Windows
Analysis Report
original (37).eml
Overview
General Information
Detection
Score: | 48 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64_ra
OUTLOOK.EXE (PID: 6368 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \Root\Offi ce16\OUTLO OK.EXE" /e ml "C:\Use rs\user\De sktop\orig inal (37). eml" MD5: 91A5292942864110ED734005B7E005C0) ai.exe (PID: 6932 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \root\vfs\ ProgramFil esCommonX6 4\Microsof t Shared\O ffice16\ai .exe" "923 4D241-658A -4F1A-893D -2B99936CB 692" "B03A 8BDE-5D96- 439A-A9A2- 223F00FA92 C7" "6368" "C:\Progr am Files ( x86)\Micro soft Offic e\Root\Off ice16\OUTL OOK.EXE" " WordCombin edFloatieL reOnline.o nnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD) OUTLOOK.EXE (PID: 6788 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \root\Offi ce16\OUTLO OK.EXE" /e ml "C:\Use rs\user\Ap pData\Loca l\Microsof t\Windows\ INetCache\ Content.Ou tlook\ZVHF 1XTO\phish _alert_sp2 _2.0.0.0.e ml" MD5: 91A5292942864110ED734005B7E005C0) chrome.exe (PID: 5488 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t C:\Users \user\AppD ata\Local\ Microsoft\ Windows\IN etCache\Co ntent.Outl ook\ZVHF1X TO\Play_VM -NowVWAV.h tml MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) chrome.exe (PID: 396 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2060 --fi eld-trial- handle=198 4,i,113313 4302327419 8112,16441 5027765548 74557,2621 44 --disab le-feature s=Optimiza tionGuideM odelDownlo ading,Opti mizationHi nts,Optimi zationHint sFetching, Optimizati onTargetPr ediction / prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: frack113: |
Click to jump to signature section
Phishing |
---|
Source: | DOM page: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTPS traffic detected: |
Source: | TCP traffic: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | File created: |
Source: | File created: |
Source: | File read: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: |
Source: | Key value queried: |
Source: | Window found: |
Source: | Window detected: |
Source: | Key opened: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: |
Source: | Process information queried: |
Source: | Queries volume information: |
Source: | Key value queried: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 1 Process Injection | 1 Masquerading | OS Credential Dumping | 1 Process Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 Registry Run Keys / Startup Folder | 1 DLL Side-Loading | 1 Process Injection | LSASS Memory | 1 File and Directory Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 Registry Run Keys / Startup Folder | 1 DLL Side-Loading | Security Account Manager | 12 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 2 Application Layer Protocol | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse | ||
4% | Virustotal | Browse | ||
0% | Virustotal | Browse | ||
1% | Virustotal | Browse | ||
0% | Virustotal | Browse | ||
0% | Virustotal | Browse | ||
3% | Virustotal | Browse | ||
0% | Virustotal | Browse | ||
0% | Virustotal | Browse | ||
0% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
ksvbotech.store | 66.29.137.93 | true | false | unknown | |
bg.microsoft.map.fastly.net | 199.232.210.172 | true | false |
| unknown |
d26p066pn2w0s0.cloudfront.net | 13.32.27.77 | true | false |
| unknown |
s-part-0044.t-0009.fb-t-msedge.net | 13.107.253.72 | true | false |
| unknown |
s-part-0029.t-0009.fb-t-msedge.net | 13.107.253.57 | true | false |
| unknown |
code.jquery.com | 151.101.194.137 | true | false |
| unknown |
sopbtech.store | 199.188.200.183 | true | false |
| unknown |
server.povbtech.store | 185.174.100.20 | true | false |
| unknown |
www.google.com | 142.250.184.196 | true | false |
| unknown |
api.ipify.org | 104.26.13.205 | true | false |
| unknown |
_8020._https.server.povbtech.store | unknown | unknown | false | unknown | |
logo.clearbit.com | unknown | unknown | true |
| unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
52.113.194.132 | unknown | United States | 8068 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
142.250.184.196 | www.google.com | United States | 15169 | GOOGLEUS | false | |
66.29.137.93 | ksvbotech.store | United States | 19538 | ADVANTAGECOMUS | false | |
216.58.212.138 | unknown | United States | 15169 | GOOGLEUS | false | |
13.32.27.77 | d26p066pn2w0s0.cloudfront.net | United States | 7018 | ATT-INTERNET4US | false | |
52.109.68.130 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
142.250.186.174 | unknown | United States | 15169 | GOOGLEUS | false | |
185.174.100.20 | server.povbtech.store | Ukraine | 8100 | ASN-QUADRANET-GLOBALUS | false | |
20.42.72.131 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
13.107.253.57 | s-part-0029.t-0009.fb-t-msedge.net | United States | 8068 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
142.250.181.234 | unknown | United States | 15169 | GOOGLEUS | false | |
199.188.200.183 | sopbtech.store | United States | 22612 | NAMECHEAP-NETUS | false | |
151.101.130.137 | unknown | United States | 54113 | FASTLYUS | false | |
74.125.206.84 | unknown | United States | 15169 | GOOGLEUS | false | |
13.107.253.72 | s-part-0044.t-0009.fb-t-msedge.net | United States | 8068 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
2.19.126.151 | unknown | European Union | 16625 | AKAMAI-ASUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
52.109.28.47 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
142.250.186.131 | unknown | United States | 15169 | GOOGLEUS | false | |
151.101.194.137 | code.jquery.com | United States | 54113 | FASTLYUS | false | |
104.26.13.205 | api.ipify.org | United States | 13335 | CLOUDFLARENETUS | false |
IP |
---|
192.168.2.16 |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1513770 |
Start date and time: | 2024-09-19 11:35:56 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 18 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Sample name: | original (37).eml |
Detection: | MAL |
Classification: | mal48.phis.winEML@20/33@24/85 |
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 52.113.194.132, 52.109.28.47, 2.19.126.151, 2.19.126.160
- Excluded domains from analysis (whitelisted): ecs.office.com, omex.cdn.office.net, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, prod.roaming1.live.com.akadns.net, s-0005-office.config.skype.com, eur.roaming1.live.com.akadns.net, osiprod-uks-buff-azsc-000.uksouth.cloudapp.azure.com, ecs-office.s-0005.s-msedge.net, roaming.officeapps.live.com, uks-azsc-000.roaming.officeapps.live.com, s-0005.s-msedge.net, ecs.office.trafficmanager.net, omex.cdn.office.net.akamaized.net, wu-b-net.trafficmanager.net, a1864.dscd.akamai.net
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtQueryAttributesFile calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtSetValueKey calls found.
