Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Urgence .xlsx

Overview

General Information

Sample name:Urgence .xlsx
Analysis ID:1428895
MD5:958216675f28608052a5bc4c7053e7a5
SHA1:3c42e7b4829ffa7920ba7360f17bb3f2f90d6b09
SHA256:1f20ed328634d384252509203773c8e4a035d732ec281e2966d544a8a6724665
Infos:

Detection

Score:4
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Document misses a certain OLE stream usually present in this Microsoft Office document type
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Excel Network Connections
Sigma detected: Suspicious Office Outbound Connections

Classification

Analysis Advice

Sample monitors window changes (e.g. starting applications), analyze the sample with the 'Simulates keyboard and window changes' cookbook
No malicious behavior found, analyze the document also on other version of Office / Acrobat
  • System is w10x64
  • EXCEL.EXE (PID: 6600 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding MD5: 4A871771235598812032C822E6F68F19)
    • splwow64.exe (PID: 4088 cmdline: C:\Windows\splwow64.exe 12288 MD5: 77DE7761B037061C7C112FD3C5B91E73)
  • cleanup
No configs have been found
No yara matches
Source: Network ConnectionAuthor: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0", Tim Shelton: Data: DestinationIp: 13.107.213.41, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE, Initiated: true, ProcessId: 6600, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49753
Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.4, DestinationIsIpv6: false, DestinationPort: 49753, EventID: 3, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE, Initiated: true, ProcessId: 6600, Protocol: tcp, SourceIp: 13.107.213.41, SourceIsIpv6: false, SourcePort: 443
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile opened: C:\Program Files (x86)\Microsoft Office\root\vfs\SystemX86\MSVCR100.dllJump to behavior
Source: unknownHTTPS traffic detected: 13.107.213.41:443 -> 192.168.2.4:49755 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.213.41:443 -> 192.168.2.4:49753 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.213.41:443 -> 192.168.2.4:49754 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.213.41:443 -> 192.168.2.4:49757 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.213.41:443 -> 192.168.2.4:49756 version: TLS 1.2
Source: global trafficTCP traffic: 192.168.2.4:49755 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49757 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49756 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49758 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49759 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49760 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49761 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49762 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49756 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49755 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49756 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49757 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49755 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49757 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49755 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49757 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49756 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49755 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49755 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49755 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49757 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49757 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49756 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49756 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49757 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49756 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49755 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49755 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49755 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49757 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49757 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49757 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49758 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49758 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49758 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49759 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49759 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49759 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49760 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49760 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49760 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49756 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49756 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49756 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49761 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49761 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49761 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49762 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49762 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49762 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49758 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49758 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49759 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49759 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49760 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49760 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49761 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49761 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49762 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49762 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49759 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49759 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49759 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49761 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49761 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49761 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49760 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49760 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49760 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49758 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49758 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49758 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49762 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49762 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49762 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49753
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49754
Source: global trafficTCP traffic: 192.168.2.4:49756 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49756
Source: global trafficTCP traffic: 192.168.2.4:49755 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49755
Source: global trafficTCP traffic: 192.168.2.4:49756 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49757 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49757
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49755 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49753
Source: global trafficTCP traffic: 192.168.2.4:49757 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49754
Source: global trafficTCP traffic: 192.168.2.4:49755 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49755
Source: global trafficTCP traffic: 192.168.2.4:49757 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49757
Source: global trafficTCP traffic: 192.168.2.4:49756 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49756
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49755
Source: global trafficTCP traffic: 192.168.2.4:49755 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49753
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49754
Source: global trafficTCP traffic: 192.168.2.4:49755 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49755
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49753
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49755
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49753
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49754
Source: global trafficTCP traffic: 192.168.2.4:49755 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49754
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49757
Source: global trafficTCP traffic: 192.168.2.4:49757 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49757 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49757
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49756
Source: global trafficTCP traffic: 192.168.2.4:49756 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49757
Source: global trafficTCP traffic: 192.168.2.4:49756 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49756
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49756
Source: global trafficTCP traffic: 192.168.2.4:49757 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49756 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49755
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49753
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49754
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49756
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49757
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49755
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49755
Source: global trafficTCP traffic: 192.168.2.4:49755 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49755 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49755 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49755
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49755
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49757
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49753
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49753
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49757
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49753
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49753
Source: global trafficTCP traffic: 192.168.2.4:49757 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49757 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49753
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49757 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49757
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49753
Source: global trafficTCP traffic: 192.168.2.4:49753 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49753
Source: global trafficTCP traffic: 192.168.2.4:49758 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49758
Source: global trafficTCP traffic: 192.168.2.4:49758 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49758 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49758
Source: global trafficTCP traffic: 192.168.2.4:49759 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49759
Source: global trafficTCP traffic: 192.168.2.4:49759 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49759 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49759
Source: global trafficTCP traffic: 192.168.2.4:49760 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49760
Source: global trafficTCP traffic: 192.168.2.4:49760 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49760 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49760
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49756
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49756
Source: global trafficTCP traffic: 192.168.2.4:49756 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49756 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49756
Source: global trafficTCP traffic: 192.168.2.4:49756 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49756
Source: global trafficTCP traffic: 192.168.2.4:49761 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49761
Source: global trafficTCP traffic: 192.168.2.4:49761 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49761 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49761
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49754
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49754
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49754
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49754
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49754
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49754
Source: global trafficTCP traffic: 192.168.2.4:49762 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49762
Source: global trafficTCP traffic: 192.168.2.4:49762 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49762 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49762
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49758
Source: global trafficTCP traffic: 192.168.2.4:49758 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49758
Source: global trafficTCP traffic: 192.168.2.4:49758 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49758
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49759
Source: global trafficTCP traffic: 192.168.2.4:49759 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49759
Source: global trafficTCP traffic: 192.168.2.4:49759 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49759
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49760
Source: global trafficTCP traffic: 192.168.2.4:49760 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49760
Source: global trafficTCP traffic: 192.168.2.4:49760 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49760
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49761
Source: global trafficTCP traffic: 192.168.2.4:49761 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49761
Source: global trafficTCP traffic: 192.168.2.4:49761 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49761
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49762
Source: global trafficTCP traffic: 192.168.2.4:49762 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49762
Source: global trafficTCP traffic: 192.168.2.4:49762 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49762
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49759
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49759
Source: global trafficTCP traffic: 192.168.2.4:49759 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49759 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49759 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49759
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49759
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49761
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49761
Source: global trafficTCP traffic: 192.168.2.4:49761 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49761 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49761
Source: global trafficTCP traffic: 192.168.2.4:49761 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49761
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49760
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49760
Source: global trafficTCP traffic: 192.168.2.4:49760 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49760 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49760
Source: global trafficTCP traffic: 192.168.2.4:49760 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49760
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49758
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49758
Source: global trafficTCP traffic: 192.168.2.4:49758 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49758 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49758
