXAPPLICATION.xlsGet hashmaliciousSnake KeyloggerBrowse
                • 213.183.76.21
                yakov.mpsl.elfGet hashmaliciousMiraiBrowse
                • 94.176.172.127
                154.216.18.223-mips-2024-08-17T03_44_00.elfGet hashmaliciousMiraiBrowse
                • 77.72.217.98
                file.exeGet hashmaliciousUnknownBrowse
                • 213.206.184.75
                http://internet-scanner.com/?rid=ecXtVpPGet hashmaliciousUnknownBrowse
                • 213.183.73.232
                KCM5U9fQEI.elfGet hashmaliciousMoobotBrowse
                • 213.183.70.203
                http://gslb00.www.bancsabadell.com.as60813.netGet hashmaliciousPhisherBrowse
                • 45.148.222.10
                WCJX7dbLAq.elfGet hashmaliciousMirai, MoobotBrowse
                • 213.183.70.201
                PFALZKOM-NETKoschatplatz1DEDHL Shipment Doc's.xlsGet hashmaliciousRemcosBrowse
                • 213.183.76.21
                TTXAPPLICATION.xlsGet hashmaliciousSnake KeyloggerBrowse
                • 213.183.76.21
                yakov.mpsl.elfGet hashmaliciousMiraiBrowse
                • 94.176.172.127
                154.216.18.223-mips-2024-08-17T03_44_00.elfGet hashmaliciousMiraiBrowse
                • 77.72.217.98
                file.exeGet hashmaliciousUnknownBrowse
                • 213.206.184.75
                http://internet-scanner.com/?rid=ecXtVpPGet hashmaliciousUnknownBrowse
                • 213.183.73.232
                KCM5U9fQEI.elfGet hashmaliciousMoobotBrowse
                • 213.183.70.203
                http://gslb00.www.bancsabadell.com.as60813.netGet hashmaliciousPhisherBrowse
                • 45.148.222.10
                WCJX7dbLAq.elfGet hashmaliciousMirai, MoobotBrowse
                • 213.183.70.201
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                05af1f5ca1b87cc9cc9b25185115607dDHL Shipment Doc's.xlsGet hashmaliciousRemcosBrowse
                • 213.183.76.22
                • 213.183.76.21
                GEJMING DUO USD 20241002144902.docx.docGet hashmaliciousRemcosBrowse
                • 213.183.76.22
                • 213.183.76.21
                Swift Copy.xlsGet hashmaliciousUnknownBrowse
                • 213.183.76.22
                • 213.183.76.21
                PO-00536.xlsGet hashmaliciousRemcosBrowse
                • 213.183.76.22
                • 213.183.76.21
                Formularz instrukcji p#U0142atno#U015bci Millennium.xlsGet hashmaliciousRemcosBrowse
                • 213.183.76.22
                • 213.183.76.21
                MT103-93850.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                • 213.183.76.22
                • 213.183.76.21
                StatementXofXaccount.docx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                • 213.183.76.22
                • 213.183.76.21
                TTXAPPLICATION.xlsGet hashmaliciousSnake KeyloggerBrowse
                • 213.183.76.22
                • 213.183.76.21
                CxVokk1Xp2.rtfGet hashmaliciousRemcosBrowse
                • 213.183.76.22
                • 213.183.76.21
                7dcce5b76c8b17472d024758970a406bDHL Shipment Doc's.xlsGet hashmaliciousRemcosBrowse
                • 213.183.76.22
                PO20241003.xlsGet hashmaliciousUnknownBrowse
                • 213.183.76.22
                GEJMING DUO USD 20241002144902.docx.docGet hashmaliciousRemcosBrowse
                • 213.183.76.22
                PO20241003.xlsGet hashmaliciousUnknownBrowse
                • 213.183.76.22
                Swift Copy.xlsGet hashmaliciousUnknownBrowse
                • 213.183.76.22
                PO-00536.xlsGet hashmaliciousRemcosBrowse
                • 213.183.76.22
                Formularz instrukcji p#U0142atno#U015bci Millennium.xlsGet hashmaliciousRemcosBrowse
                • 213.183.76.22
                TTXAPPLICATION.xlsGet hashmaliciousSnake KeyloggerBrowse
                • 213.183.76.22
                Request For Quotation- PO22719.xlsxGet hashmaliciousFormBookBrowse
                • 213.183.76.22
                No context
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):131072
                Entropy (8bit):0.02573908657392288
                Encrypted:false
                SSDEEP:6:I3DPcVQJBaWvxggLRJcUy6OssDRXv//4tfnRujlw//+GtluJ/eRuj:I3DPEQbmKOss1vYg3J/
                MD5:E4721111BF3701C41F9098F89A0F94B0
                SHA1:B2236F1BF555541FACFADD8B63772AAE1FF4274A
                SHA-256:A368586B6B3E1A0C13015704837FC6E398ED82EDE911B6F6B60985361DCB47C2
                SHA-512:5DF3170D1749E96FA92845E618B6C7A59B2D8397BA959254BDCE1EB58549CDD58E259D42CB902C5117C38C7FEFB05C9F451062183B221E5008199C44D0EDD7BB
                Malicious:false
                Reputation:low
                Preview:......M.eFy...zRu,t>..C.$.^HZ.S,...X.F...Fa.q............................^."..hoA.[.+rb.V........=..)./lO..{.;.......................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                Category:dropped
                Size (bytes):484160
                Entropy (8bit):3.8864316104704324
                Encrypted:false
                SSDEEP:1536:6lGUVs3QKMY4ELH5RQVKTT1HXxlUL7z5likIUvIfxT0kPrS2:ZLZRQVGB4fj2
                MD5:A61798BF257485BAA37AD0863DFDA9C6
                SHA1:6356E87D0D93FD7DAAF225AF3DFCCA27705A2717
                SHA-256:1AE272725C8CC33D6CA16533E9BFE2B91885C1F8926F13D8F3475192174BFA54
                SHA-512:E1FBE16E09A75D6C1A98F9EC9224350214B0E34EC0049870CAE03D90CF78BE5FFF3ECE69E4149729DF6F731D0E7630A64C800DFCA63EF06A862D512C30E3FC68
                Malicious:false
                Reputation:low
                Preview:....l................................... EMF....@c..........................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!......................................................."...........!......................................................."...........!......................................................."...........!......................................................."...........!.......................................................'.......................%...........................................................L...d...............:...............T...!..............?...........?................................'.............../T......%...........(.................../T..L...d...........l...:...............
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                Category:dropped
                Size (bytes):1256732
                Entropy (8bit):3.82589372392918
                Encrypted:false
                SSDEEP:12288:c3t3bECFzKzjLBMc0GtIRabD8R1AZJBa5jB7gOaOG/:cBACi8BiJK+d
                MD5:082E8FBE73D98FD6C861150EF1FC0905
                SHA1:C91ECCF6C9A73B74D9D1442EB72A8D6F650EDC64
                SHA-256:574EF96FEF6B764D4047BB2D714AB5D753EC81E87BC9F5AD1526DB74446E3B13
                SHA-512:AFEE4534199071801E19AE9D8E57B396989746E3F9D7081337B85B4B2108625849364BD04AFBA41261CC731BD54A83D8269A5EF74EE1878B157628C34240E751
                Malicious:false
                Reputation:low
                Preview:....l............................H...@.. EMF.....-..U.......................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!......................................................."...........!......................................................."...........!......................................................."...........!......................................................."...........!......................................................."...........!.......................................................'.......................%...........................................................&...........................%...........................6...............%...........L...d...................................!...