Input | Output |
---|---|
URL: Email Model: jbxai | { "brand":["Globi"], "contains_trigger_text":false, "prominent_button_name":"unknown", "text_input_field_labels":["unknown"], "pdf_icon_visible":false, "has_visible_captcha":false, "has_urgent_text":false, "has_visible_qrcode":false} |
URL: blob:https://ksvbotech.store/87a84b40-d177-4cc6-9e01-21c142cae0ba Model: jbxai | { "brand":["Microsoft"], "contains_trigger_text":false, "prominent_button_name":"Sign In", "text_input_field_labels":["Enter Password", "Forgot Password?"], "pdf_icon_visible":false, "has_visible_captcha":false, "has_urgent_text":false, "has_visible_qrcode":false} |
URL: blob:https://ksvbotech.store/87a84b40-d177-4cc6-9e01-21c142cae0ba Model: jbxai | { "phishing_score":8, "brands":["Microsoft"], "sub_domain":"ksvbotech", "legit_domain":"microsoft.com", "partial_domain_match":true, "brand_matches_associated_domain":false, "reasons":"The domain name 'ksvbotech.store' does not match the brand name or any of Microsoft's known domains, and the top level domain'store' is not commonly associated with Microsoft. This discrepancy raises concerns about the legitimacy of the webpage.", "brand_matches":[false], "url_match":false} |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 231348 |
Entropy (8bit): | 4.395850586682651 |
Encrypted: | false |
SSDEEP: | |
MD5: | F3863188EFE304BD8DFAD46AD3D23A6A |
SHA1: | A5008D2678425FACB9A6619D0F0003AD8E65772E |
SHA-256: | 364B342D16911C04ED1B1781D27B39F4AA1D5508525353B41871291673D7B496 |
SHA-512: | E4D35D8AEA33277E654BB202366A779DB87A0C279C27863C6B7E60BD61E79FB2017010EF7D053A885B204658D5A2D4DC623DC29D4A62394D5F2068B5F4E5DC46 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 4096 |
Entropy (8bit): | 0.09304735440217722 |
Encrypted: | false |
SSDEEP: | |
MD5: | D0DE7DB24F7B0C0FE636B34E253F1562 |
SHA1: | 6EF2957FDEDDC3EB84974F136C22E39553287B80 |
SHA-256: | B6DC74E4A39FFA38ED8C93D58AADEB7E7A0674DAC1152AF413E9DA7313ADE6ED |
SHA-512: | 42D00510CD9771CE63D44991EA10C10C8FBCF69DF08819D60B7F8E7B0F9B1D385AE26912C847A024D1D127EC098904784147218869AE8D2050BCE9B306DB2DDE |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 4616 |
Entropy (8bit): | 0.13298756720797703 |
Encrypted: | false |
SSDEEP: | |
MD5: | 9FAEE8C40152D74D82A4C4FD08E6D056 |
SHA1: | 5F7A717E6A872348871DE70EA2D8347770EBFE41 |
SHA-256: | F943000E64A9ED15AEDB12AF08AB4C0EC6E4D403D98DFABB13849A4D20CFCCB8 |
SHA-512: | 0DBC6DF9A00A8A5F17457C90EEA6761F85DC07F888E9B8D55504760EFF02E3598EDD6D0803AD11764B23AEBDEAE54D27ADB4F28201C0832B0F826DA6F4FDCCA0 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 32768 |
Entropy (8bit): | 0.04442436008866249 |
Encrypted: | false |
SSDEEP: | |
MD5: | B1B4E359CEA5C2FAFFB746CD26B2856A |
SHA1: | FCB38853DD0AD1B29A3684B594A9BEC45435B149 |
SHA-256: | E4BA74AA7F033C400A3040C9E9BF75EA517D69B28C5F06C848F8CF8886D4BFC6 |
SHA-512: | D1694CA782F6702415BFB5CD65646B04AB7FEC46A8157ED7E3ECD656D1C1E04605BD8F29F6A790723BD238357D8076C0284234466E2F623853E5EE93713F01A7 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | modified |
Size (bytes): | 45352 |
Entropy (8bit): | 0.3943716126757746 |
Encrypted: | false |
SSDEEP: | |
MD5: | 4F1F90BEF169B4BE9D416BF025A4E658 |
SHA1: | 5456A8596BDF193EB2B80EA4A0DC3A1EB92BFD13 |
SHA-256: | 5B5076A7CDAB98B7D2D5192FCEEEADE490AEAE166460EAD1E9BD46FD4D4163D4 |
SHA-512: | 4D9EF1818FBFDED1CD501A586CFF57A441560B55D7A465354401016BFE12A68062D36D25E16585C06D0D462A880259D92A731FA934D940B7ACBF2A946B6D072C |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\ZVHF1XTO\Play_VM-NowVWAV (002).html