Source: global trafficTCP traffic: 192.168.2.4:49758 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49758
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49762
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49762
Source: global trafficTCP traffic: 192.168.2.4:49762 -> 13.107.213.41:443
Source: global trafficTCP traffic: 192.168.2.4:49762 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49762
Source: global trafficTCP traffic: 192.168.2.4:49762 -> 13.107.213.41:443
Source: global trafficTCP traffic: 13.107.213.41:443 -> 192.168.2.4:49762
Source: excel.exeMemory has grown: Private usage: 1MB later: 72MB
Source: Joe Sandbox ViewIP Address: 13.107.213.41 13.107.213.41
Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
Source: global trafficHTTP traffic detected: GET /rules/rule490016v3s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.16827; Pro)Host: otelrules.azureedge.net
Source: global trafficHTTP traffic detected: GET /rules/rule170012v10s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.16827; Pro)Host: otelrules.azureedge.net
Source: global trafficHTTP traffic detected: GET /rules/rule324002v5s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.16827; Pro)Host: otelrules.azureedge.net
Source: global trafficHTTP traffic detected: GET /rules/rule324001v4s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.16827; Pro)Host: otelrules.azureedge.net
Source: global trafficHTTP traffic detected: GET /rules/rule63067v4s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.16827; Pro)Host: otelrules.azureedge.net
Source: global trafficHTTP traffic detected: GET /rules/rule324003v5s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.16827; Pro)Host: otelrules.azureedge.net
Source: global trafficHTTP traffic detected: GET /rules/rule324004v4s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.16827; Pro)Host: otelrules.azureedge.net
Source: global trafficHTTP traffic detected: GET /rules/rule324005v2s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.16827; Pro)Host: otelrules.azureedge.net
Source: global trafficHTTP traffic detected: GET /rules/rule324006v2s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.16827; Pro)Host: otelrules.azureedge.net
Source: global trafficHTTP traffic detected: GET /rules/rule324007v2s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.16827; Pro)Host: otelrules.azureedge.net
Source: 57C8EDB95DF3F0AD4EE2DC2B8CFD4157.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownHTTPS traffic detected: 13.107.213.41:443 -> 192.168.2.4:49755 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.213.41:443 -> 192.168.2.4:49753 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.213.41:443 -> 192.168.2.4:49754 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.213.41:443 -> 192.168.2.4:49757 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.213.41:443 -> 192.168.2.4:49756 version: TLS 1.2
Source: 876A6D2D.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: classification engineClassification label: clean4.winXLSX@3/4@0/1
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Users\user\Desktop\~$Urgence .xlsxJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\{3AB921A8-9F39-40F1-BFCE-EDEE41F6793D} - OProcSessId.datJump to behavior
Source: Urgence .xlsxOLE indicator, Workbook stream: true
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00000303-0000-0000-C000-000000000046}\InprocServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\CommonJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile opened: C:\Program Files (x86)\Microsoft Office\root\vfs\SystemX86\MSVCR100.dllJump to behavior
Source: Urgence .xlsxInitial sample: OLE indicators vbamacros = False
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeWindow / User API: threadDelayed 832Jump to behavior
Source: C:\Windows\splwow64.exeLast function: Thread delayed
Source: C:\Windows\splwow64.exeLast function: Thread delayed
Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information queried: ProcessInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Exploitation for Client Execution
Path Interception1
Process Injection
1
Masquerading
OS Credential Dumping1
Process Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Extra Window Memory Injection
1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Extra Window Memory Injection
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput Capture2
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
part-0013.t-0009.t-msedge.net
13.107.213.41
truefalse
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    13.107.213.41
    part-0013.t-0009.t-msedge.netUnited States
    8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1428895
    Start date and time:2024-04-19 19:31:56 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 22s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:defaultwindowsofficecookbook.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Run name:Potential for more IOCs and behavior
    Number of analysed new started processes analysed:8
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:Urgence .xlsx
    Detection:CLEAN
    Classification:clean4.winXLSX@3/4@0/1
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .xlsx
    • Found Word or Excel or PowerPoint or XPS Viewer
    • Attach to Office via COM
    • Scroll down
    • Close Viewer
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 52.109.56.128, 23.201.212.130, 52.109.8.36, 52.113.194.132, 23.40.205.48, 23.40.205.35, 23.40.205.66, 23.40.205.41, 23.40.205.58, 23.40.205.67, 23.40.205.56, 23.40.205.59, 23.40.205.57, 13.78.111.199
    • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.afd.azureedge.net, a767.dspw65.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, asia.configsvc1.live.com.akadns.net, ecs-office.s-0005.s-msedge.net, roaming.officeapps.live.com, osiprod-cus-buff-azsc-000.centralus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, e16604.g.akamaiedge.net, officeclient.microsoft.com, prod.fs.microsoft.com.akadns.net, ecs.office.com, self-events-data.trafficmanager.net, fs.microsoft.com, otelrules.azureedge.net, prod.configsvc1.live.com.akadns.net, self.events.data.microsoft.com, ctldl.windowsupdate.com, prod.roaming1.live.com.akadns.net, s-0005-office.config.skype.com, wu-bg-shim.trafficmanager.net, cus-azsc-000.roaming.officeapps.live.com, fe3cr.delivery.mp.microsoft.com, download.windowsupdate.com.edgesuite.net, us1.roaming1.live.com.akadns.net, onedscolprdjpe03.japaneast.cloudapp.azure.com, s-0005.s-msedge.net, config.office
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtCreateKey calls found.
    • Report size getting too big, too many NtQueryAttributesFile calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    • VT rate limit hit for: Urgence .xlsx
    TimeTypeDescription
    19:33:58API Interceptor854x Sleep call for process: splwow64.exe modified
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    13.107.213.41Quotation.xlsGet hashmaliciousUnknownBrowse
    • 2s.gg/3zM
    http://www.serviceadg.comGet hashmaliciousUnknownBrowse
    • fr.linkedin.com/company/service-adg
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    part-0013.t-0009.t-msedge.nethttps://url.us.m.mimecastprotect.com/s/kCCtC5yEz0tWp5ANrfz_KPV?domain=paplastics365-my.sharepoint.comGet hashmaliciousHTMLPhisherBrowse
    • 13.107.246.41
    https://edbullardcompany-my.sharepoint.com/:f:/g/personal/eric_rosario_bullard_com/EoLKvcaqSE1Go3fA5to5CQABtxAftKTD0ktrakp7rbi4Xg?e=Mvbf0DGet hashmaliciousHTMLPhisherBrowse
    • 13.107.246.41
    http://monacolife.netGet hashmaliciousUnknownBrowse
    • 13.107.246.41
    https://www.joesandbox.com/loginGet hashmaliciousUnknownBrowse
    • 13.107.246.41
    https://librospy.com/Get hashmaliciousUnknownBrowse
    • 13.107.213.41
    https://sdcoes.net/LandingPage/Index/122/Get hashmaliciousHTMLPhisherBrowse
    • 13.107.246.41
    https://6a5ff6af4b0fe3e6f0bd452927dfb55b352fdd2d1bab6d1e7de2b641e2.pages.dev/Get hashmaliciousHTMLPhisherBrowse
    • 13.107.213.41
    https://18apmic18.z13.web.core.windows.net/Get hashmaliciousTechSupportScamBrowse
    • 13.107.213.41
    Payment Receipt .htmlGet hashmaliciousHTMLPhisherBrowse
    • 13.107.246.41
    http://wzxqi.theknittingdoula.com/ghoopuh/lopwiuiyeGet hashmaliciousHTMLPhisherBrowse
    • 13.107.246.41
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    MICROSOFT-CORP-MSN-AS-BLOCKUShttps://url.us.m.mimecastprotect.com/s/kCCtC5yEz0tWp5ANrfz_KPV?domain=paplastics365-my.sharepoint.comGet hashmaliciousHTMLPhisherBrowse
    • 13.89.179.8
    https://wetransfer.com/downloads/63408c72b6333965afb0118ce81f53d220240419112437/2452e85458854b24e1ec42e87285f82420240419112457/7d30d1?trk=TRN_TDL_01&utm_campaign=TRN_TDL_01&utm_medium=email&utm_source=sendgridGet hashmaliciousHTMLPhisherBrowse
    • 52.96.122.34
    https://edbullardcompany-my.sharepoint.com/:f:/g/personal/eric_rosario_bullard_com/EoLKvcaqSE1Go3fA5to5CQABtxAftKTD0ktrakp7rbi4Xg?e=Mvbf0DGet hashmaliciousHTMLPhisherBrowse
    • 52.110.7.37
    UGS - CRO REQ - KHIDUBAI (OPL-841724).scrGet hashmaliciousPureLog Stealer, zgRATBrowse
    • 13.107.137.11
    ul5RjxwWTK.elfGet hashmaliciousUnknownBrowse
    • 20.1.13.62
    order.exeGet hashmaliciousUnknownBrowse
    • 52.109.6.53
    https://diversityjobs.com/employer/company/1665/Worthington-Industries-IncGet hashmaliciousUnknownBrowse
    • 52.162.201.54
    mCS7AR9pKm.elfGet hashmaliciousMirai, OkiruBrowse
    • 20.174.35.247
    SecuriteInfo.com.Trojan.Siggen28.27399.23329.29047.exeGet hashmaliciousRemcos, DBatLoaderBrowse
    • 13.107.137.11
    Gantt_Excel_Pro_Daily_Free1.xlsmGet hashmaliciousUnknownBrowse
    • 13.107.246.40
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    a0e9f5d64349fb13191bc781f81f42e1SecuriteInfo.com.Trojan.Siggen28.27399.23329.29047.exeGet hashmaliciousRemcos, DBatLoaderBrowse
    • 13.107.213.41
    Gantt_Excel_Pro_Daily_Free1.xlsmGet hashmaliciousUnknownBrowse
    • 13.107.213.41
    s2dwlCsA95.exeGet hashmaliciousRisePro StealerBrowse
    • 13.107.213.41
    SecuriteInfo.com.Trojan.PWS.Steam.37210.2413.24955.exeGet hashmaliciousLummaCBrowse
    • 13.107.213.41
    avp.msiGet hashmaliciousUnknownBrowse
    • 13.107.213.41
    13w4NM6mPa.exeGet hashmaliciousLummaCBrowse
    • 13.107.213.41
    SecuriteInfo.com.Win32.Evo-gen.15237.11182.exeGet hashmaliciousAmadey, RedLine, RisePro StealerBrowse
    • 13.107.213.41
    SecuriteInfo.com.Trojan.KillProc2.23108.29569.31585.exeGet hashmaliciousUnknownBrowse
    • 13.107.213.41
    UeW2b6mU6Z.exeGet hashmaliciousAmadey, RisePro StealerBrowse
    • 13.107.213.41
    0001.docGet hashmaliciousDynamerBrowse
    • 13.107.213.41
    No context
    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
    File Type:data
    Category:dropped
    Size (bytes):338
    Entropy (8bit):3.467955489419957
    Encrypted:false
    SSDEEP:6:kKulQ8WYvJFN+SkQlPlEGYRMY9z+s3Ql2DUevat:2C1YkkPlE99SCQl2DUevat
    MD5:7E601887FA3C0CBB05EE305B115455F3
    SHA1:01A8F00FEE293F09B4110B0DFA1FDB7CC176A6B1
    SHA-256:81ECB3E4661C0A3B829E24689A5D0B2F7551D90CEFE6A5822B4A7300413191D9
    SHA-512:535CB8AD0BBB5B3F7FE78B0694E739059081D73A6CDEE3B462C18D015ED84B71A024B6897BCB2E1D4CD892CBD9A416F11DA28AB03812C6FA5A505E44B2F2A030
    Malicious:false
    Reputation:low
    Preview:p...... ..........V.....(.................................................=.@... .........p.........$...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.d.i.s.a.l.l.o.w.e.d.c.e.r.t.s.t.l...c.a.b...".7.4.6.7.8.7.a.3.f.0.d.9.1.:.0."...
    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
    File Type:Composite Document File V2 Document, Cannot read section info
    Category:dropped
    Size (bytes):1536
    Entropy (8bit):1.1464700112623651
    Encrypted:false
    SSDEEP:3:YmsalTlLPltl2N81HRQjlORGt7RQ//W1XR9//3R9//3R9//:rl912N0xs+CFQXCB9Xh9Xh9X
    MD5:72F5C05B7EA8DD6059BF59F50B22DF33
    SHA1:D5AF52E129E15E3A34772806F6C5FBF132E7408E
    SHA-256:1DC0C8D7304C177AD0E74D3D2F1002EB773F4B180685A7DF6BBE75CCC24B0164
    SHA-512:6FF1E2E6B99BD0A4ED7CA8A9E943551BCD73A0BEFCACE6F1B1106E88595C0846C9BB76CA99A33266FFEC2440CF6A440090F803ABBF28B208A6C7BC6310BEB39E
    Malicious:false
    Reputation:high, very likely benign file
    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
    File Type:data
    Category:dropped
    Size (bytes):512
    Entropy (8bit):0.0
    Encrypted:false
    SSDEEP:3::
    MD5:BF619EAC0CDF3F68D496EA9344137E8B
    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
    Malicious:false
    Reputation:high, very likely benign file
    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
    File Type:data
    Category:dropped
    Size (bytes):165
    Entropy (8bit):1.4377382811115937
    Encrypted:false
    SSDEEP:3:KVC+cAmltV:KVC+cR
    MD5:9C7132B2A8CABF27097749F4D8447635
    SHA1:71D7F78718A7AFC3EAB22ED395321F6CBE2F9899
    SHA-256:7029AE5479F0CD98D892F570A22B2AE8302747DCFF3465B2DE64D974AE815A83
    SHA-512:333AC8A4987CC7DF5981AE81238A77D123996DB2C4C97053E8BD2048A64FDCF33E1245DEE6839358161F6B5EEA6BFD8D2358BC4A9188D786295C22F79E2D635E
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview:.user ..j.o.n.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
    File type:Microsoft Excel 2007+
    Entropy (8bit):7.073600009411692
    TrID:
    • Excel Microsoft Office Open XML Format document (40004/1) 83.33%
    • ZIP compressed archive (8000/1) 16.67%
    File name:Urgence .xlsx
    File size:11'756 bytes
    MD5:958216675f28608052a5bc4c7053e7a5
    SHA1:3c42e7b4829ffa7920ba7360f17bb3f2f90d6b09
    SHA256:1f20ed328634d384252509203773c8e4a035d732ec281e2966d544a8a6724665
    SHA512:cf1c06f6e8b7240d60e994be809dd09a7b64ee226e6c2baca9beaeba0844b5955479b0fa263df9253d14909a3f9aeef5459bf823154782d9102b5d6842a49414
    SSDEEP:192:KLb3UULfYiu2sVSxfTWrwvUxHppriBGGjPqub1LeBOk:KH3DjYp2sVSxfTHcHpABZjCkiV
    TLSH:36326E3DD246907DC672907C940C11E8530DE1AAF652E25E765437A8B8C122A33CFBEB
    File Content Preview:PK..........!.A7..n...........[Content_Types].xml ...(.........................................................................................................................................................................................................
    Icon Hash:35e58a8c0c8a85b9
    Document Type:OpenXML
    Number of OLE Files:1
    Has Summary Info:
    Application Name:
    Encrypted Document:False
    Contains Word Document Stream:False
    Contains Workbook/Book Stream:True
    Contains PowerPoint Document Stream:False
    Contains Visio Document Stream:False
    Contains ObjectPool Stream:False
    Flash Objects Count:0
    Contains VBA Macros:False
    TimestampSource PortDest PortSource IPDest IP
    Apr 19, 2024 19:34:02.725440025 CEST49753443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:02.725492954 CEST4434975313.107.213.41192.168.2.4
    Apr 19, 2024 19:34:02.725574970 CEST49753443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:02.725661993 CEST49754443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:02.725689888 CEST4434975413.107.213.41192.168.2.4
    Apr 19, 2024 19:34:02.725938082 CEST49756443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:02.725974083 CEST4434975613.107.213.41192.168.2.4
    Apr 19, 2024 19:34:02.725995064 CEST49755443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:02.726017952 CEST4434975513.107.213.41192.168.2.4
    Apr 19, 2024 19:34:02.726099014 CEST49756443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:02.726090908 CEST49757443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:02.726159096 CEST49753443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:02.726181030 CEST4434975713.107.213.41192.168.2.4