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                Category:dropped
                Size (bytes):7388
                Entropy (8bit):3.4978769133855403
                Encrypted:false
                SSDEEP:48:JI37fPfjYzJSEfNjyyeffffffffffffffffffffffVa7FyltyzzlYYqEVPq6Bl6N:O3TWGy9B6YkyJiEf1U0i
                MD5:7E1524EDF040EB5EDBD1BED6E70730B4
                SHA1:1C8B74CE483139667E3C99CFDEFD780B6CC83C96
                SHA-256:AED73DE15274C7EFD791BE09A2DD14579E49B567958A54EAFC39AA7CDA0F1F81
                SHA-512:2A8497100334680D6CCF7A8C353F3796D6B158337645B735914B1C8520B5664069E4B062DAA9D76452C8517B3FFC9785A1E0FA5A5747DB9C75C98BD8BDA203AC
                Malicious:false
                Reputation:low
                Preview:....l...............<...........O....... EMF................................8...X....................?..................................C...R...p...................................S.e.g.o.e. .U.I...................................................p.6.).X.....m.d...................t.:.0.:....t....\...t.:.....t.:..:.7..t....t.:.L].v?..t.......t0.p...fw..............:...cw....$.....&.d.........:.*X.t.....X.t@........qk.....-....:.6=bw................<..u.[7w....X..V....0.p.......................8wdv......%...................................r.......`...........'...`.......(...(..................?...........?................l...4...........(...(...(...(...(..... .................................................................................................................................................................................................................................... .. ".. ".. ".. ".. ".. ".. ".. ".. ".. ".. ".. ".. ".. ".. ".. ".. ".. ".. ".. ".. ".. ".. ".. "........
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:Composite Document File V2 Document, Cannot read section info
                Category:dropped
                Size (bytes):258048
                Entropy (8bit):7.83885305146706
                Encrypted:false
                SSDEEP:6144:MlNJQEA/8vLYjE7yeVDxHg9VImcfl7CTjQQm:aJNQU9XHgrImckAQm
                MD5:D6CD67EE581035CF9DA53E872FD9A874
                SHA1:650B06F1BCCFD095AE536F8777634E4447FB4DC2
                SHA-256:40B6F94A4398E71D513EFBCB0F028C60F7E639550FF4C6577EA679B390A98A4D
                SHA-512:C2EBB8C50964D94F963D6EEBCF6B2C2B4375754FF3D642C2CFA390328F4D05043AF67E03718E8E193AF605FBC13BFB3E25BA12BBB93887DC1A7E70904F5679F6
                Malicious:false
                Reputation:low
                Preview:......................>.......................................................h...i...............................................................................................................................................................................................................................................................................................................................................................................................................................................g....................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...................k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):1536
                Entropy (8bit):2.9224663475921906
                Encrypted:false
                SSDEEP:24:9naGMCleK+KslMb8jjHl+8HLHr9Dryn/n:9dSl48jjHl+AVa/
                MD5:48209ABC7CBA4D3C6666C7E52CEE5D37
                SHA1:EBA07D8797F60AAB19A8EDD7C6A8029E754E2F5F
                SHA-256:0EF88EB7F39465C30420CE0B8CD740893DE4FCE3870E06CE57249514CB051623
                SHA-512:72DA5775CFE0E7FC961D5600E0BB3FA860CBF10E558738730CB414EF96FA52503029B7CBD72076AEDB22331F856837D2524E35EB1FE3CA241B8400206AB39B40
                Malicious:false
                Preview:.................................................................. .!.".#.$.%.&.'.(.).*.+.,.-.../.0.1.2.3.4.5.6.7.8.9.:.;.<.=.>.........................E.M.B.E.D. .P.a.c.k.a.g.e..... . .....E.M.B.E.D. .E.x.c.e.l...S.h.e.e.t...1.2..... . .....E.M.B.E.D. .E.x.c.e.l...S.h.e.e.t...1.2..... . ...5.e.+.5.N.5.[.=.5.X.=.0.5.[.5.[.5.X.5.e.5.X.5.N.5.[.."5.X...........................................................................................................................................................................................................................`...b...d...f...j...n...r....................................................................................................................................................................................................................................................................................................................................................................................................d........gdWX......
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):1024
                Entropy (8bit):0.05390218305374581
                Encrypted:false
                SSDEEP:3:ol3lYdn:4Wn
                MD5:5D4D94EE7E06BBB0AF9584119797B23A
                SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                Malicious:false
                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):131072
                Entropy (8bit):0.02573908657392288
                Encrypted:false
                SSDEEP:6:I3DPcVQJBaWvxggLRJcUy6OssDRXv//4tfnRujlw//+GtluJ/eRuj:I3DPEQbmKOss1vYg3J/
                MD5:E4721111BF3701C41F9098F89A0F94B0
                SHA1:B2236F1BF555541FACFADD8B63772AAE1FF4274A
                SHA-256:A368586B6B3E1A0C13015704837FC6E398ED82EDE911B6F6B60985361DCB47C2
                SHA-512:5DF3170D1749E96FA92845E618B6C7A59B2D8397BA959254BDCE1EB58549CDD58E259D42CB902C5117C38C7FEFB05C9F451062183B221E5008199C44D0EDD7BB
                Malicious:false
                Preview:......M.eFy...zRu,t>..C.$.^HZ.S,...X.F...Fa.q............................^."..hoA.[.+rb.V........=..)./lO..{.;.......................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):131072
                Entropy (8bit):0.02570204774814565
                Encrypted:false
                SSDEEP:6:I3DPcpn9ZqR5HvxggLR/oNvfFRXv//4tfnRujlw//+GtluJ/eRuj:I3DP4n9ZqfPTmXbvYg3J/
                MD5:A3D260F83F1E423E566B4B052795FCA1
                SHA1:6EDAB22F727894D4967F065DBCDF6AEE44B56344
                SHA-256:00A58D7E247D468E3E83EBB01990E001D156C6BA4EAA455FB7F9F3611525D42A
                SHA-512:45C8A6B565025F86B3D8C501C2F6D4F6681C56CCCAE27897463B329DBD5F7F6C726729309199E67BE5A164B56F22468DA82F6C6F9D7AA3075E98B61A9BC44FD2
                Malicious:false
                Preview:......M.eFy...zn.`...{C..vk.\6!S,...X.F...Fa.q..............................c...B..............m.t...N.a.....|.....................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 11 15:42:14 2023, mtime=Fri Aug 11 15:42:14 2023, atime=Fri Oct 4 13:32:05 2024, length=458184, window=hide
                Category:dropped
                Size (bytes):1044
                Entropy (8bit):4.523489311449114
                Encrypted:false
                SSDEEP:12:8z57LSK6hgXg/XAlCPCHaXeIBO1B/VoX+WByfHc8MhSTkicvbz/dl2mNDtZ3Yiln:8t7rS/XTOI41M/y0STePPdDv3qwti57u
                MD5:6817927283F3F900076A5B6DEC58A4EE
                SHA1:A513EEA8B4ACB07CA742EC217D3FDF631E472938
                SHA-256:0F9FEC1316F55E41A1FD76F812B80E3145E7508E7CAFF45F30730E7344877FFD
                SHA-512:552564ED282138D15B4FFE8A2FA44D490B998D56A4A20A627E617F892D40FBC27FD034E3862E11EC6C60D6AF0833ED61825A799B8C4341849A0B15D8F304B25D
                Malicious:false
                Preview:L..................F.... ...Tn..r...Tn..r....w|/j................................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1.....DY.t..user.8......QK.XDY.t*...&=....U...............A.l.b.u.s.....z.1......WJ...Desktop.d......QK.X.WJ.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....r.2.....DY.t .PO-070~1.DOC..V.......WH..WH.*.........................P.O.-.0.7.0.-.2.0.2.4. .E.X.W...d.o.c.x.......~...............-...8...[............?J......C:\Users\..#...................\\506013\Users.user\Desktop\PO-070-2024 EXW.docx.+.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.P.O.-.0.7.0.-.2.0.2.4. .E.X.W...d.o.c.x.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......506013..........D_....3N...W...9..W.e8..