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 2459 |
Entropy (8bit): | 5.511359010278195 |
Encrypted: | false |
SSDEEP: | |
MD5: | 1AF87B60820D2A9FCF37480B1AC9C66F |
SHA1: | 627CD793B5D093CA6D97B03186390031E8214798 |
SHA-256: | EF5FE4103F48BF735FCF573E80717699C25E45E8AFB570685CF145AEE33410B6 |
SHA-512: | F14BA5F8A566085322C772F91C95FEDD5D19149BCF1484D81C86EC1D6C545B0242B74BC6D317576D959AC52E3D56C71B54EC13898248C21794F9B4F0C65C88A9 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\ZVHF1XTO\Play_VM-NowVWAV (002).html:Zone.Identifier (copy)
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 0 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | |
MD5: | 1AF87B60820D2A9FCF37480B1AC9C66F |
SHA1: | 627CD793B5D093CA6D97B03186390031E8214798 |
SHA-256: | EF5FE4103F48BF735FCF573E80717699C25E45E8AFB570685CF145AEE33410B6 |
SHA-512: | F14BA5F8A566085322C772F91C95FEDD5D19149BCF1484D81C86EC1D6C545B0242B74BC6D317576D959AC52E3D56C71B54EC13898248C21794F9B4F0C65C88A9 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\ZVHF1XTO\phish_alert_sp2_2.0.0.0 (002).eml:Zone.Identifier
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | modified |
Size (bytes): | 26 |
Entropy (8bit): | 3.95006375643621 |
Encrypted: | false |
SSDEEP: | |
MD5: | FBCCF14D504B7B2DBCB5A5BDA75BD93B |
SHA1: | D59FC84CDD5217C6CF74785703655F78DA6B582B |
SHA-256: | EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913 |
SHA-512: | AA1D2B1EA3C9DE3CCADB319D4E3E3276A2F27DD1A5244FE72DE2B6F94083DDDC762480482C5C2E53F803CD9E3973DDEFC68966F974E124307B5043E654443B98 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\ZVHF1XTO\phish_alert_sp2_2.0.0.0.eml
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 30255 |
Entropy (8bit): | 6.089587595810953 |
Encrypted: | false |
SSDEEP: | |
MD5: | 7A32B97E3D458EC37679C7F38A04384D |
SHA1: | AEC9BE54C67B1457A00D1A95867E47863EE1B7A4 |
SHA-256: | DCC6B54CD23DBD5BE2C0C10CF31CEFCF1EB8882FEC554D51A8AD8B335EC0932B |
SHA-512: | CF21A2FA0DDF3F8B6A7F7740C5C36D17B6841FC0935C7F090F00FABCDD5024EBCDCA04577FD7D210D06473EA77AB4361572F77E7E0F3DCB9EE71CAFA823D2D75 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Temp\Diagnostics\OUTLOOK\App1726738586013473400_9590DA95-D182-41B4-AA20-77270379C5B9.log
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 20971520 |
Entropy (8bit): | 0.16156667915991862 |
Encrypted: | false |
SSDEEP: | |
MD5: | 667EC1E8436A52ADCDD6F2ED56CAA322 |
SHA1: | ED913375D71FDFCD64D8736B47466B215DFAA2FF |
SHA-256: | BFE45215178D6A92DF7A62C348E334B81709B8E0994CF140E0AB3B2D145D6F61 |
SHA-512: | 4E807BBE0E49FB11F82AB9BC24054A60CBCE81A5801CA1FC611A3DD9D6D673AA1A47EF132A59061CE0ACF9003495C84A832EFF3F07E8275DEA8D421077E37C5C |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Temp\Diagnostics\OUTLOOK\App1726738586014166600_9590DA95-D182-41B4-AA20-77270379C5B9.log
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 20971520 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | |
MD5: | 8F4E33F3DC3E414FF94E5FB6905CBA8C |
SHA1: | 9674344C90C2F0646F0B78026E127C9B86E3AD77 |
SHA-256: | CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC |
SHA-512: | 7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20240919T0536250808-6368.etl
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 122880 |
Entropy (8bit): | 4.524291097915957 |
Encrypted: | false |
SSDEEP: | |
MD5: | F07D05E18D42F0BB09FA978CEA5DF622 |
SHA1: | 7291412A671D7AD927B0A554AA2BFE025D221954 |
SHA-256: | 9BB4928919884DF977DCCB26F9B11D3C9C72671F116E4B0AFACE46DC8B229BD6 |