    Apr 19, 2024 19:34:02.726186991 CEST49754443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:02.726191044 CEST49755443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:02.726197958 CEST4434975313.107.213.41192.168.2.4
    Apr 19, 2024 19:34:02.726249933 CEST49757443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:02.726408005 CEST49754443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:02.726414919 CEST4434975413.107.213.41192.168.2.4
    Apr 19, 2024 19:34:02.726521969 CEST49755443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:02.726527929 CEST4434975513.107.213.41192.168.2.4
    Apr 19, 2024 19:34:02.726629972 CEST49757443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:02.726650953 CEST4434975713.107.213.41192.168.2.4
    Apr 19, 2024 19:34:02.726844072 CEST49756443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:02.726864100 CEST4434975613.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.055640936 CEST4434975513.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.055738926 CEST49755443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.056229115 CEST4434975313.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.056377888 CEST49753443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.057521105 CEST4434975413.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.057576895 CEST49755443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.057588100 CEST4434975513.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.057636976 CEST49754443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.057765007 CEST49753443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.057782888 CEST4434975313.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.057918072 CEST4434975513.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.058007956 CEST4434975313.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.059199095 CEST49754443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.059211016 CEST4434975413.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.059357882 CEST49755443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.059540033 CEST4434975413.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.059730053 CEST4434975713.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.059803963 CEST49757443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.060889959 CEST49754443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.062354088 CEST49757443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.062397003 CEST4434975713.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.062520027 CEST4434975613.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.062602043 CEST49756443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.062752008 CEST4434975713.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.063793898 CEST49756443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.063805103 CEST4434975613.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.064141989 CEST4434975613.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.064176083 CEST49757443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.065129995 CEST49756443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.067398071 CEST49753443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.104159117 CEST4434975513.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.108128071 CEST4434975313.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.108140945 CEST4434975413.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.108148098 CEST4434975613.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.108160019 CEST4434975713.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.257157087 CEST4434975513.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.257268906 CEST4434975513.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.257350922 CEST49755443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.258074999 CEST49755443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.258074999 CEST49755443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.258093119 CEST4434975513.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.258100986 CEST4434975513.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.261162996 CEST4434975713.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.261324883 CEST4434975313.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.261348009 CEST4434975313.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.261403084 CEST4434975713.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.261418104 CEST49753443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.261425018 CEST4434975313.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.261436939 CEST4434975313.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.261492014 CEST49757443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.261501074 CEST49753443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.261492014 CEST49757443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.261519909 CEST4434975313.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.261569023 CEST49753443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.261579990 CEST49757443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.261619091 CEST4434975713.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.261859894 CEST49753443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.261878014 CEST4434975313.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.261888027 CEST49753443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.261893034 CEST4434975313.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.271039963 CEST49758443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.271085978 CEST4434975813.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.271322012 CEST49758443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.271539927 CEST49758443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.271559000 CEST4434975813.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.272834063 CEST49759443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.272855043 CEST4434975913.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.272933006 CEST49759443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.273085117 CEST49759443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.273099899 CEST4434975913.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.273719072 CEST49760443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.273729086 CEST4434976013.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.273792982 CEST49760443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.273931026 CEST49760443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.273946047 CEST4434976013.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.299990892 CEST4434975613.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.300271988 CEST4434975613.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.300499916 CEST49756443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.300535917 CEST49756443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.300558090 CEST4434975613.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.300568104 CEST49756443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.300574064 CEST4434975613.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.309818029 CEST49761443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.309828997 CEST4434976113.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.310075998 CEST49761443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.310470104 CEST49761443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.310482025 CEST4434976113.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.405981064 CEST4434975413.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.406044960 CEST4434975413.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.406119108 CEST49754443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.406133890 CEST4434975413.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.406270981 CEST4434975413.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.406315088 CEST49754443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.406341076 CEST4434975413.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.406353951 CEST49754443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.406362057 CEST4434975413.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.415059090 CEST49762443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.415092945 CEST4434976213.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.415190935 CEST49762443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.415420055 CEST49762443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.415435076 CEST4434976213.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.588706017 CEST4434975813.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.589282036 CEST49758443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.589315891 CEST4434975813.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.590143919 CEST49758443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.590152979 CEST4434975813.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.592297077 CEST4434975913.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.592700958 CEST49759443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.592715025 CEST4434975913.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.593635082 CEST49759443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.593640089 CEST4434975913.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.597531080 CEST4434976013.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.597949982 CEST49760443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.597959042 CEST4434976013.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.598723888 CEST49760443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.598730087 CEST4434976013.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.634809017 CEST4434976113.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.635173082 CEST49761443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.635186911 CEST4434976113.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.635936022 CEST49761443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.635940075 CEST4434976113.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.741962910 CEST4434976213.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.742594957 CEST49762443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.742618084 CEST4434976213.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.743484020 CEST49762443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.743490934 CEST4434976213.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.814974070 CEST4434975913.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.815076113 CEST4434975913.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.815159082 CEST49759443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.815387011 CEST49759443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.815387011 CEST49759443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.815402985 CEST4434975913.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.815412045 CEST4434975913.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.847599030 CEST4434976113.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.847749949 CEST4434976113.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.847815990 CEST49761443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.847907066 CEST49761443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.847914934 CEST4434976113.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.847927094 CEST49761443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.847930908 CEST4434976113.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.937402010 CEST4434976013.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.937566996 CEST4434976013.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.937740088 CEST49760443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.937786102 CEST49760443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.937803984 CEST4434976013.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.937817097 CEST49760443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.937824011 CEST4434976013.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.954891920 CEST4434975813.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.954968929 CEST4434975813.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.955029011 CEST49758443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.955271959 CEST49758443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.955291986 CEST4434975813.107.213.41192.168.2.4
    Apr 19, 2024 19:34:03.955310106 CEST49758443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:03.955317020 CEST4434975813.107.213.41192.168.2.4
    Apr 19, 2024 19:34:04.106054068 CEST4434976213.107.213.41192.168.2.4
    Apr 19, 2024 19:34:04.106147051 CEST4434976213.107.213.41192.168.2.4
    Apr 19, 2024 19:34:04.106199980 CEST49762443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:04.106452942 CEST49762443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:04.106475115 CEST4434976213.107.213.41192.168.2.4
    Apr 19, 2024 19:34:04.106486082 CEST49762443192.168.2.413.107.213.41
    Apr 19, 2024 19:34:04.106492996 CEST4434976213.107.213.41192.168.2.4
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Apr 19, 2024 19:34:02.724349976 CEST1.1.1.1192.168.2.40xa4a4No error (0)shed.dual-low.part-0013.t-0009.t-msedge.netpart-0013.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
    Apr 19, 2024 19:34:02.724349976 CEST1.1.1.1192.168.2.40xa4a4No error (0)part-0013.t-0009.t-msedge.net13.107.213.41A (IP address)IN (0x0001)false
    Apr 19, 2024 19:34:02.724349976 CEST1.1.1.1192.168.2.40xa4a4No error (0)part-0013.t-0009.t-msedge.net13.107.246.41A (IP address)IN (0x0001)false
    • otelrules.azureedge.net
    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    0192.168.2.44975513.107.213.414436600C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
    TimestampBytes transferredDirectionData
    2024-04-19 17:34:03 UTC207OUTGET /rules/rule490016v3s19.xml HTTP/1.1
    Connection: Keep-Alive
    Accept-Encoding: gzip
    User-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.16827; Pro)
    Host: otelrules.azureedge.net
    2024-04-19 17:34:03 UTC491INHTTP/1.1 200 OK
    Date: Fri, 19 Apr 2024 17:34:03 GMT
    Content-Type: text/xml
    Content-Length: 777
    Connection: close
    Cache-Control: public, max-age=604800, immutable
    Last-Modified: Tue, 09 Apr 2024 00:28:04 GMT
    ETag: "0x8DC582BEC2AAB32"
    x-ms-request-id: b15df4e6-e01e-0001-048f-91fefa000000
    x-ms-version: 2018-03-28
    x-azure-ref: 20240419T173403Z-15497cdd9fdv65lsakdy1qt1yn0000000270000000000tu4
    x-fd-int-roxy-purgeid: 0
    X-Cache-Info: L1_T2
    X-Cache: TCP_HIT
    Accept-Ranges: bytes
    2024-04-19 17:34:03 UTC777INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 34 39 30 30 31 36 22 20 56 3d 22 33 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 46 65 65 64 62 61 63 6b 2e 53 75 72 76 65 79 2e 46 6c 6f 6f 64 67 61 74 65 43 6c 69 65 6e 74 2e 52 6f 61 6d 69 6e 67 53 75 63 63 65 73 73 66 75 6c 52 65 61 64 57 72 69 74 65 22 20 41 54 54 3d 22 64 37 39 65 38 32 34 33 38 36 63 34 34 34 31 63 62 38 63 31 64 34 61 65 31 35 36 39 30 35 32 36 2d 62 64 34 34 33 33 30 39 2d 35 34 39 34 2d 34 34 34 61 2d 61 62 61 39 2d 30 61 66 39 65 65 66 39 39 66 38 34 2d 37 33 36 30 22 20 54 3d 22 55 70 6c 6f 61 64 2d 4d 65 64 69 75 6d 22 20 44 4c 3d 22 4e 22 20 44 43 61 3d 22 50
    Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="490016" V="3" DC="SM" EN="Office.Feedback.Survey.FloodgateClient.RoamingSuccessfulReadWrite" ATT="d79e824386c4441cb8c1d4ae15690526-bd443309-5494-444a-aba9-0af9eef99f84-7360" T="Upload-Medium" DL="N" DCa="P


