Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Aztec UP&GO to we 14 April 2024.xlsx

Overview

General Information

Sample name:Aztec UP&GO to we 14 April 2024.xlsx
Analysis ID:1430697
MD5:c76dd19102a9d3a23ab7f1c8310e67ce
SHA1:298059c88ad8b3e43a684399dd4a4046967a629e
SHA256:89e32b796c07a5558b9923db4cd2df7f63284c209a7898d97be92e92d458700b
Infos:

Detection

Score:4
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Document misses a certain OLE stream usually present in this Microsoft Office document type
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Excel Network Connections
Sigma detected: Suspicious Office Outbound Connections

Classification

Analysis Advice

Sample monitors window changes (e.g. starting applications), analyze the sample with the 'Simulates keyboard and window changes' cookbook
No malicious behavior found, analyze the document also on other version of Office / Acrobat
  • System is w10x64
  • EXCEL.EXE (PID: 6456 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding MD5: 4A871771235598812032C822E6F68F19)
    • splwow64.exe (PID: 6888 cmdline: C:\Windows\splwow64.exe 12288 MD5: 77DE7761B037061C7C112FD3C5B91E73)
  • cleanup
No configs have been found
No yara matches
Source: Network ConnectionAuthor: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0", Tim Shelton: Data: DestinationIp: 13.107.213.69, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE, Initiated: true, ProcessId: 6456, Protocol: tcp, SourceIp: 192.168.2.12, SourceIsIpv6: false, SourcePort: 49733
Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.12, DestinationIsIpv6: false, DestinationPort: 49733, EventID: 3, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE, Initiated: true, ProcessId: 6456, Protocol: tcp, SourceIp: 13.107.213.69, SourceIsIpv6: false, SourcePort: 443
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile opened: C:\Program Files (x86)\Microsoft Office\root\vfs\SystemX86\MSVCR100.dllJump to behavior
Source: unknownHTTPS traffic detected: 13.107.213.69:443 -> 192.168.2.12:49734 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.213.69:443 -> 192.168.2.12:49733 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.213.69:443 -> 192.168.2.12:49732 version: TLS 1.2
Source: global trafficTCP traffic: 192.168.2.12:49734 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49733 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49732 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49733 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49733 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49732 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49732 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49734 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49734 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49733 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49734 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49732 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49734 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49733 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49732 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49733 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49734 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49732 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49734 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49733 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49732 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49732 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49732 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49732 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49732 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49734 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49734 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49734 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49733 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49733 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49733 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49733 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49733 -> 13.107.213.69:443
Source: global trafficTCP traffic: 13.107.213.69:443 -> 192.168.2.12:49733
Source: global trafficTCP traffic: 192.168.2.12:49733 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49732 -> 13.107.213.69:443
Source: global trafficTCP traffic: 13.107.213.69:443 -> 192.168.2.12:49732
Source: global trafficTCP traffic: 192.168.2.12:49732 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49734 -> 13.107.213.69:443
Source: global trafficTCP traffic: 13.107.213.69:443 -> 192.168.2.12:49734
Source: global trafficTCP traffic: 192.168.2.12:49734 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49733 -> 13.107.213.69:443
Source: global trafficTCP traffic: 13.107.213.69:443 -> 192.168.2.12:49733
Source: global trafficTCP traffic: 192.168.2.12:49734 -> 13.107.213.69:443
Source: global trafficTCP traffic: 13.107.213.69:443 -> 192.168.2.12:49734
Source: global trafficTCP traffic: 192.168.2.12:49732 -> 13.107.213.69:443
Source: global trafficTCP traffic: 13.107.213.69:443 -> 192.168.2.12:49732
Source: global trafficTCP traffic: 13.107.213.69:443 -> 192.168.2.12:49734
Source: global trafficTCP traffic: 192.168.2.12:49734 -> 13.107.213.69:443
Source: global trafficTCP traffic: 13.107.213.69:443 -> 192.168.2.12:49733
Source: global trafficTCP traffic: 192.168.2.12:49733 -> 13.107.213.69:443
Source: global trafficTCP traffic: 13.107.213.69:443 -> 192.168.2.12:49732
Source: global trafficTCP traffic: 192.168.2.12:49732 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49733 -> 13.107.213.69:443
Source: global trafficTCP traffic: 13.107.213.69:443 -> 192.168.2.12:49733
Source: global trafficTCP traffic: 192.168.2.12:49734 -> 13.107.213.69:443
Source: global trafficTCP traffic: 13.107.213.69:443 -> 192.168.2.12:49734
Source: global trafficTCP traffic: 13.107.213.69:443 -> 192.168.2.12:49733
Source: global trafficTCP traffic: 13.107.213.69:443 -> 192.168.2.12:49734
Source: global trafficTCP traffic: 192.168.2.12:49732 -> 13.107.213.69:443
Source: global trafficTCP traffic: 13.107.213.69:443 -> 192.168.2.12:49732
Source: global trafficTCP traffic: 13.107.213.69:443 -> 192.168.2.12:49732
Source: global trafficTCP traffic: 192.168.2.12:49734 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49733 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49732 -> 13.107.213.69:443
Source: global trafficTCP traffic: 13.107.213.69:443 -> 192.168.2.12:49734
Source: global trafficTCP traffic: 13.107.213.69:443 -> 192.168.2.12:49732
Source: global trafficTCP traffic: 13.107.213.69:443 -> 192.168.2.12:49733
Source: global trafficTCP traffic: 13.107.213.69:443 -> 192.168.2.12:49732
Source: global trafficTCP traffic: 13.107.213.69:443 -> 192.168.2.12:49732
Source: global trafficTCP traffic: 192.168.2.12:49732 -> 13.107.213.69:443
Source: global trafficTCP traffic: 13.107.213.69:443 -> 192.168.2.12:49732
Source: global trafficTCP traffic: 13.107.213.69:443 -> 192.168.2.12:49732