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:Generic INItialization configuration [folders]
                Category:dropped
                Size (bytes):65
                Entropy (8bit):4.6685216591823
                Encrypted:false
                SSDEEP:3:H+MVItj/pulm4YPVItj/pulv:Hc/AGK/A1
                MD5:69A8027DD969F55C758F182BEF5CF96B
                SHA1:D31483783E488E663779755B43C39F91C8852AC3
                SHA-256:0EF79362195421BAE0520ACE450D8A335B5F19EE0C35930674D482F29284AF8D
                SHA-512:D7F59D6C04808BE7B0DB197A4658D2062DF758FF2C2561C7855F9F08147EDBF254146D447DDE94A779492DC136CEC321AB06C6878B221A4EFB22018A215C1176
                Malicious:false
                Preview:[misc]..PO-070-2024 EXW.LNK=0..[folders]..PO-070-2024 EXW.LNK=0..
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):162
                Entropy (8bit):2.503835550707526
                Encrypted:false
                SSDEEP:3:vrJlaCkWtVybAyaHgdWM2qFfln:vdsCkWt4aAB9l
                MD5:0242FE15C357E1F4F690389FA2A5D79D
                SHA1:A45B5C025BF4B6F9CD21A65AE6FFA6EB99BD46AC
                SHA-256:4FEB171EECBB41AC06DA90CFD42C190C3FFC40A8187406C1AE8D4EFE5BEE0162
                SHA-512:605CEDA901D869E1E562947187FEE88B1A95A47F9E06D3C144895D16A7DF25AE41E54702A88840C67D4374479D068182DBD851536937BB66004A8162F01645BB
                Malicious:false
                Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:Microsoft Word 2007+
                Category:dropped
                Size (bytes):529558
                Entropy (8bit):7.955947071682177
                Encrypted:false
                SSDEEP:12288:VmckAQmgQU9XHgrdg6KUONqta0GCSSFhaGPONT+srQ4E8VM:VmckL5QUur2QONqg0GQM53iIM
                MD5:3397DE5A24FF54A1CEB764ED1BADC838
                SHA1:61391537626A672FA2268892FE22CDB155DFF52A
                SHA-256:B1897F18A913A629F13ECD7707D3A5FABA65DB0A5FAD440C2C19D8A71D6AF42C
                SHA-512:1131B4053EA406B6569E54C60A0AC729CFAB895C5CDDD8EFFB326786905519EDF636336E902050251B8A93022CB29C518F0C58206223626B73DF378FBD529932
                Malicious:false
                Preview:PK..........!.................[Content_Types].xml ...(....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................VMo.0.....0t.l..0.C.....X..........&.~...].D..........E..V.#x.....Leki.%.....f..aj....m.......r..3.6X.6...s.Z......Jc...>..;Q.5........`B.".[.B#.T.n6..W...e...HU2...$.?.z.$.M#+.m......nW..........K..m.r8.........c+.~ k.0..Y..S.9......Qc...*.w.xK'....;..w........>.V.&.h...........4;.....U...U..#.....4...1J4.1.x..f...1$.w.~s.c:>#'%<...d*^.'.4..c......"...i.!'%.../...=.H..7..$..8...m..G..e....O.?2..F..X)8...
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):162
                Entropy (8bit):2.503835550707526
                Encrypted:false
                SSDEEP:3:vrJlaCkWtVybAyaHgdWM2qFfln:vdsCkWt4aAB9l
                MD5:0242FE15C357E1F4F690389FA2A5D79D
                SHA1:A45B5C025BF4B6F9CD21A65AE6FFA6EB99BD46AC
                SHA-256:4FEB171EECBB41AC06DA90CFD42C190C3FFC40A8187406C1AE8D4EFE5BEE0162
                SHA-512:605CEDA901D869E1E562947187FEE88B1A95A47F9E06D3C144895D16A7DF25AE41E54702A88840C67D4374479D068182DBD851536937BB66004A8162F01645BB
                Malicious:false
                Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:Microsoft Word 2007+
                Category:dropped
                Size (bytes):529558
                Entropy (8bit):7.955947071682177
                Encrypted:false
                SSDEEP:12288:VmckAQmgQU9XHgrdg6KUONqta0GCSSFhaGPONT+srQ4E8VM:VmckL5QUur2QONqg0GQM53iIM
                MD5:3397DE5A24FF54A1CEB764ED1BADC838
                SHA1:61391537626A672FA2268892FE22CDB155DFF52A
                SHA-256:B1897F18A913A629F13ECD7707D3A5FABA65DB0A5FAD440C2C19D8A71D6AF42C
                SHA-512:1131B4053EA406B6569E54C60A0AC729CFAB895C5CDDD8EFFB326786905519EDF636336E902050251B8A93022CB29C518F0C58206223626B73DF378FBD529932
                Malicious:false
                Preview:PK..........!.................[Content_Types].xml ...(....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................VMo.0.....0t.l..0.C.....X..........&.~...].D..........E..V.#x.....Leki.%.....f..aj....m.......r..3.6X.6...s.Z......Jc...>..;Q.5........`B.".[.B#.T.n6..W...e...HU2...$.?.z.$.M#+.m......nW..........K..m.r8.........c+.~ k.0..Y..S.9......Qc...*.w.xK'....;..w........>.V.&.h...........4;.....U...U..#.....4...1J4.1.x..f...1$.w.~s.c:>#'%<...d*^.'.4..c......"...i.!'%.../...=.H..7..$..8...m..G..e....O.?2..F..X)8...