SHA-512: | 32FF3184FA163DFF4906F0B2748688CD9C3D32C7C1B34AF6802297267797A02FBC3D5D22AB398873443E75F5617D4B18D6BA471F50AB48722F017632A4B823EE |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20240919T0536410136-6788.etl
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 16384 |
Entropy (8bit): | 3.597916786515241 |
Encrypted: | false |
SSDEEP: | |
MD5: | FEA7B64B4745C33A6258F1E1119D0702 |
SHA1: | 5F3855A566E3458D84BE5D1C9F30EC8F76541930 |
SHA-256: | 78D4B409CDD80C8FE1FAE16096B56AC920A172DAE2F7266616BEE1C2000C618B |
SHA-512: | E01F516DA778DB03D9AD62E45D0A55D62681DF98EA2099440FD13770F4084D6408EC8A8C320223236A5A155CEB836B262C3799FFA44898AE67AB8F97FC42FA86 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 30 |
Entropy (8bit): | 1.2389205950315936 |
Encrypted: | false |
SSDEEP: | |
MD5: | 5E20510C5868A6BE58830457AE7FE3D5 |
SHA1: | 026C954DD94F1FDD78B68AE9F0E70E0CA01530B4 |
SHA-256: | D6CB2D3765173A40BD45C6DA9E7849AFC6ADEDCF2BCF03C773459164C5D5F42E |
SHA-512: | F71258D04E7F611DCBF1FEC35E9B6B1CFFF4F5969D8E427A8A14C11286675472DBA0FA8C53A7B1E9519C18DB55225E2B61767DFD6E2DF29C3AADD9C738C18F72 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 16384 |
Entropy (8bit): | 0.6691625330788578 |
Encrypted: | false |
SSDEEP: | |
MD5: | C9EFA865BF1B3CF89F099541559ED3C8 |
SHA1: | 4911609661691F2C59B6C0E377D9B0DFB9DB5139 |
SHA-256: | 81568452E8A90C96DC00C976341215772967037B4EFE88747C592A74EF839526 |
SHA-512: | 8627A5CA8279C32256A9D517EF99A4CB56D34D76D025DBFA6CE592A905B3506A32337AC86D72F392247719A3BE12B0F1435E01A668340D43DB1AAD238011788F |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2673 |
Entropy (8bit): | 3.986975347354126 |
Encrypted: | false |
SSDEEP: | |
MD5: | 3AB96404E61AE4D07A347CB3EFA14BDD |
SHA1: | 3516A017FCA0E4618DC2C2807353F1409328CE50 |
SHA-256: | 289B547656CA08622A173A9B4A796AA176CFCE25732D197EAA2BE401A6A25006 |
SHA-512: | DAFA6295169187210A88A23AA0AD3A1C1D4DAB7E116CCB7E2D97D7996CA58603431D01A44B45C1562B3B22AEAA057413AA64A1452A4B8AA08440D30CC13A7EB0 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2675 |
Entropy (8bit): | 4.002511732556609 |
Encrypted: | false |
SSDEEP: | |
MD5: | D464D0A4BD02924CE1CB05FA6B449C38 |
SHA1: | 8AB76B5D7A110FE718BC3D63B753DB63712579AB |
SHA-256: | 9CB483F60F1A30BBCC12012C1CD48020036A5B5B1B4E987A6A7649AB70A635F9 |
SHA-512: | 6AC49333B537B49B416761AEA15612250B52F213CFA90ADC0EDD92CF91A237394773A716E2A8682C5C7268315ECE58C4B67D38CAF995BFF83ADA07C2F73FAF9F |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2689 |
Entropy (8bit): | 4.007333538132257 |
Encrypted: | false |
SSDEEP: | |
MD5: | E8319CFAA68E1BDCC838B5041C01CE60 |
SHA1: | BA1A30686C77E52CF6D95771260C4391224E928A |
SHA-256: | 880A5F1F9F1E1B52941249A294B704D6B090F417F55ACC39CB0F8B0F3FD579F3 |
SHA-512: | 0A8C9015B17AE6AC2F1811D04F5236203A6156659728861C2D1B64D4449D7C28E43EA6AB80C03C684B39383F26615076BAC87BBC0DE59B451C8896518E40DE6C |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 4.001784084079385 |
Encrypted: | false |
SSDEEP: | |
MD5: | 4D48B1F79274B98C86AB36281229B366 |
SHA1: | 2E59E37CC110033EBC7C75EFF9320E7BFB13E6D9 |
SHA-256: | AF8E620E368EA011FFBB236614CBFB164E1AB0E51E5ED3EB4ECF0B15A4F2653C |
SHA-512: | 827068C31DBA335641C99D8F480790F2331E91743D080C3CF66E23438A9C0E9F3D5BA18D46AA637EF172F7B41FD439032BC0566F9547B461161834C45A3BC1BC |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.991186274283029 |
Encrypted: | false |
SSDEEP: | |
MD5: | AD4A8CC99C12E9BD95FF8D69F8C558FA |
SHA1: | 07684644FF731CA616E7581677FB176123794EB6 |
SHA-256: | AE7729943B1784769A5566EC8EA107E6B464D2DF900593D65938B4C1D42F1F90 |