Source: global trafficTCP traffic: 192.168.2.12:49732 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49732 -> 13.107.213.69:443
Source: global trafficTCP traffic: 13.107.213.69:443 -> 192.168.2.12:49732
Source: global trafficTCP traffic: 192.168.2.12:49732 -> 13.107.213.69:443
Source: global trafficTCP traffic: 13.107.213.69:443 -> 192.168.2.12:49732
Source: global trafficTCP traffic: 13.107.213.69:443 -> 192.168.2.12:49734
Source: global trafficTCP traffic: 13.107.213.69:443 -> 192.168.2.12:49734
Source: global trafficTCP traffic: 192.168.2.12:49734 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49734 -> 13.107.213.69:443
Source: global trafficTCP traffic: 13.107.213.69:443 -> 192.168.2.12:49734
Source: global trafficTCP traffic: 192.168.2.12:49734 -> 13.107.213.69:443
Source: global trafficTCP traffic: 13.107.213.69:443 -> 192.168.2.12:49734
Source: global trafficTCP traffic: 13.107.213.69:443 -> 192.168.2.12:49733
Source: global trafficTCP traffic: 13.107.213.69:443 -> 192.168.2.12:49733
Source: global trafficTCP traffic: 13.107.213.69:443 -> 192.168.2.12:49733
Source: global trafficTCP traffic: 13.107.213.69:443 -> 192.168.2.12:49733
Source: global trafficTCP traffic: 192.168.2.12:49733 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49733 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49733 -> 13.107.213.69:443
Source: global trafficTCP traffic: 192.168.2.12:49733 -> 13.107.213.69:443
Source: global trafficTCP traffic: 13.107.213.69:443 -> 192.168.2.12:49733
Source: global trafficTCP traffic: 13.107.213.69:443 -> 192.168.2.12:49733
Source: excel.exeMemory has grown: Private usage: 2MB later: 92MB
Source: Joe Sandbox ViewIP Address: 13.107.213.69 13.107.213.69
Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
Source: global trafficHTTP traffic detected: GET /rules/rule490016v3s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.16827; Pro)Host: otelrules.azureedge.net
Source: global trafficHTTP traffic detected: GET /rules/rule63067v4s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.16827; Pro)Host: otelrules.azureedge.net
Source: global trafficHTTP traffic detected: GET /rules/rule170012v10s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.16827; Pro)Host: otelrules.azureedge.net
Source: 57C8EDB95DF3F0AD4EE2DC2B8CFD41570.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownHTTPS traffic detected: 13.107.213.69:443 -> 192.168.2.12:49734 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.213.69:443 -> 192.168.2.12:49733 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.213.69:443 -> 192.168.2.12:49732 version: TLS 1.2
Source: A19C2E78.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: classification engineClassification label: clean4.winXLSX@3/5@0/1
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Users\user\Desktop\~$Aztec UP&GO to we 14 April 2024.xlsxJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\{D5E9CE68-76DD-4DEF-AE78-4B9792620451} - OProcSessId.datJump to behavior
Source: Aztec UP&GO to we 14 April 2024.xlsxOLE indicator, Workbook stream: true
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00000303-0000-0000-C000-000000000046}\InprocServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: Aztec UP&GO to we 14 April 2024.xlsxInitial sample: OLE zip file path = xl/worksheets/_rels/sheet2.xml.rels
Source: Aztec UP&GO to we 14 April 2024.xlsxInitial sample: OLE zip file path = xl/worksheets/_rels/sheet3.xml.rels
Source: Aztec UP&GO to we 14 April 2024.xlsxInitial sample: OLE zip file path = xl/printerSettings/printerSettings2.bin
Source: Aztec UP&GO to we 14 April 2024.xlsxInitial sample: OLE zip file path = xl/printerSettings/printerSettings3.bin
Source: Aztec UP&GO to we 14 April 2024.xlsxInitial sample: OLE zip file path = xl/comments1.xml
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\CommonJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile opened: C:\Program Files (x86)\Microsoft Office\root\vfs\SystemX86\MSVCR100.dllJump to behavior
Source: Aztec UP&GO to we 14 April 2024.xlsxInitial sample: OLE indicators vbamacros = False
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeWindow / User API: threadDelayed 751Jump to behavior
Source: C:\Windows\splwow64.exeLast function: Thread delayed
Source: C:\Windows\splwow64.exeLast function: Thread delayed
Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information queried: ProcessInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Exploitation for Client Execution
Path Interception1
Process Injection
1
Masquerading
OS Credential Dumping1
Process Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Extra Window Memory Injection
1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Extra Window Memory Injection
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput Capture2
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Aztec UP&GO to we 14 April 2024.xlsx0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
part-0041.t-0009.t-msedge.net0%VirustotalBrowse
windowsupdatebg.s.llnwi.net0%VirustotalBrowse
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
part-0041.t-0009.t-msedge.net
13.107.213.69
truefalseunknown
windowsupdatebg.s.llnwi.net
68.142.107.4
truefalseunknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
13.107.213.69
part-0041.t-0009.t-msedge.netUnited States
8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1430697
Start date and time:2024-04-24 03:01:19 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 36s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultwindowsofficecookbook.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run name:Potential for more IOCs and behavior
Number of analysed new started processes analysed:9
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:Aztec UP&GO to we 14 April 2024.xlsx
Detection:CLEAN
Classification:clean4.winXLSX@3/5@0/1
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .xlsx
  • Found Word or Excel or PowerPoint or XPS Viewer
  • Attach to Office via COM
  • Scroll down
  • Close Viewer
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 52.109.8.89, 23.37.18.94, 52.113.194.132, 52.109.0.140, 68.142.107.4, 104.208.16.89
  • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.afd.azureedge.net, cus-config.officeapps.live.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, osiprod-wus-buff-azsc-000.westus.cloudapp.azure.com, ecs-office.s-0005.s-msedge.net, roaming.officeapps.live.com, wus-azsc-000.roaming.officeapps.live.com, ocsp.digicert.com, login.live.com, onedscolprdcus11.centralus.cloudapp.azure.com, e16604.g.akamaiedge.net, officeclient.microsoft.com, prod.fs.microsoft.com.akadns.net, ecs.office.com, self-events-data.trafficmanager.net, client.wns.windows.com, fs.microsoft.com, otelrules.azureedge.net, prod.configsvc1.live.com.akadns.net, us2.roaming1.live.com.akadns.net, self.events.data.microsoft.com, ctldl.windowsupdate.com, prod.roaming1.live.com.akadns.net, s-0005-office.config.skype.com, wu-bg-shim.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, s-0005.s-msedge.net, config.officeapps.live.com, us.configsvc1.live.com.akadns.net,
  • Report size getting too big, too many NtCreateKey calls found.