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:ASCII text, with CRLF line terminators
                Category:modified
                Size (bytes):26
                Entropy (8bit):3.95006375643621
                Encrypted:false
                SSDEEP:3:ggPYV:rPYV
                MD5:187F488E27DB4AF347237FE461A079AD
                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                Malicious:false
                Preview:[ZoneTransfer]....ZoneId=0
                File type:Microsoft Word 2007+
                Entropy (8bit):7.99374264934029
                TrID:
                • Word Microsoft Office Open XML Format document (49504/1) 58.23%
                • Word Microsoft Office Open XML Format document (27504/1) 32.35%
                • ZIP compressed archive (8000/1) 9.41%
                File name:PO-070-2024 EXW.docx
                File size:458'184 bytes
                MD5:ec393bad7364db40b4fb1d07a654ec54
                SHA1:b51e6d26528e3667e87c29672dec312a6f4d7a90
                SHA256:b36248f2e24e6ac7fa34c51336c87b0564f566bf37e4f80010ecffc0baf77986
                SHA512:884a96308b7fa83f47db4006fe0c5ca8ce92143f534447826ed5f43efcaef6cefd1592b56fdbd02248df7080f3ca0b51d3f72886564dad95b24aec51e2c93e79
                SSDEEP:12288:GMY4Eg5/Y+vnfrYbCGGmdq/c2KoTQkBaJhR+6EiXyC:GlBwL3rYbCGGyyLKcd8JhxEiXyC
                TLSH:7DA423E5F44C2C655E85083E05159E14B3AFDF9FC0071AAF3779092AE9A684EEF580CE
                File Content Preview:PK........&.CY...k....'.......[Content_Types].xmlUT......f...f...f.V.n.0....?......(..r.].M...@.#.-E..Ib.}..c.A"9u._$..............._.y5..x....Z...V~....F....[@q.|.nq.....=..%...D.B....<G..:E...2*.[.A^.f.....SI.C,.7l Y...J.]u.#.C2...| ...D...e.Z.......|..
                Icon Hash:65e6a3a3afb7bdbf
                Document Type:OpenXML
                Number of OLE Files:1
                Has Summary Info:
                Application Name:
                Encrypted Document:False
                Contains Word Document Stream:True
                Contains Workbook/Book Stream:False
                Contains PowerPoint Document Stream:False
                Contains Visio Document Stream:False
                Contains ObjectPool Stream:False
                Flash Objects Count:0
                Contains VBA Macros:False
                Title:
                Subject:
                Author:91974
                Keywords:
                Template:Normal.dotm
                Last Saved By:91974
                Revion Number:2
                Total Edit Time:2
                Create Time:2024-10-03T12:13:00Z
                Last Saved Time:2024-10-03T12:15:00Z
                Number of Pages:1
                Number of Words:0
                Number of Characters:0
                Creating Application:Microsoft Office Word
                Security:0
                Number of Lines:1
                Number of Paragraphs:1
                Thumbnail Scaling Desired:false
                Company:Grizli777
                Contains Dirty Links:false
                Shared Document:false
                Changed Hyperlinks:false
                Application Version:12.0000
                General
                Stream Path:\x1Ole10Native
                CLSID:
                File Type:data
                Stream Size:50644
                Entropy:7.724951216605807
                Base64 Encoded:True
                Data ASCII:. . . . 0 0 5 0 0 _ 8 0 0 9 _ 1 7 7 7 _ 2 4 _ 2 5 . p d f . C : \\ U s e r s \\ 9 1 9 7 4 \\ O n e D r i v e \\ D e s k t o p \\ W o r d F i l e \\ N E W F I L E S \\ 0 0 5 0 0 _ 8 0 0 9 _ 1 7 7 7 _ 2 4 _ 2 5 . p d f . . . . . < . . . C : \\ U s e r s \\ 9 1 9 7 4 \\ A p p D a t a \\ L o c a l \\ T e m p \\ 0 0 5 0 0 _ 8 0 0 9 _ 1 7 7 7 _ 2 4 _ 2 5 . p d f . . . % P D F - 1 . 3 . % . . 1 0 o b j . < < . / T y p e / P a g e . / M e d i a B o x [ 0 0 5 9 4 . 3 6 8 4 0 . 6 0 ] . / C r o p B o x [ 0 0 5
                Data Raw:d0 c5 00 00 02 00 30 30 35 30 30 5f 38 30 30 39 5f 31 37 37 37 5f 32 34 5f 32 35 2e 70 64 66 00 43 3a 5c 55 73 65 72 73 5c 39 31 39 37 34 5c 4f 6e 65 44 72 69 76 65 5c 44 65 73 6b 74 6f 70 5c 57 6f 72 64 46 69 6c 65 5c 4e 45 57 46 49 4c 45 53 5c 30 30 35 30 30 5f 38 30 30 39 5f 31 37 37 37 5f 32 34 5f 32 35 2e 70 64 66 00 00 00 03 00 3c 00 00 00 43 3a 5c 55 73 65 72 73 5c 39 31 39
                General
                Stream Path:\x3ObjInfo
                CLSID:
                File Type:data
                Stream Size:6
                Entropy:1.2516291673878228
                Base64 Encoded:False
                Data ASCII:. . . . . .