SHA-512: | E4EF33F8FE665CC5E7EF49D0EC1B5B3BAD3A5FE94E9F632AEC4A7AF5ABF3F3A4BAA0BBCA727E15650C6A3FDB262F5E1DC53ACBAA5073BD3C4F1CD9053E8B3B63 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.9964833119593073 |
Encrypted: | false |
SSDEEP: | |
MD5: | CEFB6C01D3522E216287A7AE815E3D13 |
SHA1: | 256EB752C66E23D5132121675262EEDD9AF60364 |
SHA-256: | 8EDDCBF25FFFBAD61B65CC66202BDEE97D92B7482A0BA20DCD1DAB58D8890521 |
SHA-512: | 1F763DD3D1ED00EADD89323A2D32C15E40B46711259FD0D04741A327E2E9A525EC96F41F95424784FAB4BB3E1401611466A2ECAA65E71291590CC20B3AB471E5 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 271360 |
Entropy (8bit): | 4.126423415168088 |
Encrypted: | false |
SSDEEP: | |
MD5: | 21D4F0DE55E7EFBA75CBA13896379558 |
SHA1: | 5212C4C2BCAC40ED629D57FD7E89D28643F58E27 |
SHA-256: | 88DA65C9B84830CA880B7193E4B171493C63DFC20CBCE16A1E01F74CBA945BB5 |
SHA-512: | 8B3F503ED25DEBC5F550B777B436E77973F060BECCA57F6DF0D4C0F841C0E9DC11974E58AC032A3CFDBD7237A26465745B6CCA92806661243F426D81BB3EFC39 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 262144 |
Entropy (8bit): | 3.986057485153415 |
Encrypted: | false |
SSDEEP: | |
MD5: | B6911A6DF6A52C1A4E1692D79E47F1AB |
SHA1: | DE803D225F8B9D21E63CC8FD936976925128AEC4 |
SHA-256: | E5E235D8C2DC853CFB7CAC285B665591AF271717242EB14C23470C7C88E47064 |
SHA-512: | 68A1437A689CE56504C3DC893AFDE5909349AB29953D5A5F0B24D88B4EBCA089A017A1448A0797E6600A6DE4523B9D239D4167E39316D8BD45B3673B19461953 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 59006 |
Entropy (8bit): | 4.8668087324631095 |
Encrypted: | false |
SSDEEP: | |
MD5: | A0E2B5673A02086C508B98283D3DA9AC |
SHA1: | BDA752205408484FB54346DA969E09218384588F |
SHA-256: | 753A9F4EF8C9200639BD543B9D2B72565A2E62AF3F5DCDC5DB8EA3A7E34C6698 |
SHA-512: | 780B582BBB2BA29C7AFC2268152A663E2744A3D2150555F478CA79AE11BBACCFDF1F7AE8F6100BF35EC17DA24130AFDD663DC64594A24A340C46ADC29F6ADAD8 |
Malicious: | false |
Reputation: | unknown |
URL: | https://ksvbotech.store/gesp/xls/0xa937eg29be0xcs.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 86709 |
Entropy (8bit): | 5.367391365596119 |
Encrypted: | false |
SSDEEP: | |
MD5: | E071ABDA8FE61194711CFC2AB99FE104 |
SHA1: | F647A6D37DC4CA055CED3CF64BBC1F490070ACBA |
SHA-256: | 85556761A8800D14CED8FCD41A6B8B26BF012D44A318866C0D81A62092EFD9BF |
SHA-512: | 53A2B560B20551672FBB0E6E72632D4FD1C7E2DD2ECF7337EBAAAB179CB8BE7C87E9D803CE7765706BC7FCBCF993C34587CD1237DE5A279AEA19911D69067B65 |
Malicious: | false |
Reputation: | unknown |
URL: | https://code.jquery.com/jquery-3.1.1.min.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 85578 |
Entropy (8bit): | 5.366055229017455 |
Encrypted: | false |
SSDEEP: | |
MD5: | 2F6B11A7E914718E0290410E85366FE9 |
SHA1: | 69BB69E25CA7D5EF0935317584E6153F3FD9A88C |
SHA-256: | 05B85D96F41FFF14D8F608DAD03AB71E2C1017C2DA0914D7C59291BAD7A54F8E |
SHA-512: | 0D40BCCAA59FEDECF7243D63B33C42592541D0330FEFC78EC81A4C6B9689922D5B211011CA4BE23AE22621CCE4C658F52A1552C92D7AC3615241EB640F8514DB |
Malicious: | false |
Reputation: | unknown |
URL: | https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 17174 |
Entropy (8bit): | 2.9129715116732746 |
Encrypted: | false |
SSDEEP: | |
MD5: | 12E3DAC858061D088023B2BD48E2FA96 |
SHA1: | E08CE1A144ECEAE0C3C2EA7A9D6FBC5658F24CE5 |
SHA-256: | 90CDAF487716184E4034000935C605D1633926D348116D198F355A98B8C6CD21 |
SHA-512: | C5030C55A855E7A9E20E22F4C70BF1E0F3C558A9B7D501CFAB6992AC2656AE5E41B050CCAC541EFA55F9603E0D349B247EB4912EE169D44044271789C719CD01 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 290960 |
Entropy (8bit): | 5.1082980298031435 |
Encrypted: | false |
SSDEEP: | |
MD5: | 24FA855A7678B1938F16235881E3E80B |