  • Report size getting too big, too many NtQueryAttributesFile calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
TimeTypeDescription
03:03:18API Interceptor774x Sleep call for process: splwow64.exe modified
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
13.107.213.69SecuriteInfo.com.Trojan.MSIL.zgRAT.Heur.21652.15881.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
    https://wmicrosouab-4ba8.udydzj.workers.dev/Get hashmaliciousHTMLPhisherBrowse
      https://uqgekpc20qn1.azureedge.net/6466/Get hashmaliciousTechSupportScamBrowse
        https://pub-32bf4e9c1a1344aa8c0925c562b60fd3.r2.dev/index2.htmlGet hashmaliciousHTMLPhisherBrowse
          https://hello-world-still-tree-8187.stevenmoulder.workers.dev/Get hashmaliciousHTMLPhisherBrowse
            https://pub-fc51d290db584b328d6feb3913c634a1.r2.dev/office365webb.htmlGet hashmaliciousHTMLPhisherBrowse
              https://pub-ccab1e1c90754b44a899b93b24a61322.r2.dev/pp.htmlGet hashmaliciousHTMLPhisherBrowse
                https://loveyawork.com.au/stack/office-3D8/index.phpGet hashmaliciousHTMLPhisherBrowse
                  https://liberty-d8x.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                    https://1drv.ms/o/s!BNf_jhlHIx2qhAn3a7UzSkusuBlP?e=SjQDOPFqZk6mhtb9VEwLAg&at=9Get hashmaliciousHtmlDropper, HTMLPhisherBrowse
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      windowsupdatebg.s.llnwi.netGHY7L7VaOL.exeGet hashmaliciousUnknownBrowse
                      • 68.142.107.4
                      https://auhsdbfjabsdfjs.z13.web.core.windows.net/Er0Win8helpline76/index.htmlGet hashmaliciousTechSupportScamBrowse
                      • 68.142.107.4
                      4BfhCycV4B.exeGet hashmaliciousMars Stealer, PureLog Stealer, RedLine, Stealc, Vidar, zgRATBrowse
                      • 69.164.42.0
                      https://caringhearts.foundation/wp-includes/widgets/ogk25/ogk/index.php&c=E,1,PBioTuoqxXxVmzOkxu8MYhWQ9ZbRNVLGpsstSuC0GQ2jNcQlIpYbU0K6d3lwsaeoT17vAF7VpKXs0qg9O-hGnfKxM3skSa-Jn2VJH7kX1A,,&typo=1Get hashmaliciousUnknownBrowse
                      • 68.142.107.4
                      https://caringhearts.foundation/wp-includes/widgets/ogk25/ogk/index.php&c=E,1,PBioTuoqxXxVmzOkxu8MYhWQ9ZbRNVLGpsstSuC0GQ2jNcQlIpYbU0K6d3lwsaeoT17vAF7VpKXs0qg9O-hGnfKxM3skSa-Jn2VJH7kX1A,,&typo=1Get hashmaliciousUnknownBrowse
                      • 69.164.46.128
                      CR-FEDEX_TN-775537409198_Doc.vbsGet hashmaliciousUnknownBrowse
                      • 69.164.46.0
                      copy_76499Kxls.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                      • 69.164.46.0
                      Purchase Inquiry.vbsGet hashmaliciousAgentTeslaBrowse
                      • 69.164.46.128
                      szamla_sorszam_8472.xlsmGet hashmaliciousUnknownBrowse
                      • 69.164.42.0
                      https://tom19-secondary.z15.web.core.windows.net/werrx01USAHTML/?bcda=+1-888-289-1419Get hashmaliciousTechSupportScamBrowse
                      • 69.164.42.0
                      part-0041.t-0009.t-msedge.netSecuriteInfo.com.Trojan.MSIL.zgRAT.Heur.21652.15881.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                      • 13.107.213.69
                      https://wmicrosouab-4ba8.udydzj.workers.dev/Get hashmaliciousHTMLPhisherBrowse
                      • 13.107.213.69
                      https://uqgekpc20qn1.azureedge.net/6466/Get hashmaliciousTechSupportScamBrowse
                      • 13.107.246.69
                      https://magnisteel.lk/4765445b-32c6-49b0-83e6-1d93765276ca.phpGet hashmaliciousHTMLPhisherBrowse
                      • 13.107.213.69
                      https://condoresorts.com/Get hashmaliciousUnknownBrowse
                      • 13.107.246.69
                      https://mota-engil.caf0sa.com/tiyamike.chikabadwa56078874fessdGl5YW1pa2UuY2hpa2FiYWR3YUBtb3RhLWVuZ2lsLnB097140964?5101245168264822=2215800694735574#dGl5YW1pa2UuY2hpa2FiYWR3YUBtb3RhLWVuZ2lsLnB0Get hashmaliciousUnknownBrowse
                      • 13.107.246.69
                      https://19apmic17.z13.web.core.windows.net/Get hashmaliciousTechSupportScamBrowse
                      • 13.107.246.69
                      FFE Order details - Cincy v41720.xlsxGet hashmaliciousUnknownBrowse
                      • 13.107.246.69
                      https://pub-32bf4e9c1a1344aa8c0925c562b60fd3.r2.dev/index2.htmlGet hashmaliciousHTMLPhisherBrowse
                      • 13.107.246.69
                      https://hello-world-still-tree-8187.stevenmoulder.workers.dev/Get hashmaliciousHTMLPhisherBrowse
                      • 13.107.213.69
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      MICROSOFT-CORP-MSN-AS-BLOCKUSOHkRFujs2m.exeGet hashmaliciousUnknownBrowse
                      • 104.208.16.94