                Data Raw:00 00 03 00 0d 00
                TimestampSource PortDest PortSource IPDest IP
                Oct 4, 2024 16:32:17.079583883 CEST49161443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:17.079638004 CEST44349161213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:17.079698086 CEST49161443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:17.085063934 CEST49161443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:17.085077047 CEST44349161213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:17.944055080 CEST44349161213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:17.944134951 CEST49161443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:17.950207949 CEST49161443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:17.950220108 CEST44349161213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:17.950668097 CEST44349161213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:17.950720072 CEST49161443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:18.082678080 CEST49161443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:18.127403975 CEST44349161213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:18.275810003 CEST44349161213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:18.275892973 CEST44349161213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:18.275949001 CEST49161443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:18.276355982 CEST49161443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:18.281133890 CEST49161443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:18.281162024 CEST44349161213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:18.281174898 CEST49161443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:18.281213999 CEST49161443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:18.868993998 CEST49162443192.168.2.22213.183.76.21
                Oct 4, 2024 16:32:18.869045019 CEST44349162213.183.76.21192.168.2.22
                Oct 4, 2024 16:32:18.869118929 CEST49162443192.168.2.22213.183.76.21
                Oct 4, 2024 16:32:18.869616032 CEST49162443192.168.2.22213.183.76.21
                Oct 4, 2024 16:32:18.869637966 CEST44349162213.183.76.21192.168.2.22
                Oct 4, 2024 16:32:19.734695911 CEST44349162213.183.76.21192.168.2.22
                Oct 4, 2024 16:32:19.734836102 CEST49162443192.168.2.22213.183.76.21
                Oct 4, 2024 16:32:19.739082098 CEST49162443192.168.2.22213.183.76.21
                Oct 4, 2024 16:32:19.739094019 CEST44349162213.183.76.21192.168.2.22
                Oct 4, 2024 16:32:19.739545107 CEST44349162213.183.76.21192.168.2.22
                Oct 4, 2024 16:32:19.746021986 CEST49162443192.168.2.22213.183.76.21
                Oct 4, 2024 16:32:19.787412882 CEST44349162213.183.76.21192.168.2.22
                Oct 4, 2024 16:32:20.015954971 CEST44349162213.183.76.21192.168.2.22
                Oct 4, 2024 16:32:20.016032934 CEST44349162213.183.76.21192.168.2.22
                Oct 4, 2024 16:32:20.016098022 CEST49162443192.168.2.22213.183.76.21
                Oct 4, 2024 16:32:20.016168118 CEST49162443192.168.2.22213.183.76.21
                Oct 4, 2024 16:32:20.016189098 CEST44349162213.183.76.21192.168.2.22
                Oct 4, 2024 16:32:20.018182039 CEST49163443192.168.2.22213.183.76.21
                Oct 4, 2024 16:32:20.018224001 CEST44349163213.183.76.21192.168.2.22
                Oct 4, 2024 16:32:20.018275023 CEST49163443192.168.2.22213.183.76.21
                Oct 4, 2024 16:32:20.018481016 CEST49163443192.168.2.22213.183.76.21
                Oct 4, 2024 16:32:20.018488884 CEST44349163213.183.76.21192.168.2.22
                Oct 4, 2024 16:32:20.847182035 CEST44349163213.183.76.21192.168.2.22
                Oct 4, 2024 16:32:20.848875999 CEST49163443192.168.2.22213.183.76.21
                Oct 4, 2024 16:32:20.848903894 CEST44349163213.183.76.21192.168.2.22
                Oct 4, 2024 16:32:20.849580050 CEST49163443192.168.2.22213.183.76.21
                Oct 4, 2024 16:32:20.849585056 CEST44349163213.183.76.21192.168.2.22
                Oct 4, 2024 16:32:21.122380018 CEST44349163213.183.76.21192.168.2.22
                Oct 4, 2024 16:32:21.122466087 CEST44349163213.183.76.21192.168.2.22
                Oct 4, 2024 16:32:21.122585058 CEST49163443192.168.2.22213.183.76.21
                Oct 4, 2024 16:32:21.122647047 CEST49163443192.168.2.22213.183.76.21
                Oct 4, 2024 16:32:21.122669935 CEST44349163213.183.76.21192.168.2.22
                Oct 4, 2024 16:32:24.401870012 CEST49164443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:24.401913881 CEST44349164213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:24.402013063 CEST49164443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:24.402627945 CEST49164443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:24.402646065 CEST44349164213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:25.250042915 CEST44349164213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:25.250210047 CEST49164443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:25.254211903 CEST49164443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:25.254221916 CEST44349164213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:25.254527092 CEST44349164213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:25.270648956 CEST49164443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:25.311418056 CEST44349164213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:25.527854919 CEST44349164213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:25.528026104 CEST44349164213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:25.528090954 CEST49164443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:25.528170109 CEST49164443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:25.528189898 CEST44349164213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:25.918452978 CEST49165443192.168.2.22213.183.76.21
                Oct 4, 2024 16:32:25.918502092 CEST44349165213.183.76.21192.168.2.22
                Oct 4, 2024 16:32:25.918800116 CEST49165443192.168.2.22213.183.76.21
                Oct 4, 2024 16:32:25.919276953 CEST49165443192.168.2.22213.183.76.21
                Oct 4, 2024 16:32:25.919289112 CEST44349165213.183.76.21192.168.2.22
                Oct 4, 2024 16:32:26.764673948 CEST44349165213.183.76.21192.168.2.22
                Oct 4, 2024 16:32:26.764822006 CEST49165443192.168.2.22213.183.76.21
                Oct 4, 2024 16:32:26.770452976 CEST49165443192.168.2.22213.183.76.21
                Oct 4, 2024 16:32:26.770472050 CEST44349165213.183.76.21192.168.2.22
                Oct 4, 2024 16:32:26.770776987 CEST44349165213.183.76.21192.168.2.22
                Oct 4, 2024 16:32:26.773542881 CEST49165443192.168.2.22213.183.76.21
                Oct 4, 2024 16:32:26.819405079 CEST44349165213.183.76.21192.168.2.22
                Oct 4, 2024 16:32:27.040249109 CEST44349165213.183.76.21192.168.2.22
                Oct 4, 2024 16:32:27.040333986 CEST44349165213.183.76.21192.168.2.22
                Oct 4, 2024 16:32:27.040803909 CEST49165443192.168.2.22213.183.76.21
                Oct 4, 2024 16:32:27.074502945 CEST49165443192.168.2.22213.183.76.21
                Oct 4, 2024 16:32:27.074541092 CEST44349165213.183.76.21192.168.2.22
                Oct 4, 2024 16:32:27.086997032 CEST49166443192.168.2.22213.183.76.21
                Oct 4, 2024 16:32:27.087047100 CEST44349166213.183.76.21192.168.2.22
                Oct 4, 2024 16:32:27.087125063 CEST49166443192.168.2.22213.183.76.21
                Oct 4, 2024 16:32:27.087409019 CEST49166443192.168.2.22213.183.76.21