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    1192.168.2.44975413.107.213.414436600C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
    TimestampBytes transferredDirectionData
    2024-04-19 17:34:03 UTC208OUTGET /rules/rule170012v10s19.xml HTTP/1.1
    Connection: Keep-Alive
    Accept-Encoding: gzip
    User-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.16827; Pro)
    Host: otelrules.azureedge.net
    2024-04-19 17:34:03 UTC564INHTTP/1.1 200 OK
    Date: Fri, 19 Apr 2024 17:34:03 GMT
    Content-Type: text/xml
    Content-Length: 1523
    Connection: close
    Vary: Accept-Encoding
    Vary: Accept-Encoding
    Vary: Accept-Encoding
    Vary: Accept-Encoding
    Cache-Control: public, max-age=604800, immutable
    Last-Modified: Tue, 09 Apr 2024 00:27:33 GMT
    ETag: "0x8DC582BD969CD29"
    x-ms-request-id: 9d4471c2-301e-0014-727f-92c9d2000000
    x-ms-version: 2018-03-28
    x-azure-ref: 20240419T173403Z-r1f585c6b654pwmnf439dcuuhs00000000f000000000f9wz
    x-fd-int-roxy-purgeid: 0
    X-Cache: TCP_MISS
    Accept-Ranges: bytes
    2024-04-19 17:34:03 UTC1523INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 37 30 30 31 32 22 20 56 3d 22 31 30 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 47 72 61 70 68 69 63 73 2e 47 56 69 7a 49 6e 6b 53 74 72 6f 6b 65 22 20 41 54 54 3d 22 63 66 63 66 64 62 39 31 63 36 38 63 34 33 32 39 62 62 38 62 37 63 62 37 62 61 62 62 33 63 66 37 2d 65 30 38 32 63 32 66 32 2d 65 66 31 64 2d 34 32 37 61 2d 61 63 34 64 2d 62 30 62 37 30 30 61 66 65 37 61 37 2d 37 36 35 35 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 43 61 3d 22 50 53 55 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 54 53 20 54
    Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="170012" V="10" DC="SM" EN="Office.Graphics.GVizInkStroke" ATT="cfcfdb91c68c4329bb8b7cb7babb3cf7-e082c2f2-ef1d-427a-ac4d-b0b700afe7a7-7655" SP="CriticalBusinessImpact" DCa="PSU" xmlns=""> <S> <UTS T