SHA1: | 67B6C9946134456D67C07765D230130D8679F8C6 |
SHA-256: | F2A84BC4F4CB8AE04162F42F1F3EBED1E05725D9B5BF666B885356C7698A071F |
SHA-512: | D1EAB0379A8736F8B14E73478F101A2656912C7FBB9B7D90707E6E8F782C09BEC4B017EB86781E5B4D4AE8A37B3F89A931249527E839F28BEE1389DE21BD79C7 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 258912 |
Entropy (8bit): | 4.694788011500782 |
Encrypted: | false |
SSDEEP: | |
MD5: | 05738EAC5280D6EACED7AB392897073C |
SHA1: | 3C2BDCA7C6A7A768024EAB6CC4A6B5C889DC748A |
SHA-256: | 6975498938C7B4FF74896FEF5D515112EBA41C3B7963018B1F61D7DC3CC52BE6 |
SHA-512: | 663ACA1568467E2A75388E18451D1F783BC818CFBAD8268B36F0C5365047B5373B6D86DB2A2291CB23892B9BD23E42E53CAFC8A1C7B84E6154DBB2416ACA1D42 |
Malicious: | false |
Reputation: | unknown |
URL: | https://sopbtech.store/start/xls/includes/css6.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 8165 |
Entropy (8bit): | 7.942645475708731 |
Encrypted: | false |
SSDEEP: | |
MD5: | 39682C8C152FF6FE3A842EF1F37D4603 |
SHA1: | E7DB7D2EDEA3E51D6DDD42BCF9301F096F580FA6 |
SHA-256: | 6CF799F2F4976F33994548A741B39D05097C35E3C991FB4DC6DB5E66F05B4B2B |
SHA-512: | A3987B39165AB3D4F85F6549CE1A8388F41A8F9E675D087050AB663E5557C512B1650E6AE31D174739307FAFE012504051F73FD1BB1AB9EA9BA76C01C7851071 |
Malicious: | false |
Reputation: | unknown |
URL: | https://sopbtech.store/start/xls/images/key.png |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 2043 |
Entropy (8bit): | 5.950379171266168 |
Encrypted: | false |
SSDEEP: | |
MD5: | 49D045AB3775B2E53EE278F3E2FFE692 |
SHA1: | 9908DB5764D4C9AFB7F0D6FB1D7F29869E6CA7F2 |
SHA-256: | B3D4FEE6149D869169A8FDC78ADF513D3609034F05080CACE8943FD186335A76 |
SHA-512: | 641BF303E1DB8F8FABB0E2943ACB30E7F229D3E928C6159B85F91844500DDAF58AA3EACBFCA896C8A1AD6447FEC0FA8FED2786B1210D0CB081EABFBF7DED53D4 |
Malicious: | false |
Reputation: | unknown |
URL: | https://ksvbotech.store/gesp/basic.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 9489 |
Entropy (8bit): | 7.963692772255007 |
Encrypted: | false |
SSDEEP: | |
MD5: | BD3254A066C1A81476BFAE453EA61E9F |
SHA1: | AC88290720480FAF5959EE84B400C350CF7D1F58 |
SHA-256: | 556B7311393CDDC0AF800EEA771717E937BA3847980A2A8F6785E1D846EBC1F5 |
SHA-512: | 7245CB886ADD3F411FC08C5664DF48A3DC6FBDAB114968BD6CA579930FBCDF5A07248C1C64A8E187414404F7AE00AF837A7255638AA62F38AC2E309A0339FE88 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 1362 |
Entropy (8bit): | 4.91273169880799 |
Encrypted: | false |
SSDEEP: | |
MD5: | 1AF2D30DCB2F89589CB89F50D819C8CE |
SHA1: | 4FF50438A3C929D011BD2C8FBCC2E48EBCB952F0 |
SHA-256: | 553C9196B08988E9A456A208D711E7FE600A27BDF1926941CEF7A2F49F834636 |
SHA-512: | 3125528329D8752CCD21683FDA041DDC966B4ABC6CF252D231B50CCABC197DB5AFE5A96A4D2214EEAA4AF3D1CA022AA69544BD779F242282EB7A4DBE637F3974 |
Malicious: | false |
Reputation: | unknown |
URL: | https://ksvbotech.store/gesp/msg.html |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 20 |
Entropy (8bit): | 3.446439344671015 |
Encrypted: | false |
SSDEEP: | |
MD5: | 2E1E0B28D6E7522CB687E20D37BCD8AA |
SHA1: | 03D5EFE3719CAB433421C4D9BF6C73E0B8EB69E5 |
SHA-256: | 124CE91528D8ACB894BDC980ABDDF035B38CDC64CE13F088D431E0B10D61FB24 |
SHA-512: | 70BB31CA0F3907AB6B5860459643E422AAD6685F32D519C23E671CD46F29ABF2DB1F0C53E54313FF6FE7B54A75CDCA18A9232556B3273E6DB200BFCD22BA82BD |
Malicious: | false |
Reputation: | unknown |
URL: | https://api.ipify.org/?format=json |
Preview: |
File type: | |
Entropy (8bit): | 5.944125639422995 |
TrID: |
|
File name: | original (37).eml |
File size: | 53'028 bytes |
MD5: | 46780ed985e098575251fbda415651d7 |
