Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
R.D. Bitzer Co. Inc.xlsm

Overview

General Information

Sample name:R.D. Bitzer Co. Inc.xlsm
Analysis ID:1633851
MD5:5e3d30f59e0c7d0537eb8e2a92b1c6b0
SHA1:2aaec5aecd33729cb6f7893adc9697ec43d66595
SHA256:81a39805caf3486d46b1ee45c0d8094b9aa4e3d138e7145d38599848eff23046
Infos:

Detection

Score:64
Range:0 - 100
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Document contains an embedded VBA macro with suspicious strings
Document contains an embedded VBA with functions possibly related to HTTP operations
Document contains an embedded VBA macro which executes code when the document is opened / closed
Document contains embedded VBA macros
Document misses a certain OLE stream usually present in this Microsoft Office document type
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Excel Network Connections
Sigma detected: Suspicious Office Outbound Connections
Suricata IDS alerts with low severity for network traffic

Classification

  • System is w10x64
  • EXCEL.EXE (PID: 7544 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding MD5: 4A871771235598812032C822E6F68F19)
    • splwow64.exe (PID: 5936 cmdline: C:\Windows\splwow64.exe 12288 MD5: 77DE7761B037061C7C112FD3C5B91E73)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Network ConnectionAuthor: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0", Tim Shelton: Data: DestinationIp: 52.123.129.14, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE, Initiated: true, ProcessId: 7544, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49689
Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.6, DestinationIsIpv6: false, DestinationPort: 49689, EventID: 3, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE, Initiated: true, ProcessId: 7544, Protocol: tcp, SourceIp: 52.123.129.14, SourceIsIpv6: false, SourcePort: 443
Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE, ProcessId: 7544, TargetFilename: C:\Users\user\Desktop\~$R.D. Bitzer Co. Inc.xlsm
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-03-10T16:11:42.516820+010020283713Unknown Traffic192.168.2.64969913.107.253.72443TCP
2025-03-10T16:11:42.516820+010020283713Unknown Traffic192.168.2.64970013.107.253.72443TCP
2025-03-10T16:11:42.516820+010020283713Unknown Traffic192.168.2.64969813.107.253.72443TCP
2025-03-10T16:11:42.516820+010020283713Unknown Traffic192.168.2.64969613.107.253.72443TCP
2025-03-10T16:11:42.516820+010020283713Unknown Traffic192.168.2.64969713.107.253.72443TCP
2025-03-10T16:13:21.177200+010020283713Unknown Traffic192.168.2.64968952.123.129.14443TCP
2025-03-10T16:13:49.173500+010020283713Unknown Traffic192.168.2.64969513.107.253.72443TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: R.D. Bitzer Co. Inc.xlsmReversingLabs: Detection: 18%
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile opened: C:\Program Files (x86)\Microsoft Office\root\vfs\SystemX86\MSVCR100.dllJump to behavior
Source: global trafficTCP traffic: 192.168.2.6:49689 -> 52.123.129.14:443
Source: global trafficTCP traffic: 192.168.2.6:49689 -> 52.123.129.14:443
Source: global trafficTCP traffic: 192.168.2.6:49689 -> 52.123.129.14:443
Source: global trafficTCP traffic: 192.168.2.6:49689 -> 52.123.129.14:443
Source: global trafficTCP traffic: 192.168.2.6:49695 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.6:49695 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.6:49695 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.6:49695 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.6:49696 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.6:49696 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.6:49697 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.6:49697 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.6:49696 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.6:49697 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.6:49698 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.6:49698 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.6:49698 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.6:49699 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.6:49699 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.6:49699 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.6:49700 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.6:49700 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.6:49700 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.6:49689 -> 52.123.129.14:443
Source: global trafficTCP traffic: 52.123.129.14:443 -> 192.168.2.6:49689
Source: global trafficTCP traffic: 192.168.2.6:49689 -> 52.123.129.14:443
Source: global trafficTCP traffic: 192.168.2.6:49689 -> 52.123.129.14:443
Source: global trafficTCP traffic: 52.123.129.14:443 -> 192.168.2.6:49689
Source: global trafficTCP traffic: 192.168.2.6:49689 -> 52.123.129.14:443
Source: global trafficTCP traffic: 192.168.2.6:49695 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.6:49695
Source: global trafficTCP traffic: 192.168.2.6:49695 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.6:49695 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.6:49695
Source: global trafficTCP traffic: 192.168.2.6:49695 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.6:49696 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.6:49696
Source: global trafficTCP traffic: 192.168.2.6:49696 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.6:49697 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.6:49697
Source: global trafficTCP traffic: 192.168.2.6:49697 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.6:49696 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.6:49696
Source: global trafficTCP traffic: 192.168.2.6:49697 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.6:49697
Source: global trafficTCP traffic: 192.168.2.6:49698 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.6:49698
Source: global trafficTCP traffic: 192.168.2.6:49698 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.6:49698 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.6:49698
Source: global trafficTCP traffic: 192.168.2.6:49699 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.6:49699
Source: global trafficTCP traffic: 192.168.2.6:49699 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.6:49699 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.6:49699
Source: global trafficTCP traffic: 192.168.2.6:49700 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.6:49700
Source: global trafficTCP traffic: 192.168.2.6:49700 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.6:49700 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.6:49700
Source: Joe Sandbox ViewIP Address: 13.107.253.72 13.107.253.72
Source: Joe Sandbox ViewIP Address: 52.123.129.14 52.123.129.14
Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49689 -> 52.123.129.14:443
Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49695 -> 13.107.253.72:443
Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49699 -> 13.107.253.72:443
Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49700 -> 13.107.253.72:443
Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49698 -> 13.107.253.72:443
Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49696 -> 13.107.253.72:443
Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49697 -> 13.107.253.72:443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49689
Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49697
Source: unknownNetwork traffic detected: HTTP traffic on port 49695 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49696
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49695
Source: unknownNetwork traffic detected: HTTP traffic on port 49696 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49697 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49689 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443