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    2192.168.2.44975713.107.213.414436600C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
    TimestampBytes transferredDirectionData
    2024-04-19 17:34:03 UTC207OUTGET /rules/rule324002v5s19.xml HTTP/1.1
    Connection: Keep-Alive
    Accept-Encoding: gzip
    User-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.16827; Pro)
    Host: otelrules.azureedge.net
    2024-04-19 17:34:03 UTC491INHTTP/1.1 200 OK
    Date: Fri, 19 Apr 2024 17:34:03 GMT
    Content-Type: text/xml
    Content-Length: 833
    Connection: close
    Cache-Control: public, max-age=604800, immutable
    Last-Modified: Tue, 09 Apr 2024 00:27:33 GMT
    ETag: "0x8DC582BD9758B35"
    x-ms-request-id: ed3e7fbf-c01e-00ab-55c5-913689000000
    x-ms-version: 2018-03-28
    x-azure-ref: 20240419T173403Z-15497cdd9fdjss27kvz4y54h1c000000021g00000000c6dq
    x-fd-int-roxy-purgeid: 0
    X-Cache: TCP_HIT
    X-Cache-Info: L1_T2
    Accept-Ranges: bytes
    2024-04-19 17:34:03 UTC833INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 33 32 34 30 30 32 22 20 56 3d 22 35 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 45 78 74 65 6e 73 69 62 69 6c 69 74 79 2e 56 62 61 54 65 6c 65 6d 65 74 72 79 44 65 63 6c 61 72 65 22 20 41 54 54 3d 22 64 62 33 33 34 62 33 30 31 65 37 62 34 37 34 64 62 35 65 30 66 30 32 66 30 37 63 35 31 61 34 37 2d 61 31 62 35 62 63 33 36 2d 31 62 62 65 2d 34 38 32 66 2d 61 36 34 61 2d 63 32 64 39 63 62 36 30 36 37 30 36 2d 37 34 33 39 22 20 44 43 61 3d 22 44 43 20 50 53 50 20 50 53 55 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 54 53 20 54 3d 22 31 22 20 49 64 3d 22 62 30
    Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="324002" V="5" DC="SM" EN="Office.Extensibility.VbaTelemetryDeclare" ATT="db334b301e7b474db5e0f02f07c51a47-a1b5bc36-1bbe-482f-a64a-c2d9cb606706-7439" DCa="DC PSP PSU" xmlns=""> <S> <UTS T="1" Id="b0