SHA1: | dc4d7804eb78e03f8b07f4ce7543c539ec063ba5 |
SHA256: | ebaa85b67c633784b7bf51dfa0f217887c40b71724af99857e114809bb37e4b0 |
SHA512: | ff14d1ae29a92f04698dbd8aa9133754a73c720112cf7e121ce143a072a73818181e8c16e59521d17094f098bb09d2721bd365b92a55820dc7d4ee69a58febb1 |
SSDEEP: | 1536:uZMRU6mvOs3Zf2BZQ2Z+tnaD+4x++MEuinhPmG4QsQko:QMRUVp3Zf2B8tnzWnMdo |
TLSH: | 4133C0164F4525614BC5738EC438BB0B5362A941B2E7F9C533CE6C9E019B9DB7C3A22B |
File Content Preview: | Return-Path: <UdayPrakash.Dukkipati@tdwilliamson.com>..Received: from NAM12-MW2-obe.outbound.protection.outlook.com (mail-mw2nam12on2124.outbound.protection.outlook.com [40.107.244.124]).. by inbound-smtp.us-east-1.amazonaws.com with SMTP id seuaob8d0d0oj |
Subject: | [Phish Alert] Caller left VM MSG 00:01:30 DURATION- ab736b76edcbb42b2b457b755f7513078a6d6532 |
From: | "Dukkipati, Uday" <UdayPrakash.Dukkipati@tdwilliamson.com> |
To: | IT-Security <IT-Security@tdwilliamson.com>, "55a58a1a-0759-4cdf-8d8f-2f73744230e7@phisher.knowbe4.com" <55a58a1a-0759-4cdf-8d8f-2f73744230e7@phisher.knowbe4.com> |
Cc: | |
BCC: | |
Date: | Thu, 19 Sep 2024 07:23:55 +0000 |
Communications: |
|
Attachments: |
|
Key | Value |
---|---|
Return-Path | <UdayPrakash.Dukkipati@tdwilliamson.com> |
Received | from DM3PR08MB9118.namprd08.prod.outlook.com ([fe80::25c9:9f63:51a9:e530]) by DM3PR08MB9118.namprd08.prod.outlook.com ([fe80::25c9:9f63:51a9:e530%7]) with mapi id 15.20.7982.016; Thu, 19 Sep 2024 07:23:55 +0000 |
Received-SPF | pass (spfCheck: domain of tdwilliamson.com designates 40.107.244.124 as permitted sender) client-ip=40.107.244.124; envelope-from=UdayPrakash.Dukkipati@tdwilliamson.com; helo=NAM12-MW2-obe.outbound.protection.outlook.com; |
Authentication-Results | amazonses.com; spf=pass (spfCheck: domain of tdwilliamson.com designates 40.107.244.124 as permitted sender) client-ip=40.107.244.124; envelope-from=UdayPrakash.Dukkipati@tdwilliamson.com; helo=NAM12-MW2-obe.outbound.protection.outlook.com; dkim=pass header.i=@tdwilliamson.com; dmarc=pass header.from=tdwilliamson.com; |
X-SES-RECEIPT | AEFBQUFBQUFBQUFFTWtGRXBmdngxRUQxR0RJMXJXVjNSSnFhKzROT1dBalZWTmVreG9Xd3RDV21LdEtaV0tTbGlVRm00UFgySnVLSHZwb2drVmFSQjhrdFJJTUFNaUdxQUNkN3RmaUZ6K3FXMS9VRHYyZFdOZVliZTVYSGdSMWVpZmltQytNZVN5Wkx4WmxHR2FUMmw4eHpHUWhhNnVsaTZCQ3BCc0JpdUU3SjAwU1dmSWFhUVFIdi9Zb0xaZ0d6MktON2VERldUSi90Mms1RzVXSEdwcWtMNzVsb2NDYVhWOXJHbzhpZ1N6Y3ZuQXNhZkgxS0NWR1FBZDlhWTJyQlJLenJnbmdoOThiUmlpcmt6S25wK0tNSVhoTTZUcHBxZVhOaDhGMVBReUY2L09uWjFna0tOTUw5Y1dpVkNzb3ZGUjVKYWtEL08zODRINWtnc1dHUHYwTnA5NjlnOEQ3eWM= |
X-SES-DKIM-SIGNATURE | a=rsa-sha256; q=dns/txt; b=kC1ijFWRlGq2/UzMCO9KOTuD1vyhCVa61nMYKbm3agDcxdrBb3hFus/1W33nTG4a4lgSavPW5WktliVeqVUZfUB2LCwiZtUrBA05Le6i2dCwkEntjhiN1sriNQoTFTV3IOb/q8NORKALcp5wb5zdqRELLByWWEuIztYjdUUbNw0=; c=relaxed/simple; s=ug7nbtf4gccmlpwj322ax3p6ow6yfsug; d=amazonses.com; t=1726730641; v=1; bh=xsA4OaVbZl3XPwV7Oe+DKVDH6tGrjHpi7OY7Nj+4B4k=; h=From:To:Cc:Bcc:Subject:Date:Message-ID:MIME-Version:Content-Type:X-SES-RECEIPT; |
ARC-Seal | i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=uQA5rI0vlhlpn1F99lhI7aO2MMH1esj2DvTpq/kT+yR/v92ao3JUzxWNQq7mschL2va3TM/MY1P/s3XARw78W7Bpw1gDi9edcaaMFfyKJd6BTLRfm6Cxre+1+aY4ORBH4eDzxd9SHGidxvzqdKtXjnve2b7ubwmNI+DTHgaVdGT3LiW9vzPQL1t5zSmU8pYP4EebJKoaSjNd1FkekEcTt/thbZcVKczgRguNIy/I3KPN5lVrVNnouKEBGflM7SKmJWZ8psR/1dYBFANL0p61Crql+uG0M4FGwMuM1zgUeVuZnnj2p2rGvmXMxNHXcdxquJx7AxC41zq87n9iqAYqQw== |