                      SecuriteInfo.com.Trojan.MSIL.zgRAT.Heur.21652.15881.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                      • 13.107.213.69
                      https://wmicrosouab-4ba8.udydzj.workers.dev/Get hashmaliciousHTMLPhisherBrowse
                      • 13.107.213.69
                      https://uqgekpc20qn1.azureedge.net/6466/Get hashmaliciousTechSupportScamBrowse
                      • 13.107.213.69
                      https://netorg442802-my.sharepoint.com/:b:/g/personal/darek_daronto_com/EeXtnEaZ3XJBqGk13it6odUB-K9vuYAC7zp7SfyciZ3BpQ?e=nkKu2wGet hashmaliciousHtmlDropper, HTMLPhisherBrowse
                      • 13.89.178.26
                      https://netorg442802-my.sharepoint.com/:b:/g/personal/darek_daronto_com/EeXtnEaZ3XJBqGk13it6odUB-K9vuYAC7zp7SfyciZ3BpQ?e=nkKu2wGet hashmaliciousUnknownBrowse
                      • 13.107.136.10
                      https://condoresorts.com/Get hashmaliciousUnknownBrowse
                      • 13.107.246.69
                      https://u44058082.ct.sendgrid.net/ls/click?upn=u001.wjMLvmoK1OC9dTKy5UL4VbqcIJmZWkGKJypB0ZF6j6rXk8HVnxe0g2af-2BenroUoONz6EEWthgE-2Bi2vVRUosKTZRVQ5v63hCdxrdKCztVooIv51imK8tr-2Bb3beAsH6u-2FNluJlUKmd7nST-2B9m-2Bl2Rgv4y6uHLimO0TjhZzZ-2F-2BDlllJQne3tT99z6x4W12pJpddTL-2BoJ2-2Bdo6961pFN3dV2Rg-3D-3DeWGT_h-2FW4DSvZGhKY-2FmU3Rq-2F3L-2FXo2OZSHdaVvlpgAgHQWDXPYB9CNYi-2FcvonFCbsEhjt9RP-2BQa7dTwbMJOOaP3JRnMW6mQAitl6qAb1EkaAR-2BmnZDE6Bi3ooqtCrrMW-2F3TPNMK3AVi1YKIdTOZivmUJGaXdrtbqCykfnTTkN9KMRy80rdRqf6LWUCYWGeeaXb-2BD6jokMbr-2FaJKvKMHDNWAfHyhaE6QO9pw7souFUseKb40g-3DGet hashmaliciousHTMLPhisherBrowse
                      • 52.96.189.2
                      zlONcFaXkc.exeGet hashmaliciousPureLog Stealer, Xmrig, zgRATBrowse
                      • 23.101.168.44
                      KxgGGaiW3E.exeGet hashmaliciousQuasarBrowse
                      • 13.107.213.41
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      a0e9f5d64349fb13191bc781f81f42e1OHkRFujs2m.exeGet hashmaliciousUnknownBrowse
                      • 13.107.213.69
                      file.exeGet hashmaliciousRisePro StealerBrowse
                      • 13.107.213.69
                      z56NF-Faturada-23042024.msiGet hashmaliciousMicroClipBrowse
                      • 13.107.213.69
                      768.xla.xlsxGet hashmaliciousUnknownBrowse
                      • 13.107.213.69
                      Gam.xlsGet hashmaliciousUnknownBrowse
                      • 13.107.213.69
                      szamla_sorszam_8472.xlsmGet hashmaliciousUnknownBrowse
                      • 13.107.213.69
                      iPUk65i3yI.exeGet hashmaliciousLummaCBrowse
                      • 13.107.213.69
                      asbpKOngY0.exeGet hashmaliciousLummaCBrowse
                      • 13.107.213.69
                      VdwJB2cS5l.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                      • 13.107.213.69
                      https://www.epa.gov/climateleadership/simplified-ghg-emissions-calculatorGet hashmaliciousUnknownBrowse
                      • 13.107.213.69
                      No context
                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
                      File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 4770 bytes, 1 file, at 0x2c +A "disallowedcert.stl", number 1, 1 datablock, 0x1 compression
                      Category:dropped
                      Size (bytes):4770
                      Entropy (8bit):7.946747821604857
                      Encrypted:false
                      SSDEEP:96:9/nBu64pydcvOHRUfu0xK1bQYMRSRNoYmxYvk56sHMZhh4m:9/nBuP2cGxUfu6K1bpWJ6vfh4m
                      MD5:1BFE591A4FE3D91B03CDF26EAACD8F89
                      SHA1:719C37C320F518AC168C86723724891950911CEA
                      SHA-256:9CF94355051BF0F4A45724CA20D1CC02F76371B963AB7D1E38BD8997737B13D8
                      SHA-512:02F88DA4B610678C31664609BCFA9D61DB8D0B0617649981AF948F670F41A6207B4EC19FECCE7385A24E0C609CBBF3F2B79A8ACAF09A03C2C432CC4DCE75E9DB
                      Malicious:false
                      Reputation:moderate, very likely benign file
                      Preview:MSCF............,...................O.................2Wqh .disallowedcert.stl....^K...CK.wTS...:.w.K'.C0T.....Bh.{....C.).*.....Y@...(..).R."E..D^6........u....|f~3...o.3. ..SPK.k.o#...."{-.U..P........:..aPr.@.d......Dy.h.....)..:...!./\A.....A<I_<$...q.h..........'.....7....H...@`T..K.S.%...Y4..R.....`.....-....D...(..b..-c."...G.=.dx..S+..2.a.E....d.L...77J...c.[..@..iT&..^78..g....NW6.Ek..FY.F........cNt.O.*..R....*......D...... k........J.y...z.d...;.9_t...].@....yw..}.x....d.t..`f\K..;|.*h.X...4/.;.xT......q>.0...<...3...X..L$.&.,b.....\V....\......G..O..@..H3.....t..J..).x.?.{[..G>.7...<...^Q..z..Gw9P..d....i].n%K}.*z..2.Py...A..s...z..@...4..........4.....*Y.d..._Z.5.s..fl.C..#.K{9^.E...k..z.Ma..G.(.....5g. ...}.t.#4....$;.,....S@fs....k......u .^2.#_...I........;.......w..P...UCY...$;.S._|.x..dK...[i..q..^.l..A.?.....'N.. .L.l......m.*.+f#]............A.;.....Z..rIt....RW....Kr1e=8.=.z:Oi.z.d..r..C_......o...]j.N;.s....3@3.dgrv.