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    3192.168.2.44975613.107.213.414436600C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
    TimestampBytes transferredDirectionData
    2024-04-19 17:34:03 UTC207OUTGET /rules/rule324001v4s19.xml HTTP/1.1
    Connection: Keep-Alive
    Accept-Encoding: gzip
    User-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.16827; Pro)
    Host: otelrules.azureedge.net
    2024-04-19 17:34:03 UTC491INHTTP/1.1 200 OK
    Date: Fri, 19 Apr 2024 17:34:03 GMT
    Content-Type: text/xml
    Content-Length: 513
    Connection: close
    Cache-Control: public, max-age=604800, immutable
    Last-Modified: Tue, 09 Apr 2024 00:27:31 GMT
    ETag: "0x8DC582BD84BDCC1"
    x-ms-request-id: f0f66557-d01e-000a-199e-91dbed000000
    x-ms-version: 2018-03-28
    x-azure-ref: 20240419T173403Z-15497cdd9fdx9w4fww2fv0kevn000000021000000000qh74
    x-fd-int-roxy-purgeid: 0
    X-Cache: TCP_HIT
    X-Cache-Info: L1_T2
    Accept-Ranges: bytes
    2024-04-19 17:34:03 UTC513INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 33 32 34 30 30 31 22 20 56 3d 22 34 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 45 78 74 65 6e 73 69 62 69 6c 69 74 79 2e 56 62 61 54 65 6c 65 6d 65 74 72 79 50 72 6f 6a 65 63 74 4c 6f 61 64 22 20 41 54 54 3d 22 64 62 33 33 34 62 33 30 31 65 37 62 34 37 34 64 62 35 65 30 66 30 32 66 30 37 63 35 31 61 34 37 2d 61 31 62 35 62 63 33 36 2d 31 62 62 65 2d 34 38 32 66 2d 61 36 34 61 2d 63 32 64 39 63 62 36 30 36 37 30 36 2d 37 34 33 39 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 43 61 3d 22 44 43 20 50 53 50 20 50 53 55 22 20 78 6d 6c 6e 73 3d 22
    Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="324001" V="4" DC="SM" EN="Office.Extensibility.VbaTelemetryProjectLoad" ATT="db334b301e7b474db5e0f02f07c51a47-a1b5bc36-1bbe-482f-a64a-c2d9cb606706-7439" SP="CriticalBusinessImpact" DCa="DC PSP PSU" xmlns="