System Summary

barindex
Source: screenshotOCR: Enable Editing" button at the yellow bar and then click 'Enable content". BJZFPPV./ PT G EO Sheetl @
Source: screenshotOCR: Enable content". BJZFPPV./ PT G EO Sheetl @ &Accessibility: Good to go Ready L BIHQFD MXP SFP FIOL 1
Source: screenshotOCR: Enable Editing" button at the yellow bar and then click 'Enable content". Sheetl &Accessibility: Goo
Source: screenshotOCR: Enable content". Sheetl &Accessibility: Good to go Ready 11:12 ENG p Type here to search 10/03/2025
Source: screenshotOCR: Enable Editing" button at the yellow bar and then click 'Enable content". Sheetl &Accessibility: Goo
Source: screenshotOCR: Enable content". Sheetl &Accessibility: Good to go Ready 11:12 ENG p Type here to search 10/03/2025
Source: screenshotOCR: Enable Editing" button at the yellow bar and then click 'Enable content". Sheetl &Accessibility: Goo
Source: screenshotOCR: Enable content". Sheetl &Accessibility: Good to go Ready 11:12 ENG p Type here to search 10/03/2025
Source: screenshotOCR: Enable Editing" button at the yellow bar and then click 'Enable content". Sheetl &Accessibility: Goo
Source: screenshotOCR: Enable content". Sheetl &Accessibility: Good to go Ready 11:12 ENG p Type here to search 10/03/2025
Source: screenshotOCR: Enable Editing" button at the yellow bar and then click 'Enable content". Sheetl &Accessibility: Goo
Source: screenshotOCR: Enable content". Sheetl &Accessibility: Good to go Ready 11:13 ENG p Type here to search 10/03/2025
Source: 18130000.0.drOLE, VBA macro line: Set TGVWEAHEHGCFQCOAD = LZECWFCMPLLYGFMXOHI.CreateTextFile(RDRFRJNCLCTNAEIJHIS)
Source: 18130000.0.drStream path 'VBA/Module1' : found possibly 'XMLHttpRequest' functions response, responsetext, open, send
Source: 18130000.0.drOLE, VBA macro line: Private Sub Workbook_Open()
Source: 18130000.0.drOLE indicator, VBA macros: true
Source: ~DF7F3A9F6B78AF0793.TMP.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: classification engineClassification label: mal64.expl.winXLSM@3/7@0/2
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Program Files (x86)\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xmlJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Users\user\Desktop\~$R.D. Bitzer Co. Inc.xlsmJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\{06567DB3-60B4-4429-B38C-BC15BDEBA595} - OProcSessId.datJump to behavior
Source: 18130000.0.drOLE indicator, Workbook stream: true
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: R.D. Bitzer Co. Inc.xlsmReversingLabs: Detection: 18%
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{88d96a0f-f192-11d4-a65f-0040963251e5}\InProcServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: 18130000.0.drInitial sample: OLE zip file path = xl/media/image1.png
Source: 18130000.0.drInitial sample: OLE zip file path = docProps/custom.xml
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\CommonJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile opened: C:\Program Files (x86)\Microsoft Office\root\vfs\SystemX86\MSVCR100.dllJump to behavior
Source: ~DF7F3A9F6B78AF0793.TMP.0.drInitial sample: OLE indicators vbamacros = False
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeWindow / User API: threadDelayed 733Jump to behavior
Source: C:\Windows\splwow64.exeLast function: Thread delayed
Source: C:\Windows\splwow64.exeLast function: Thread delayed
Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information queried: ProcessInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information22
Scripting
Valid Accounts2
Exploitation for Client Execution
22
Scripting
1
Process Injection
2
Masquerading
OS Credential Dumping1
Process Discovery
Remote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Disable or Modify Tools
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media11
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Virtualization/Sandbox Evasion
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Process Injection
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
R.D. Bitzer Co. Inc.xlsm18%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
s-part-0044.t-0009.fb-t-msedge.net
13.107.253.72
truefalse
    high
    s-0005.dual-s-msedge.net
    52.123.129.14
    truefalse