                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
                      File Type:data
                      Category:dropped
                      Size (bytes):302
                      Entropy (8bit):2.9971211104607227
                      Encrypted:false
                      SSDEEP:3:kkFklf/VXfllXlE/0hJlX16pFRltB+SliQlP8F+RlTRe86A+iRlERMta9b3+AL0o:kKvN+SkQlPlEGYRMY9z+s3Ql2DUe/
                      MD5:1C79DCB4AAE4AAD60D7EEEFE38C105F1
                      SHA1:32110F99C53DFD9D297C93FC697AE2640DA866EA
                      SHA-256:6227C33EC7405FECB176C2A0A3D720AF215D41483280E9F16AE807ED7FED70AA
                      SHA-512:78EBBF4D72F712E8077CBC4A42D46E64B06E1CC0D18618EEBFBFE6F04C08AEB7A3BE39E727AABDE392CFF717A7E45ECED23B11200D80D38B60A5E69B764DFC5C
                      Malicious:false
                      Reputation:low
                      Preview:p...... ........,......(....................................................... .........p.........................h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.d.i.s.a.l.l.o.w.e.d.c.e.r.t.s.t.l...c.a.b...
                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
                      File Type:Composite Document File V2 Document, Cannot read section info
                      Category:dropped
                      Size (bytes):1536
                      Entropy (8bit):1.1464700112623651
                      Encrypted:false
                      SSDEEP:3:YmsalTlLPltl2N81HRQjlORGt7RQ//W1XR9//3R9//3R9//:rl912N0xs+CFQXCB9Xh9Xh9X
                      MD5:72F5C05B7EA8DD6059BF59F50B22DF33
                      SHA1:D5AF52E129E15E3A34772806F6C5FBF132E7408E
                      SHA-256:1DC0C8D7304C177AD0E74D3D2F1002EB773F4B180685A7DF6BBE75CCC24B0164
                      SHA-512:6FF1E2E6B99BD0A4ED7CA8A9E943551BCD73A0BEFCACE6F1B1106E88595C0846C9BB76CA99A33266FFEC2440CF6A440090F803ABBF28B208A6C7BC6310BEB39E
                      Malicious:false
                      Reputation:high, very likely benign file
                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
                      File Type:data
                      Category:dropped
                      Size (bytes):512
                      Entropy (8bit):0.0
                      Encrypted:false
                      SSDEEP:3::
                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                      Malicious:false
                      Reputation:high, very likely benign file
                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
                      File Type:data
                      Category:dropped
                      Size (bytes):165
                      Entropy (8bit):1.4377382811115937
                      Encrypted:false
                      SSDEEP:3:BJbFFFjpQl2fV:/bFFFNQlS
                      MD5:037948E5945313159DC8146EB7973386
                      SHA1:4CEF8EE5AF61A21ADB398F6C296F48242158A1AA
                      SHA-256:E63CBDD61699DD98D41777B269B57916B6E67F51E457D71BF62E8BD56D1362E4
                      SHA-512:E2D94EEDAD02B0D8B478DA100F753608C6A3A49E37FB53E11815CEA7806DF045DF96D5C53E41A4AD9B772A63FDF180FFEB2F49078334AB3C267FAC26E3B21F01
                      Malicious:false
                      Reputation:low
                      Preview:.user ..a.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                      File type:Microsoft Excel 2007+
                      Entropy (8bit):7.676652549493434
                      TrID:
                      • Excel Microsoft Office Open XML Format document (40004/1) 83.33%
                      • ZIP compressed archive (8000/1) 16.67%
                      File name:Aztec UP&GO to we 14 April 2024.xlsx
                      File size:30'086 bytes
                      MD5:c76dd19102a9d3a23ab7f1c8310e67ce
                      SHA1:298059c88ad8b3e43a684399dd4a4046967a629e
                      SHA256:89e32b796c07a5558b9923db4cd2df7f63284c209a7898d97be92e92d458700b
                      SHA512:d47f50b0cd1d22d9f1ea31a1c864e394ff696e5e56f8a2d94bc0d7ba2911511d58ac249779ed08424c09a951ba2f43fa5bee4fd64d1183601d1f9c1b61bb2b46
                      SSDEEP:768:DOEl2PuyDqb6f0ONuFfxFrAqJlAM6ASBrNUngXhk:DOEUDhcTFfxeGl6AS0ngXy
                      TLSH:83D2C06AE2A5A018F3EAAE3DD14456F055843113FE427A193448B94E73836F733ADDDC
                      File Content Preview:PK..........!..[k.............[Content_Types].xml ...(.........................................................................................................................................................................................................