                Oct 4, 2024 16:32:27.087424040 CEST44349166213.183.76.21192.168.2.22
                Oct 4, 2024 16:32:27.912971973 CEST44349166213.183.76.21192.168.2.22
                Oct 4, 2024 16:32:27.913439035 CEST49166443192.168.2.22213.183.76.21
                Oct 4, 2024 16:32:27.913455009 CEST44349166213.183.76.21192.168.2.22
                Oct 4, 2024 16:32:27.914093971 CEST49166443192.168.2.22213.183.76.21
                Oct 4, 2024 16:32:27.914100885 CEST44349166213.183.76.21192.168.2.22
                Oct 4, 2024 16:32:28.197087049 CEST44349166213.183.76.21192.168.2.22
                Oct 4, 2024 16:32:28.197160006 CEST44349166213.183.76.21192.168.2.22
                Oct 4, 2024 16:32:28.197267056 CEST49166443192.168.2.22213.183.76.21
                Oct 4, 2024 16:32:28.198507071 CEST49166443192.168.2.22213.183.76.21
                Oct 4, 2024 16:32:28.198527098 CEST44349166213.183.76.21192.168.2.22
                Oct 4, 2024 16:32:28.234616995 CEST49167443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:28.234662056 CEST44349167213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:28.234738111 CEST49167443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:28.235024929 CEST49167443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:28.235044003 CEST44349167213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:29.086785078 CEST44349167213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:29.088686943 CEST49167443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:29.090430021 CEST49167443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:29.090455055 CEST44349167213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:29.091896057 CEST49167443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:29.091917038 CEST44349167213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:29.364873886 CEST44349167213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:29.364964962 CEST44349167213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:29.365016937 CEST49167443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:29.365223885 CEST49167443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:29.365861893 CEST49167443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:29.365884066 CEST44349167213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:29.366663933 CEST49168443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:29.366697073 CEST44349168213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:29.366755009 CEST49168443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:29.367058992 CEST49168443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:29.367074966 CEST44349168213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:30.211733103 CEST44349168213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:30.211853981 CEST49168443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:30.215343952 CEST49168443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:30.215356112 CEST44349168213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:30.216748953 CEST49168443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:30.216770887 CEST44349168213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:30.497659922 CEST44349168213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:30.497725964 CEST44349168213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:30.497771978 CEST44349168213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:30.497791052 CEST49168443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:30.497807026 CEST44349168213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:30.497819901 CEST49168443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:30.497819901 CEST49168443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:30.497848988 CEST49168443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:30.497855902 CEST44349168213.183.76.22192.168.2.22
                Oct 4, 2024 16:32:30.497895956 CEST49168443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:30.498173952 CEST49168443192.168.2.22213.183.76.22
                Oct 4, 2024 16:32:30.498195887 CEST49168443192.168.2.22213.183.76.22
                TimestampSource PortDest PortSource IPDest IP
                Oct 4, 2024 16:32:17.036381960 CEST5456253192.168.2.228.8.8.8
                Oct 4, 2024 16:32:17.076277971 CEST53545628.8.8.8192.168.2.22
                Oct 4, 2024 16:32:18.839365959 CEST5291753192.168.2.228.8.8.8
                Oct 4, 2024 16:32:18.851174116 CEST53529178.8.8.8192.168.2.22
                Oct 4, 2024 16:32:18.853276968 CEST6275153192.168.2.228.8.8.8
                Oct 4, 2024 16:32:18.868464947 CEST53627518.8.8.8192.168.2.22
                Oct 4, 2024 16:32:24.385238886 CEST5789353192.168.2.228.8.8.8
                Oct 4, 2024 16:32:24.392152071 CEST53578938.8.8.8192.168.2.22
                Oct 4, 2024 16:32:24.393754005 CEST5482153192.168.2.228.8.8.8
                Oct 4, 2024 16:32:24.401473045 CEST53548218.8.8.8192.168.2.22
                Oct 4, 2024 16:32:25.900036097 CEST5471953192.168.2.228.8.8.8
                Oct 4, 2024 16:32:25.907402992 CEST53547198.8.8.8192.168.2.22
                Oct 4, 2024 16:32:25.908814907 CEST4988153192.168.2.228.8.8.8
                Oct 4, 2024 16:32:25.916390896 CEST53498818.8.8.8192.168.2.22
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Oct 4, 2024 16:32:17.036381960 CEST192.168.2.228.8.8.80xebecStandard query (0)stylite.ioA (IP address)IN (0x0001)false
                Oct 4, 2024 16:32:18.839365959 CEST192.168.2.228.8.8.80x5258Standard query (0)stylite.ioA (IP address)IN (0x0001)false
                Oct 4, 2024 16:32:18.853276968 CEST192.168.2.228.8.8.80x313dStandard query (0)stylite.ioA (IP address)IN (0x0001)false
                Oct 4, 2024 16:32:24.385238886 CEST192.168.2.228.8.8.80x1100Standard query (0)stylite.ioA (IP address)IN (0x0001)false
                Oct 4, 2024 16:32:24.393754005 CEST192.168.2.228.8.8.80x2664Standard query (0)stylite.ioA (IP address)IN (0x0001)false
                Oct 4, 2024 16:32:25.900036097 CEST192.168.2.228.8.8.80xd97eStandard query (0)stylite.ioA (IP address)IN (0x0001)false
                Oct 4, 2024 16:32:25.908814907 CEST192.168.2.228.8.8.80x9c5bStandard query (0)stylite.ioA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Oct 4, 2024 16:32:17.076277971 CEST8.8.8.8192.168.2.220xebecNo error (0)stylite.io213.183.76.22A (IP address)IN (0x0001)false
                Oct 4, 2024 16:32:17.076277971 CEST8.8.8.8192.168.2.220xebecNo error (0)stylite.io213.183.76.21A (IP address)IN (0x0001)false
                Oct 4, 2024 16:32:18.851174116 CEST8.8.8.8192.168.2.220x5258No error (0)stylite.io213.183.76.21A (IP address)IN (0x0001)false
                Oct 4, 2024 16:32:18.851174116 CEST8.8.8.8192.168.2.220x5258No error (0)stylite.io213.183.76.22A (IP address)IN (0x0001)false
                Oct 4, 2024 16:32:18.868464947 CEST8.8.8.8192.168.2.220x313dNo error (0)stylite.io213.183.76.22A (IP address)IN (0x0001)false
                Oct 4, 2024 16:32:18.868464947 CEST8.8.8.8192.168.2.220x313dNo error (0)stylite.io213.183.76.21A (IP address)IN (0x0001)false
                Oct 4, 2024 16:32:24.392152071 CEST8.8.8.8192.168.2.220x1100No error (0)stylite.io213.183.76.22A (IP address)IN (0x0001)false
                Oct 4, 2024 16:32:24.392152071 CEST8.8.8.8192.168.2.220x1100No error (0)stylite.io213.183.76.21A (IP address)IN (0x0001)false
                Oct 4, 2024 16:32:24.401473045 CEST8.8.8.8192.168.2.220x2664No error (0)stylite.io213.183.76.22A (IP address)IN (0x0001)false