ARC-Message-Signature | i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=hlwJOzBwRmw2PKndjs9ZG9UJL8tgrNpQetqGtXARWiE=; b=Vt/U265A37LkJ6Y/eMM2UsYcnvC12uUvzxPB2U2NwmwbsOpoSjlBjZP7q+jmjHuubdsUNz6sMACP4cZTsdVPqtckXK61p7VjJY70ULlP19r5P5ZdLN9u6+Sovqk3zmZgr+arEXt5yU3xQ9D+z1yeCoZUsWIoba92unZJlp45CUsVsZvYMMPrbWx9ItIh7EV5Vl7a3Ln8Kdo3jY8c+JvjHuc9+yrt5FaXSVsJ53zsSvnZ+RKypJg5M+h72poN1st37QfmG5PN7Ax1q5OUG1qS3oF50pjRRz5xqUWwJb8dJ/qHBJALezAWOxBFPGJ3WMJQBWy1PRpV5Q6G++CaVW7kNA== |
ARC-Authentication-Results | i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=tdwilliamson.com; dmarc=pass action=none header.from=tdwilliamson.com; dkim=pass header.d=tdwilliamson.com; arc=none |
DKIM-Signature | v=1; a=rsa-sha256; c=relaxed/relaxed; d=tdwilliamson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=hlwJOzBwRmw2PKndjs9ZG9UJL8tgrNpQetqGtXARWiE=; b=nbhZYhTMZsB530aPBlu5f7sSc08r3fUEBPY1JB6LPpwVPr07riMMB+ymdopFH24PmZ9de2qgzTFQxwNWagLdPrkXDvSSHhHHpGVyqe3xbqCHPkO5eUDkwmuCtwVqjdmFryYL5fHDm3mfHz5uoXeELSXH+5Kb0b6PaymG/QtAFIXstXA15uwkHsZiIEIXU7Hrnb3bVrUSS4RNoRbfE6UA9pUTIJhxLMLl10PMHj7TWi+nNp79ZMBb47E2Gl6PNZ+p7GzU4EdC3BxhyG6JiIIirhaX72bmV6rTMaC/PXnn8doi3GtfSKEFOxHjrOc8Lrb6QG+kT37Ruhb+fFsWW2OamA== |
From | "Dukkipati, Uday" <UdayPrakash.Dukkipati@tdwilliamson.com> |
To | IT-Security <IT-Security@tdwilliamson.com>, "55a58a1a-0759-4cdf-8d8f-2f73744230e7@phisher.knowbe4.com" <55a58a1a-0759-4cdf-8d8f-2f73744230e7@phisher.knowbe4.com> |
Subject | [Phish Alert] Caller left VM MSG 00:01:30 DURATION- ab736b76edcbb42b2b457b755f7513078a6d6532 |
Thread-Topic | [Phish Alert] Caller left VM MSG 00:01:30 DURATION- ab736b76edcbb42b2b457b755f7513078a6d6532 |
Thread-Index | AQHbCmTivaVCXLFpxkW5vtqpQ7dxvA== |
Date | Thu, 19 Sep 2024 07:23:55 +0000 |
Message-ID | <DM3PR08MB9118126CE9927349F879C2498D632@DM3PR08MB9118.namprd08.prod.outlook.com> |
Accept-Language | en-US |
Content-Language | en-US |
X-MS-Has-Attach | yes |
X-MS-TNEF-Correlator | |
authentication-results | dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=tdwilliamson.com; |
x-ms-publictraffictype | |
x-ms-traffictypediagnostic | DM3PR08MB9118:EE_|DM8PR08MB7415:EE_ |
x-ms-office365-filtering-correlation-id | 6b86bf22-9608-4946-1f79-08dcd87c0505 |
x-ms-exchange-senderadcheck | 1 |
x-ms-exchange-antispam-relay | 0 |
x-microsoft-antispam | BCL:0;ARA:13230040|366016|1800799024|376014|38070700018; |
x-microsoft-antispam-message-info | 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 |
x-forefront-antispam-report | CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM3PR08MB9118.namprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(366016)(1800799024)(376014)(38070700018);DIR:OUT;SFP:1102; |
x-ms-exchange-antispam-messagedata-chunkcount | 1 |
x-ms-exchange-antispam-messagedata-0 | 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 |
Content-Type | multipart/mixed; boundary="_002_DM3PR08MB9118126CE9927349F879C2498D632DM3PR08MB9118namp_" |
MIME-Version | 1.0 |
X-OriginatorOrg | tdwilliamson.com |
X-MS-Exchange-CrossTenant-AuthAs | Internal |
X-MS-Exchange-CrossTenant-AuthSource | DM3PR08MB9118.namprd08.prod.outlook.com |
X-MS-Exchange-CrossTenant-Network-Message-Id | 6b86bf22-9608-4946-1f79-08dcd87c0505 |
X-MS-Exchange-CrossTenant-originalarrivaltime | 19 Sep 2024 07:23:55.1171 (UTC) |
X-MS-Exchange-CrossTenant-fromentityheader | Hosted |
X-MS-Exchange-CrossTenant-id | da7cba33-a475-42a2-a6d2-d3eabac375db |
X-MS-Exchange-CrossTenant-mailboxtype | HOSTED |
X-MS-Exchange-CrossTenant-userprincipalname | VG7AjQpM3uc6IXvC/thympWZ5jSaXZCbJiAarS3dtDmA3Ku8csueh5wsiel06aAI/eN5WN2tS/+ZN41kKEZF5wIZzEXcpDbVHTYGZ3ZJTP/3VX7LiWJGPAe7Hm4W28bn |
X-MS-Exchange-Transport-CrossTenantHeadersStamped | DM8PR08MB7415 |
Icon Hash: | 46070c0a8e0c67d6 |