                      Icon Hash:35e58a8c0c8a85b9
                      Document Type:OpenXML
                      Number of OLE Files:1
                      Has Summary Info:
                      Application Name:
                      Encrypted Document:False
                      Contains Word Document Stream:False
                      Contains Workbook/Book Stream:True
                      Contains PowerPoint Document Stream:False
                      Contains Visio Document Stream:False
                      Contains ObjectPool Stream:False
                      Flash Objects Count:0
                      Contains VBA Macros:False
                      TimestampSource PortDest PortSource IPDest IP
                      Apr 24, 2024 03:03:22.225084066 CEST49733443192.168.2.1213.107.213.69
                      Apr 24, 2024 03:03:22.225126028 CEST4434973313.107.213.69192.168.2.12
                      Apr 24, 2024 03:03:22.225188971 CEST49733443192.168.2.1213.107.213.69
                      Apr 24, 2024 03:03:22.225331068 CEST49732443192.168.2.1213.107.213.69
                      Apr 24, 2024 03:03:22.225363970 CEST4434973213.107.213.69192.168.2.12
                      Apr 24, 2024 03:03:22.225495100 CEST49732443192.168.2.1213.107.213.69
                      Apr 24, 2024 03:03:22.225771904 CEST49734443192.168.2.1213.107.213.69
                      Apr 24, 2024 03:03:22.225795984 CEST4434973413.107.213.69192.168.2.12
                      Apr 24, 2024 03:03:22.225980997 CEST49734443192.168.2.1213.107.213.69
                      Apr 24, 2024 03:03:22.226562977 CEST49733443192.168.2.1213.107.213.69
                      Apr 24, 2024 03:03:22.226577997 CEST4434973313.107.213.69192.168.2.12
                      Apr 24, 2024 03:03:22.227902889 CEST49734443192.168.2.1213.107.213.69
                      Apr 24, 2024 03:03:22.227921963 CEST4434973413.107.213.69192.168.2.12
                      Apr 24, 2024 03:03:22.229495049 CEST49732443192.168.2.1213.107.213.69
                      Apr 24, 2024 03:03:22.229537964 CEST4434973213.107.213.69192.168.2.12
                      Apr 24, 2024 03:03:22.716721058 CEST4434973413.107.213.69192.168.2.12
                      Apr 24, 2024 03:03:22.716785908 CEST49734443192.168.2.1213.107.213.69
                      Apr 24, 2024 03:03:22.716799021 CEST4434973313.107.213.69192.168.2.12
                      Apr 24, 2024 03:03:22.716859102 CEST49733443192.168.2.1213.107.213.69
                      Apr 24, 2024 03:03:22.717809916 CEST4434973213.107.213.69192.168.2.12
                      Apr 24, 2024 03:03:22.717869997 CEST49732443192.168.2.1213.107.213.69
                      Apr 24, 2024 03:03:22.719147921 CEST49733443192.168.2.1213.107.213.69
                      Apr 24, 2024 03:03:22.719158888 CEST4434973313.107.213.69192.168.2.12
                      Apr 24, 2024 03:03:22.719350100 CEST49734443192.168.2.1213.107.213.69
                      Apr 24, 2024 03:03:22.719362020 CEST4434973413.107.213.69192.168.2.12
                      Apr 24, 2024 03:03:22.719436884 CEST4434973313.107.213.69192.168.2.12
                      Apr 24, 2024 03:03:22.719598055 CEST4434973413.107.213.69192.168.2.12
                      Apr 24, 2024 03:03:22.720362902 CEST49732443192.168.2.1213.107.213.69
                      Apr 24, 2024 03:03:22.720380068 CEST4434973213.107.213.69192.168.2.12
                      Apr 24, 2024 03:03:22.720671892 CEST4434973213.107.213.69192.168.2.12
                      Apr 24, 2024 03:03:22.721086025 CEST49734443192.168.2.1213.107.213.69
                      Apr 24, 2024 03:03:22.721643925 CEST49733443192.168.2.1213.107.213.69
                      Apr 24, 2024 03:03:22.722126007 CEST49732443192.168.2.1213.107.213.69
                      Apr 24, 2024 03:03:22.764113903 CEST4434973413.107.213.69192.168.2.12
                      Apr 24, 2024 03:03:22.764115095 CEST4434973213.107.213.69192.168.2.12
                      Apr 24, 2024 03:03:22.764117956 CEST4434973313.107.213.69192.168.2.12
                      Apr 24, 2024 03:03:23.069257975 CEST4434973213.107.213.69192.168.2.12
                      Apr 24, 2024 03:03:23.069313049 CEST4434973213.107.213.69192.168.2.12
                      Apr 24, 2024 03:03:23.069417953 CEST49732443192.168.2.1213.107.213.69
                      Apr 24, 2024 03:03:23.069434881 CEST4434973213.107.213.69192.168.2.12
                      Apr 24, 2024 03:03:23.069454908 CEST4434973213.107.213.69192.168.2.12
                      Apr 24, 2024 03:03:23.069585085 CEST49732443192.168.2.1213.107.213.69
                      Apr 24, 2024 03:03:23.070171118 CEST49732443192.168.2.1213.107.213.69
                      Apr 24, 2024 03:03:23.070189953 CEST4434973213.107.213.69192.168.2.12
                      Apr 24, 2024 03:03:23.070249081 CEST49732443192.168.2.1213.107.213.69
                      Apr 24, 2024 03:03:23.070256948 CEST4434973213.107.213.69192.168.2.12
                      Apr 24, 2024 03:03:23.099823952 CEST4434973413.107.213.69192.168.2.12
                      Apr 24, 2024 03:03:23.100033045 CEST4434973413.107.213.69192.168.2.12
                      Apr 24, 2024 03:03:23.100229025 CEST49734443192.168.2.1213.107.213.69