                Oct 4, 2024 16:32:24.401473045 CEST8.8.8.8192.168.2.220x2664No error (0)stylite.io213.183.76.21A (IP address)IN (0x0001)false
                Oct 4, 2024 16:32:25.907402992 CEST8.8.8.8192.168.2.220xd97eNo error (0)stylite.io213.183.76.21A (IP address)IN (0x0001)false
                Oct 4, 2024 16:32:25.907402992 CEST8.8.8.8192.168.2.220xd97eNo error (0)stylite.io213.183.76.22A (IP address)IN (0x0001)false
                Oct 4, 2024 16:32:25.916390896 CEST8.8.8.8192.168.2.220x9c5bNo error (0)stylite.io213.183.76.21A (IP address)IN (0x0001)false
                Oct 4, 2024 16:32:25.916390896 CEST8.8.8.8192.168.2.220x9c5bNo error (0)stylite.io213.183.76.22A (IP address)IN (0x0001)false
                • stylite.io
                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                0192.168.2.2249161213.183.76.224433520C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                TimestampBytes transferredDirectionData
                2024-10-04 14:32:18 UTC132OUTOPTIONS / HTTP/1.1
                User-Agent: Microsoft Office Protocol Discovery
                Host: stylite.io
                Content-Length: 0
                Connection: Keep-Alive
                2024-10-04 14:32:18 UTC408INHTTP/1.1 200 OK
                Allow: GET,HEAD
                Content-Length: 8
                Content-Type: text/html; charset=utf-8
                Date: Fri, 04 Oct 2024 14:32:18 GMT
                Etag: W/"8-ZRAf8oNBS3Bjb/SU2GYZCmbtmXg"
                Strict-Transport-Security: max-age=15552000; includeSubDomains
                X-Content-Type-Options: nosniff
                X-Dns-Prefetch-Control: off
                X-Download-Options: noopen
                X-Frame-Options: SAMEORIGIN
                X-Xss-Protection: 1; mode=block
                Connection: close
                2024-10-04 14:32:18 UTC8INData Raw: 47 45 54 2c 48 45 41 44
                Data Ascii: GET,HEAD


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                1192.168.2.2249162213.183.76.214433520C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                TimestampBytes transferredDirectionData
                2024-10-04 14:32:19 UTC115OUTHEAD /G2eK HTTP/1.1
                Connection: Keep-Alive
                User-Agent: Microsoft Office Existence Discovery
                Host: stylite.io
                2024-10-04 14:32:20 UTC397INHTTP/1.1 301 Moved Permanently
                Content-Length: 38
                Content-Type: text/plain; charset=utf-8
                Date: Fri, 04 Oct 2024 14:32:19 GMT
                Location: /404
                Strict-Transport-Security: max-age=15552000; includeSubDomains
                Vary: Accept
                X-Content-Type-Options: nosniff
                X-Dns-Prefetch-Control: off
                X-Download-Options: noopen
                X-Frame-Options: SAMEORIGIN
                X-Xss-Protection: 1; mode=block
                Connection: close


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                2192.168.2.2249163213.183.76.214433520C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                TimestampBytes transferredDirectionData
                2024-10-04 14:32:20 UTC114OUTHEAD /404 HTTP/1.1
                Connection: Keep-Alive
                User-Agent: Microsoft Office Existence Discovery
                Host: stylite.io
                2024-10-04 14:32:21 UTC448INHTTP/1.1 404 Not Found
                Content-Length: 4645
                Content-Type: text/html; charset=utf-8
                Date: Fri, 04 Oct 2024 14:32:21 GMT
                Etag: "1225-4lR+8o8+z0M1Iq6OMuNgxAtPjT8"
                Strict-Transport-Security: max-age=15552000; includeSubDomains
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                X-Dns-Prefetch-Control: off
                X-Download-Options: noopen
                X-Frame-Options: SAMEORIGIN
                X-Powered-By: Next.js
                X-Xss-Protection: 1; mode=block
                Connection: close


                Session IDSource IPSource PortDestination IPDestination Port
                3192.168.2.2249164213.183.76.22443
                TimestampBytes transferredDirectionData
                2024-10-04 14:32:25 UTC127OUTOPTIONS / HTTP/1.1
                Connection: Keep-Alive
                User-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601
                translate: f
                Host: stylite.io
                2024-10-04 14:32:25 UTC408INHTTP/1.1 200 OK
                Allow: GET,HEAD
                Content-Length: 8
                Content-Type: text/html; charset=utf-8
                Date: Fri, 04 Oct 2024 14:32:25 GMT
                Etag: W/"8-ZRAf8oNBS3Bjb/SU2GYZCmbtmXg"
                Strict-Transport-Security: max-age=15552000; includeSubDomains
                X-Content-Type-Options: nosniff
                X-Dns-Prefetch-Control: off
                X-Download-Options: noopen
                X-Frame-Options: SAMEORIGIN
                X-Xss-Protection: 1; mode=block
                Connection: close
                2024-10-04 14:32:25 UTC8INData Raw: 47 45 54 2c 48 45 41 44
                Data Ascii: GET,HEAD


                Session IDSource IPSource PortDestination IPDestination Port
                4192.168.2.2249165213.183.76.21443
                TimestampBytes transferredDirectionData
                2024-10-04 14:32:26 UTC157OUTData Raw: 50 52 4f 50 46 49 4e 44 20 2f 20 48 54 54 50 2f 31 2e 31 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 4b 65 65 70 2d 41 6c 69 76 65 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a 20 4d 69 63 72 6f 73 6f 66 74 2d 57 65 62 44 41 56 2d 4d 69 6e 69 52 65 64 69 72 2f 36 2e 31 2e 37 36 30 31 0d 0a 44 65 70 74 68 3a 20 30 0d 0a 74 72 61 6e 73 6c 61 74 65 3a 20 66 0d 0a 43 6f 6e 74 65 6e 74 2d 4c 65 6e 67 74 68 3a 20 30 0d 0a 48 6f 73 74 3a 20 73 74 79 6c 69 74 65 2e 69 6f 0d 0a 0d 0a
                Data Ascii: PROPFIND / HTTP/1.1Connection: Keep-AliveUser-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601Depth: 0translate: fContent-Length: 0Host: stylite.io
                2024-10-04 14:32:27 UTC404INHTTP/1.1 404 Not Found
                Content-Length: 144
                Content-Security-Policy: default-src 'none'
                Content-Type: text/html; charset=utf-8
                Date: Fri, 04 Oct 2024 14:32:26 GMT
                Strict-Transport-Security: max-age=15552000; includeSubDomains
                X-Content-Type-Options: nosniff
                X-Dns-Prefetch-Control: off
                X-Download-Options: noopen
                X-Frame-Options: SAMEORIGIN
                X-Xss-Protection: 1; mode=block
                Connection: close
                2024-10-04 14:32:27 UTC144INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 3c 74 69 74 6c 65 3e 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 70 72 65 3e 43 61 6e 6e 6f 74 20 50 52 4f 50 46 49 4e 44 20 2f 3c 2f 70 72 65 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a
                Data Ascii: <!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><title>Error</title></head><body><pre>Cannot PROPFIND /</pre></body></html>


                Session IDSource IPSource PortDestination IPDestination Port
                5192.168.2.2249166213.183.76.21443
                TimestampBytes transferredDirectionData