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    4192.168.2.44975313.107.213.414436600C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
    TimestampBytes transferredDirectionData
    2024-04-19 17:34:03 UTC206OUTGET /rules/rule63067v4s19.xml HTTP/1.1
    Connection: Keep-Alive
    Accept-Encoding: gzip
    User-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.16827; Pro)
    Host: otelrules.azureedge.net
    2024-04-19 17:34:03 UTC584INHTTP/1.1 200 OK
    Date: Fri, 19 Apr 2024 17:34:03 GMT
    Content-Type: text/xml
    Content-Length: 2871
    Connection: close
    Vary: Accept-Encoding
    Vary: Accept-Encoding
    Vary: Accept-Encoding
    Vary: Accept-Encoding
    Cache-Control: public, max-age=604800, immutable
    Last-Modified: Tue, 09 Apr 2024 00:28:05 GMT
    ETag: "0x8DC582BEC5E84E0"
    x-ms-request-id: 8663ad55-801e-006f-547c-911ec5000000
    x-ms-version: 2018-03-28
    x-azure-ref: 20240419T173403Z-15497cdd9fdrsn2z8f5p1u9wmw00000001tg00000000pmhz
    x-fd-int-roxy-purgeid: 0
    X-Cache-Info: L1_T2
    X-Cache: TCP_HIT
    Accept-Ranges: bytes
    2024-04-19 17:34:03 UTC2871INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 36 33 30 36 37 22 20 56 3d 22 34 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 49 64 65 6e 74 69 74 79 2e 53 73 70 69 50 72 6f 6d 70 74 57 69 6e 33 32 22 20 41 54 54 3d 22 35 63 36 35 62 62 63 34 65 64 62 66 34 38 30 64 39 36 33 37 61 63 65 30 34 64 36 32 62 64 39 38 2d 31 32 38 34 34 38 39 33 2d 38 61 62 39 2d 34 64 64 65 2d 62 38 35 30 2d 35 36 31 32 63 62 31 32 65 30 66 32 2d 37 38 32 32 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 4c 3d 22 41 22 20 44 43 61 3d 22 44 43 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20
    Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="63067" V="4" DC="SM" EN="Office.Identity.SspiPromptWin32" ATT="5c65bbc4edbf480d9637ace04d62bd98-12844893-8ab9-4dde-b850-5612cb12e0f2-7822" SP="CriticalBusinessImpact" DL="A" DCa="DC" xmlns=""> <S>


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    5192.168.2.44975813.107.213.414436600C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
    TimestampBytes transferredDirectionData
    2024-04-19 17:34:03 UTC207OUTGET /rules/rule324003v5s19.xml HTTP/1.1
    Connection: Keep-Alive
    Accept-Encoding: gzip
    User-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.16827; Pro)
    Host: otelrules.azureedge.net
    2024-04-19 17:34:03 UTC471INHTTP/1.1 200 OK
    Date: Fri, 19 Apr 2024 17:34:03 GMT
    Content-Type: text/xml
    Content-Length: 716
    Connection: close
    Cache-Control: public, max-age=604800, immutable
    Last-Modified: Tue, 09 Apr 2024 00:27:34 GMT
    ETag: "0x8DC582BD9F5CC0A"
    x-ms-request-id: b899e39f-801e-0083-197f-92ffab000000
    x-ms-version: 2018-03-28
    x-azure-ref: 20240419T173403Z-r1f585c6b659ct79h19zvkrvg000000000kg0000000036gf
    x-fd-int-roxy-purgeid: 0
    X-Cache: TCP_MISS
    Accept-Ranges: bytes
    2024-04-19 17:34:03 UTC716INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 33 32 34 30 30 33 22 20 56 3d 22 35 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 45 78 74 65 6e 73 69 62 69 6c 69 74 79 2e 56 62 61 54 65 6c 65 6d 65 74 72 79 52 65 66 65 72 65 6e 63 65 64 4c 69 62 72 61 72 79 22 20 41 54 54 3d 22 64 62 33 33 34 62 33 30 31 65 37 62 34 37 34 64 62 35 65 30 66 30 32 66 30 37 63 35 31 61 34 37 2d 61 31 62 35 62 63 33 36 2d 31 62 62 65 2d 34 38 32 66 2d 61 36 34 61 2d 63 32 64 39 63 62 36 30 36 37 30 36 2d 37 34 33 39 22 20 44 43 61 3d 22 44 43 20 50 53 50 20 50 53 55 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 54 53 20 54 3d
    Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="324003" V="5" DC="SM" EN="Office.Extensibility.VbaTelemetryReferencedLibrary" ATT="db334b301e7b474db5e0f02f07c51a47-a1b5bc36-1bbe-482f-a64a-c2d9cb606706-7439" DCa="DC PSP PSU" xmlns=""> <S> <UTS T=


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    6192.168.2.44975913.107.213.414436600C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
    TimestampBytes transferredDirectionData
    2024-04-19 17:34:03 UTC207OUTGET /rules/rule324004v4s19.xml HTTP/1.1
    Connection: Keep-Alive
    Accept-Encoding: gzip
    User-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.16827; Pro)
    Host: otelrules.azureedge.net
    2024-04-19 17:34:03 UTC491INHTTP/1.1 200 OK
    Date: Fri, 19 Apr 2024 17:34:03 GMT
    Content-Type: text/xml
    Content-Length: 738
    Connection: close
    Cache-Control: public, max-age=604800, immutable
    Last-Modified: Tue, 09 Apr 2024 00:27:34 GMT
    ETag: "0x8DC582BD9FE7D4B"
    x-ms-request-id: 13dc5484-201e-0065-36c6-9110d0000000
    x-ms-version: 2018-03-28
    x-azure-ref: 20240419T173403Z-15497cdd9fdtp976bg8q1vzk2g0000000220000000004hpf
    x-fd-int-roxy-purgeid: 0
    X-Cache: TCP_HIT
    X-Cache-Info: L1_T2
    Accept-Ranges: bytes
    2024-04-19 17:34:03 UTC738INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 33 32 34 30 30 34 22 20 56 3d 22 34 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 45 78 74 65 6e 73 69 62 69 6c 69 74 79 2e 56 62 61 54 65 6c 65 6d 65 74 72 79 43 6f 6d 4f 62 6a 65 63 74 49 6e 73 74 61 6e 74 69 61 74 65 64 22 20 41 54 54 3d 22 64 62 33 33 34 62 33 30 31 65 37 62 34 37 34 64 62 35 65 30 66 30 32 66 30 37 63 35 31 61 34 37 2d 61 31 62 35 62 63 33 36 2d 31 62 62 65 2d 34 38 32 66 2d 61 36 34 61 2d 63 32 64 39 63 62 36 30 36 37 30 36 2d 37 34 33 39 22 20 44 43 61 3d 22 44 43 20 50 53 50 20 50 53 55 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 54
    Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="324004" V="4" DC="SM" EN="Office.Extensibility.VbaTelemetryComObjectInstantiated" ATT="db334b301e7b474db5e0f02f07c51a47-a1b5bc36-1bbe-482f-a64a-c2d9cb606706-7439" DCa="DC PSP PSU" xmlns=""> <S> <UT