                      Apr 24, 2024 03:03:23.100287914 CEST49734443192.168.2.1213.107.213.69
                      Apr 24, 2024 03:03:23.100310087 CEST4434973413.107.213.69192.168.2.12
                      Apr 24, 2024 03:03:23.100320101 CEST49734443192.168.2.1213.107.213.69
                      Apr 24, 2024 03:03:23.100326061 CEST4434973413.107.213.69192.168.2.12
                      Apr 24, 2024 03:03:23.237279892 CEST4434973313.107.213.69192.168.2.12
                      Apr 24, 2024 03:03:23.237310886 CEST4434973313.107.213.69192.168.2.12
                      Apr 24, 2024 03:03:23.237334013 CEST4434973313.107.213.69192.168.2.12
                      Apr 24, 2024 03:03:23.237387896 CEST4434973313.107.213.69192.168.2.12
                      Apr 24, 2024 03:03:23.237416029 CEST49733443192.168.2.1213.107.213.69
                      Apr 24, 2024 03:03:23.237466097 CEST49733443192.168.2.1213.107.213.69
                      Apr 24, 2024 03:03:23.237896919 CEST49733443192.168.2.1213.107.213.69
                      Apr 24, 2024 03:03:23.237896919 CEST49733443192.168.2.1213.107.213.69
                      Apr 24, 2024 03:03:23.237920046 CEST4434973313.107.213.69192.168.2.12
                      Apr 24, 2024 03:03:23.237935066 CEST4434973313.107.213.69192.168.2.12
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Apr 24, 2024 03:02:19.503891945 CEST1.1.1.1192.168.2.120x6356No error (0)windowsupdatebg.s.llnwi.net68.142.107.4A (IP address)IN (0x0001)false
                      Apr 24, 2024 03:03:22.209609985 CEST1.1.1.1192.168.2.120x6aabNo error (0)shed.dual-low.part-0041.t-0009.t-msedge.netpart-0041.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                      Apr 24, 2024 03:03:22.209609985 CEST1.1.1.1192.168.2.120x6aabNo error (0)part-0041.t-0009.t-msedge.net13.107.213.69A (IP address)IN (0x0001)false
                      Apr 24, 2024 03:03:22.209609985 CEST1.1.1.1192.168.2.120x6aabNo error (0)part-0041.t-0009.t-msedge.net13.107.246.69A (IP address)IN (0x0001)false
                      • otelrules.azureedge.net
                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      0192.168.2.124973413.107.213.694436456C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
                      TimestampBytes transferredDirectionData
                      2024-04-24 01:03:22 UTC207OUTGET /rules/rule490016v3s19.xml HTTP/1.1
                      Connection: Keep-Alive
                      Accept-Encoding: gzip
                      User-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.16827; Pro)
                      Host: otelrules.azureedge.net
                      2024-04-24 01:03:23 UTC471INHTTP/1.1 200 OK
                      Date: Wed, 24 Apr 2024 01:03:23 GMT
                      Content-Type: text/xml
                      Content-Length: 777
                      Connection: close
                      Cache-Control: public, max-age=604800, immutable
                      Last-Modified: Tue, 09 Apr 2024 00:28:04 GMT
                      ETag: "0x8DC582BEC2AAB32"
                      x-ms-request-id: 99c3aa25-c01e-0097-1be3-95e381000000
                      x-ms-version: 2018-03-28
                      x-azure-ref: 20240424T010322Z-168bb8d798b968vptsayvcbkpg000000058g000000007ytu
                      x-fd-int-roxy-purgeid: 0
                      X-Cache: TCP_MISS
                      Accept-Ranges: bytes
                      2024-04-24 01:03:23 UTC777INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 34 39 30 30 31 36 22 20 56 3d 22 33 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 46 65 65 64 62 61 63 6b 2e 53 75 72 76 65 79 2e 46 6c 6f 6f 64 67 61 74 65 43 6c 69 65 6e 74 2e 52 6f 61 6d 69 6e 67 53 75 63 63 65 73 73 66 75 6c 52 65 61 64 57 72 69 74 65 22 20 41 54 54 3d 22 64 37 39 65 38 32 34 33 38 36 63 34 34 34 31 63 62 38 63 31 64 34 61 65 31 35 36 39 30 35 32 36 2d 62 64 34 34 33 33 30 39 2d 35 34 39 34 2d 34 34 34 61 2d 61 62 61 39 2d 30 61 66 39 65 65 66 39 39 66 38 34 2d 37 33 36 30 22 20 54 3d 22 55 70 6c 6f 61 64 2d 4d 65 64 69 75 6d 22 20 44 4c 3d 22 4e 22 20 44 43 61 3d 22 50
                      Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="490016" V="3" DC="SM" EN="Office.Feedback.Survey.FloodgateClient.RoamingSuccessfulReadWrite" ATT="d79e824386c4441cb8c1d4ae15690526-bd443309-5494-444a-aba9-0af9eef99f84-7360" T="Upload-Medium" DL="N" DCa="P


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      1192.168.2.124973313.107.213.694436456C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
                      TimestampBytes transferredDirectionData
                      2024-04-24 01:03:22 UTC206OUTGET /rules/rule63067v4s19.xml HTTP/1.1
                      Connection: Keep-Alive
                      Accept-Encoding: gzip
                      User-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.16827; Pro)
                      Host: otelrules.azureedge.net
                      2024-04-24 01:03:23 UTC564INHTTP/1.1 200 OK
                      Date: Wed, 24 Apr 2024 01:03:23 GMT
                      Content-Type: text/xml
                      Content-Length: 2871
                      Connection: close