                2024-10-04 14:32:27 UTC157OUTData Raw: 50 52 4f 50 46 49 4e 44 20 2f 20 48 54 54 50 2f 31 2e 31 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 4b 65 65 70 2d 41 6c 69 76 65 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a 20 4d 69 63 72 6f 73 6f 66 74 2d 57 65 62 44 41 56 2d 4d 69 6e 69 52 65 64 69 72 2f 36 2e 31 2e 37 36 30 31 0d 0a 44 65 70 74 68 3a 20 30 0d 0a 74 72 61 6e 73 6c 61 74 65 3a 20 66 0d 0a 43 6f 6e 74 65 6e 74 2d 4c 65 6e 67 74 68 3a 20 30 0d 0a 48 6f 73 74 3a 20 73 74 79 6c 69 74 65 2e 69 6f 0d 0a 0d 0a
                Data Ascii: PROPFIND / HTTP/1.1Connection: Keep-AliveUser-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601Depth: 0translate: fContent-Length: 0Host: stylite.io
                2024-10-04 14:32:28 UTC404INHTTP/1.1 404 Not Found
                Content-Length: 144
                Content-Security-Policy: default-src 'none'
                Content-Type: text/html; charset=utf-8
                Date: Fri, 04 Oct 2024 14:32:28 GMT
                Strict-Transport-Security: max-age=15552000; includeSubDomains
                X-Content-Type-Options: nosniff
                X-Dns-Prefetch-Control: off
                X-Download-Options: noopen
                X-Frame-Options: SAMEORIGIN
                X-Xss-Protection: 1; mode=block
                Connection: close
                2024-10-04 14:32:28 UTC144INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 3c 74 69 74 6c 65 3e 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 70 72 65 3e 43 61 6e 6e 6f 74 20 50 52 4f 50 46 49 4e 44 20 2f 3c 2f 70 72 65 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a
                Data Ascii: <!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><title>Error</title></head><body><pre>Cannot PROPFIND /</pre></body></html>


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                6192.168.2.2249167213.183.76.224433520C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                TimestampBytes transferredDirectionData
                2024-10-04 14:32:29 UTC345OUTGET /G2eK HTTP/1.1
                Accept: */*
                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)
                UA-CPU: AMD64
                Accept-Encoding: gzip, deflate
                Host: stylite.io
                Connection: Keep-Alive
                2024-10-04 14:32:29 UTC385INHTTP/1.1 301 Moved Permanently
                Content-Length: 38
                Content-Type: text/plain; charset=utf-8
                Date: Fri, 04 Oct 2024 14:32:29 GMT
                Location: /404
                Strict-Transport-Security: max-age=15552000; includeSubDomains
                Vary: Accept
                X-Content-Type-Options: nosniff
                X-Dns-Prefetch-Control: off
                X-Download-Options: noopen
                X-Frame-Options: SAMEORIGIN
                X-Xss-Protection: 0
                Connection: close
                2024-10-04 14:32:29 UTC38INData Raw: 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 2e 20 52 65 64 69 72 65 63 74 69 6e 67 20 74 6f 20 2f 34 30 34
                Data Ascii: Moved Permanently. Redirecting to /404


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                7192.168.2.2249168213.183.76.224433520C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                TimestampBytes transferredDirectionData
                2024-10-04 14:32:30 UTC344OUTGET /404 HTTP/1.1
                Accept: */*
                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)
                UA-CPU: AMD64
                Accept-Encoding: gzip, deflate
                Host: stylite.io
                Connection: Keep-Alive
                2024-10-04 14:32:30 UTC442INHTTP/1.1 404 Not Found
                Content-Type: text/html; charset=utf-8
                Date: Fri, 04 Oct 2024 14:32:30 GMT
                Etag: "1225-4lR+8o8+z0M1Iq6OMuNgxAtPjT8"
                Strict-Transport-Security: max-age=15552000; includeSubDomains
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                X-Dns-Prefetch-Control: off
                X-Download-Options: noopen
                X-Frame-Options: SAMEORIGIN
                X-Powered-By: Next.js
                X-Xss-Protection: 0
                Connection: close
                Transfer-Encoding: chunked
                2024-10-04 14:32:30 UTC2372INData Raw: 31 32 32 35 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 53 65 74 3d 22 75 74 66 2d 38 22 2f 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 76 69 65 77 70 6f 72 74 2d 66 69 74 3d 63 6f 76 65 72 22 2f 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 75 6e 64 65 66 69 6e 65 64 20 69 73 20 61 20 66 72 65 65 20 61 6e 64 20 6f 70 65 6e 20 73 6f 75 72 63 65 20 55 52 4c 20 73 68 6f 72 74 65 6e 65 72 20 77 69 74 68 20 63 75 73 74 6f 6d 20 64 6f 6d 61
                Data Ascii: 1225<!DOCTYPE html><html lang="en"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1, viewport-fit=cover"/><meta name="description" content="undefined is a free and open source URL shortener with custom doma
                2024-10-04 14:32:30 UTC1724INData Raw: 67 69 6e 3a 30 3b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 68 73 6c 28 32 30 36 2c 20 31 32 25 2c 20 39 35 25 29 3b 66 6f 6e 74 3a 31 36 70 78 2f 31 2e 34 35 20 26 71 75 6f 74 3b 4e 75 6e 69 74 6f 26 71 75 6f 74 3b 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 6f 76 65 72 66 6c 6f 77 2d 78 3a 68 69 64 64 65 6e 3b 63 6f 6c 6f 72 3a 68 73 6c 28 32 30 30 2c 20 33 35 25 2c 20 32 35 25 29 22 3e 3c 64 69 76 20 69 64 3d 22 5f 5f 6e 65 78 74 22 3e 3c 64 69 76 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 23 30 30 30 3b 62 61 63 6b 67 72 6f 75 6e 64 3a 23 66 66 66 3b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 2d 61 70 70 6c 65 2d 73 79 73 74 65 6d 2c 20 42 6c 69 6e 6b 4d 61 63 53 79 73 74 65 6d 46 6f 6e 74 2c 20 52 6f 62 6f 74 6f 2c 20 26 71 75 6f 74 3b 53 65 67 6f 65 20
                Data Ascii: gin:0;background-color:hsl(206, 12%, 95%);font:16px/1.45 &quot;Nunito&quot;, sans-serif;overflow-x:hidden;color:hsl(200, 35%, 25%)"><div id="__next"><div style="color:#000;background:#fff;font-family:-apple-system, BlinkMacSystemFont, Roboto, &quot;Segoe
                2024-10-04 14:32:30 UTC557INData Raw: 63 72 69 70 74 20 73 72 63 3d 22 2f 5f 6e 65 78 74 2f 73 74 61 74 69 63 2f 63 68 75 6e 6b 73 2f 66 72 61 6d 65 77 6f 72 6b 2e 62 32 65 63 33 32 36 37 31 37 37 33 66 65 32 33 33 33 63 30 2e 6a 73 22 20 61 73 79 6e 63 3d 22 22 3e 3c 2f 73 63 72 69 70 74 3e 3c 73 63 72 69 70 74 20 73 72 63 3d 22 2f 5f 6e 65 78 74 2f 73 74 61 74 69 63 2f 63 68 75 6e 6b 73 2f 63 6f 6d 6d 6f 6e 73 2e 63 66 31 62 65 33 31 34 65 62 31 35 65 30 62 38 61 66 64 63 2e 6a 73 22 20 61 73 79 6e 63 3d 22 22 3e 3c 2f 73 63 72 69 70 74 3e 3c 73 63 72 69 70 74 20 73 72 63 3d 22 2f 5f 6e 65 78 74 2f 73 74 61 74 69 63 2f 63 68 75 6e 6b 73 2f 38 36 38 64 32 62 37 36 34 33 61 66 62 33 38 61 63 33 34 65 37 33 32 38 35 31 36 38 31 34 39 32 66 32 63 64 32 35 34 30 2e 37 64 37 61 32 30 61 37 30 30
                Data Ascii: cript src="/_next/static/chunks/framework.b2ec32671773fe2333c0.js" async=""></script><script src="/_next/static/chunks/commons.cf1be314eb15e0b8afdc.js" async=""></script><script src="/_next/static/chunks/868d2b7643afb38ac34e732851681492f2cd2540.7d7a20a700


                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Target ID:1
                Start time:10:32:06
                Start date:04/10/2024
                Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                Wow64 process (32bit):false
                Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
                Imagebase:0x13f4c0000
                File size:1'423'704 bytes
                MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                No disassembly