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    7192.168.2.44976013.107.213.414436600C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
    TimestampBytes transferredDirectionData
    2024-04-19 17:34:03 UTC207OUTGET /rules/rule324005v2s19.xml HTTP/1.1
    Connection: Keep-Alive
    Accept-Encoding: gzip
    User-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.16827; Pro)
    Host: otelrules.azureedge.net
    2024-04-19 17:34:03 UTC491INHTTP/1.1 200 OK
    Date: Fri, 19 Apr 2024 17:34:03 GMT
    Content-Type: text/xml
    Content-Length: 599
    Connection: close
    Cache-Control: public, max-age=604800, immutable
    Last-Modified: Tue, 09 Apr 2024 00:26:51 GMT
    ETag: "0x8DC582BC0B3C3C8"
    x-ms-request-id: 7555bf10-901e-005a-315f-92b8de000000
    x-ms-version: 2018-03-28
    x-azure-ref: 20240419T173403Z-15497cdd9fdrsn2z8f5p1u9wmw00000001y000000000bwcs
    x-fd-int-roxy-purgeid: 0
    X-Cache-Info: L1_T2
    X-Cache: TCP_HIT
    Accept-Ranges: bytes
    2024-04-19 17:34:03 UTC599INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 33 32 34 30 30 35 22 20 56 3d 22 32 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 45 78 74 65 6e 73 69 62 69 6c 69 74 79 2e 56 62 61 54 65 6c 65 6d 65 74 72 79 43 6f 6d 70 69 6c 65 22 20 41 54 54 3d 22 64 62 33 33 34 62 33 30 31 65 37 62 34 37 34 64 62 35 65 30 66 30 32 66 30 37 63 35 31 61 34 37 2d 61 31 62 35 62 63 33 36 2d 31 62 62 65 2d 34 38 32 66 2d 61 36 34 61 2d 63 32 64 39 63 62 36 30 36 37 30 36 2d 37 34 33 39 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 43 61 3d 22 44 43 20 50 53 50 20 50 53 55 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a
    Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="324005" V="2" DC="SM" EN="Office.Extensibility.VbaTelemetryCompile" ATT="db334b301e7b474db5e0f02f07c51a47-a1b5bc36-1bbe-482f-a64a-c2d9cb606706-7439" SP="CriticalBusinessImpact" DCa="DC PSP PSU" xmlns="">


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    8192.168.2.44976113.107.213.414436600C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
    TimestampBytes transferredDirectionData
    2024-04-19 17:34:03 UTC207OUTGET /rules/rule324006v2s19.xml HTTP/1.1
    Connection: Keep-Alive
    Accept-Encoding: gzip
    User-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.16827; Pro)
    Host: otelrules.azureedge.net
    2024-04-19 17:34:03 UTC491INHTTP/1.1 200 OK
    Date: Fri, 19 Apr 2024 17:34:03 GMT
    Content-Type: text/xml
    Content-Length: 599
    Connection: close
    Cache-Control: public, max-age=604800, immutable
    Last-Modified: Tue, 09 Apr 2024 00:26:44 GMT
    ETag: "0x8DC582BBC83D642"
    x-ms-request-id: 7e9d3904-301e-0050-1ec5-91b6cb000000
    x-ms-version: 2018-03-28
    x-azure-ref: 20240419T173403Z-15497cdd9fd6xqg2gux9dtkys40000000270000000001rpm
    x-fd-int-roxy-purgeid: 0
    X-Cache: TCP_HIT
    X-Cache-Info: L1_T2
    Accept-Ranges: bytes
    2024-04-19 17:34:03 UTC599INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 33 32 34 30 30 36 22 20 56 3d 22 32 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 45 78 74 65 6e 73 69 62 69 6c 69 74 79 2e 56 62 61 54 65 6c 65 6d 65 74 72 79 53 68 6f 77 49 64 65 22 20 41 54 54 3d 22 64 62 33 33 34 62 33 30 31 65 37 62 34 37 34 64 62 35 65 30 66 30 32 66 30 37 63 35 31 61 34 37 2d 61 31 62 35 62 63 33 36 2d 31 62 62 65 2d 34 38 32 66 2d 61 36 34 61 2d 63 32 64 39 63 62 36 30 36 37 30 36 2d 37 34 33 39 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 43 61 3d 22 44 43 20 50 53 50 20 50 53 55 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a
    Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="324006" V="2" DC="SM" EN="Office.Extensibility.VbaTelemetryShowIde" ATT="db334b301e7b474db5e0f02f07c51a47-a1b5bc36-1bbe-482f-a64a-c2d9cb606706-7439" SP="CriticalBusinessImpact" DCa="DC PSP PSU" xmlns="">


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    9192.168.2.44976213.107.213.414436600C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
    TimestampBytes transferredDirectionData
    2024-04-19 17:34:03 UTC207OUTGET /rules/rule324007v2s19.xml HTTP/1.1
    Connection: Keep-Alive
    Accept-Encoding: gzip
    User-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.16827; Pro)
    Host: otelrules.azureedge.net
    2024-04-19 17:34:04 UTC471INHTTP/1.1 200 OK
    Date: Fri, 19 Apr 2024 17:34:04 GMT
    Content-Type: text/xml
    Content-Length: 611
    Connection: close
    Cache-Control: public, max-age=604800, immutable
    Last-Modified: Tue, 09 Apr 2024 00:26:50 GMT
    ETag: "0x8DC582BBFB58BC6"
    x-ms-request-id: 3b3746ab-301e-0028-467f-921cda000000
    x-ms-version: 2018-03-28
    x-azure-ref: 20240419T173403Z-r1f585c6b65w5j7cea444uznq400000000vg000000000fz9
    x-fd-int-roxy-purgeid: 0
    X-Cache: TCP_MISS
    Accept-Ranges: bytes
    2024-04-19 17:34:04 UTC611INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 33 32 34 30 30 37 22 20 56 3d 22 32 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 45 78 74 65 6e 73 69 62 69 6c 69 74 79 2e 56 62 61 54 65 6c 65 6d 65 74 72 79 49 64 65 4d 61 63 72 6f 52 75 6e 22 20 41 54 54 3d 22 64 62 33 33 34 62 33 30 31 65 37 62 34 37 34 64 62 35 65 30 66 30 32 66 30 37 63 35 31 61 34 37 2d 61 31 62 35 62 63 33 36 2d 31 62 62 65 2d 34 38 32 66 2d 61 36 34 61 2d 63 32 64 39 63 62 36 30 36 37 30 36 2d 37 34 33 39 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 43 61 3d 22 44 43 20 50 53 50 20 50 53 55 22 20 78 6d 6c 6e 73 3d 22
    Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="324007" V="2" DC="SM" EN="Office.Extensibility.VbaTelemetryIdeMacroRun" ATT="db334b301e7b474db5e0f02f07c51a47-a1b5bc36-1bbe-482f-a64a-c2d9cb606706-7439" SP="CriticalBusinessImpact" DCa="DC PSP PSU" xmlns="


    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:19:32:53
    Start date:19/04/2024
    Path:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
    Wow64 process (32bit):true
    Commandline:"C:\Program Files (x86)\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    Imagebase:0xb00000
    File size:53'161'064 bytes
    MD5 hash:4A871771235598812032C822E6F68F19
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate
    Has exited:false

    Target ID:5
    Start time:19:33:58
    Start date:19/04/2024
    Path:C:\Windows\splwow64.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\splwow64.exe 12288
    Imagebase:0x7ff7e6a40000
    File size:163'840 bytes
    MD5 hash:77DE7761B037061C7C112FD3C5B91E73
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate
    Has exited:false

    No disassembly