                      Vary: Accept-Encoding
                      Vary: Accept-Encoding
                      Vary: Accept-Encoding
                      Vary: Accept-Encoding
                      Cache-Control: public, max-age=604800, immutable
                      Last-Modified: Tue, 09 Apr 2024 00:28:05 GMT
                      ETag: "0x8DC582BEC5E84E0"
                      x-ms-request-id: 6a087dd7-c01e-00ab-7ee3-953689000000
                      x-ms-version: 2018-03-28
                      x-azure-ref: 20240424T010322Z-168bb8d798bxxkq2crnw691fcg000000050g00000000854w
                      x-fd-int-roxy-purgeid: 0
                      X-Cache: TCP_MISS
                      Accept-Ranges: bytes
                      2024-04-24 01:03:23 UTC2871INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 36 33 30 36 37 22 20 56 3d 22 34 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 49 64 65 6e 74 69 74 79 2e 53 73 70 69 50 72 6f 6d 70 74 57 69 6e 33 32 22 20 41 54 54 3d 22 35 63 36 35 62 62 63 34 65 64 62 66 34 38 30 64 39 36 33 37 61 63 65 30 34 64 36 32 62 64 39 38 2d 31 32 38 34 34 38 39 33 2d 38 61 62 39 2d 34 64 64 65 2d 62 38 35 30 2d 35 36 31 32 63 62 31 32 65 30 66 32 2d 37 38 32 32 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 4c 3d 22 41 22 20 44 43 61 3d 22 44 43 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20
                      Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="63067" V="4" DC="SM" EN="Office.Identity.SspiPromptWin32" ATT="5c65bbc4edbf480d9637ace04d62bd98-12844893-8ab9-4dde-b850-5612cb12e0f2-7822" SP="CriticuserinessImpact" DL="A" DCa="DC" xmlns=""> <S>


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      2192.168.2.124973213.107.213.694436456C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
                      TimestampBytes transferredDirectionData
                      2024-04-24 01:03:22 UTC208OUTGET /rules/rule170012v10s19.xml HTTP/1.1
                      Connection: Keep-Alive
                      Accept-Encoding: gzip
                      User-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.16827; Pro)
                      Host: otelrules.azureedge.net
                      2024-04-24 01:03:23 UTC584INHTTP/1.1 200 OK
                      Date: Wed, 24 Apr 2024 01:03:22 GMT
                      Content-Type: text/xml
                      Content-Length: 1523
                      Connection: close
                      Vary: Accept-Encoding
                      Vary: Accept-Encoding
                      Vary: Accept-Encoding
                      Vary: Accept-Encoding
                      Cache-Control: public, max-age=604800, immutable
                      Last-Modified: Tue, 09 Apr 2024 00:27:33 GMT
                      ETag: "0x8DC582BD969CD29"
                      x-ms-request-id: e8721880-f01e-00a0-2ebc-95139e000000
                      x-ms-version: 2018-03-28
                      x-azure-ref: 20240424T010322Z-168bb8d798b8nl86frq151a46000000004v000000001bh16
                      x-fd-int-roxy-purgeid: 0
                      X-Cache-Info: L1_T2
                      X-Cache: TCP_HIT
                      Accept-Ranges: bytes
                      2024-04-24 01:03:23 UTC1523INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 37 30 30 31 32 22 20 56 3d 22 31 30 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 47 72 61 70 68 69 63 73 2e 47 56 69 7a 49 6e 6b 53 74 72 6f 6b 65 22 20 41 54 54 3d 22 63 66 63 66 64 62 39 31 63 36 38 63 34 33 32 39 62 62 38 62 37 63 62 37 62 61 62 62 33 63 66 37 2d 65 30 38 32 63 32 66 32 2d 65 66 31 64 2d 34 32 37 61 2d 61 63 34 64 2d 62 30 62 37 30 30 61 66 65 37 61 37 2d 37 36 35 35 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 42 75 73 69 6e 65 73 73 49 6d 70 61 63 74 22 20 44 43 61 3d 22 50 53 55 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 54 53 20 54
                      Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="170012" V="10" DC="SM" EN="Office.Graphics.GVizInkStroke" ATT="cfcfdb91c68c4329bb8b7cb7babb3cf7-e082c2f2-ef1d-427a-ac4d-b0b700afe7a7-7655" SP="CriticuserinessImpact" DCa="PSU" xmlns=""> <S> <UTS T


                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:03:02:12
                      Start date:24/04/2024
                      Path:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
                      Wow64 process (32bit):true
                      Commandline:"C:\Program Files (x86)\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
                      Imagebase:0xe40000
                      File size:53'161'064 bytes
                      MD5 hash:4A871771235598812032C822E6F68F19
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:false

                      Target ID:7
                      Start time:03:03:16
                      Start date:24/04/2024
                      Path:C:\Windows\splwow64.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\splwow64.exe 12288
                      Imagebase:0x7ff7ee5f0000
                      File size:163'840 bytes
                      MD5 hash:77DE7761B037061C7C112FD3C5B91E73
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:false

                      No disassembly