      high
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      13.107.253.72
      s-part-0044.t-0009.fb-t-msedge.netUnited States
      8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
      52.123.129.14
      s-0005.dual-s-msedge.netUnited States
      8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
      Joe Sandbox version:42.0.0 Malachite
      Analysis ID:1633851
      Start date and time:2025-03-10 16:10:37 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 4m 37s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:defaultwindowsofficecookbook.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:11
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:R.D. Bitzer Co. Inc.xlsm
      Detection:MAL
      Classification:mal64.expl.winXLSM@3/7@0/2
      Cookbook Comments:
      • Found application associated with file extension: .xlsm
      • Found Word or Excel or PowerPoint or XPS Viewer
      • Attach to Office via COM
      • Scroll down
      • Close Viewer
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe, TextInputHost.exe
      • Excluded IPs from analysis (whitelisted): 52.109.76.240, 52.109.68.129, 104.208.16.90
      • Excluded domains from analysis (whitelisted): ecs.office.com, self-events-data.trafficmanager.net, slscr.update.microsoft.com, otelrules.azureedge.net, prod.configsvc1.live.com.akadns.net, self.events.data.microsoft.com, otelrules.afd.azureedge.net, osiprod-frc-buff-azsc-000.francecentral.cloudapp.azure.com, ctldl.windowsupdate.com, prod.roaming1.live.com.akadns.net, eur.roaming1.live.com.akadns.net, onedscolprdcus14.centralus.cloudapp.azure.com, roaming.officeapps.live.com, neu-azsc-config.officeapps.live.com, dual-s-0005-office.config.skype.com, login.live.com, config.officeapps.live.com, frc-azsc-000.roaming.officeapps.live.com, azureedge-t-prod.trafficmanager.net, officeclient.microsoft.com, ecs.office.trafficmanager.net, c.pki.goog, europe.configsvc1.live.com.akadns.net
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtCreateKey calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      • Report size getting too big, too many NtReadVirtualMemory calls found.
      TimeTypeDescription
      11:12:55API Interceptor770x Sleep call for process: splwow64.exe modified
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      13.107.253.72221036299-043825-sanlccjavap0004-6531.xlsGet hashmaliciousUnknownBrowse
        https://assets-fra.mkt.dynamics.com/b3baa109-6efd-ef11-b016-002248d9b9fa/digitalassets/standaloneforms/fe7058e5-a1fd-ef11-bae3-000d3a959714#_msdynmkt_donottrack=0,_msdynmkt_linkid=37db13e4-8bf7-4e91-a0fa-9dd02c9e6ee4Get hashmaliciousHTMLPhisherBrowse
          https://0utl00k_secure_pdfsharing.wesendit.com/dl/9WeFG1R9WGJTbgaCO/a3Jpc3RhbC5wbGFpc3RlZEBzb2RleG8uY29t__;!!P5FZM7ryyeY!UznDjsW7gO6EJncqNmJhgeM1Zawk4R__aUyCoG6Jb-mYlr-79K2gn3tFm6bOpnkuKuN_n69fA8HZASZsr-9bQyk$Get hashmaliciousUnknownBrowse
            https://0utl00k_secure_pdfsharing.wesendit.com/dl/9WeFG1R9WGJTbgaCO/a3Jpc3RhbC5wbGFpc3RlZEBzb2RleG8uY29t__;!!P5FZM7ryyeY!UznDjsW7gO6EJncqNmJhgeM1Zawk4R__aUyCoG6Jb-mYlr-79K2gn3tFm6bOpnkuKuN_n69fA8HZASZsr-9bQyk$Get hashmaliciousUnknownBrowse
              PastePictures 1.xlaGet hashmaliciousUnknownBrowse
                Purchase Inquiry.xla.xlsxGet hashmaliciousUnknownBrowse
                  POETDB24-25771.xla.xlsxGet hashmaliciousUnknownBrowse
                    Purchase Inquiry.xla.xlsxGet hashmaliciousUnknownBrowse
                      https://go.irt.calyx.ai/LiveGet hashmaliciousUnknownBrowse
                        Purchase Order.xla.xlsxGet hashmaliciousUnknownBrowse
                          52.123.129.14inbound CaIIer left (2) 0033secsCaII__[MSG-ID-df8a922f18abc71f9a730a93c234d77c.emlGet hashmaliciousUnknownBrowse
                            L#U00f6senordet f#U00f6r tommy.mobrin@skolverket.se g#U00e5r ut idag!.msgGet hashmaliciousUnknownBrowse
                              FW 188355..msgGet hashmaliciousHTMLPhisherBrowse
                                221036299-043825-sanlccjavap0004-6531.xlsGet hashmaliciousUnknownBrowse
                                  Message_3521513.emlGet hashmaliciousUnknownBrowse
                                    Dear david@corerecon.com - Your Stay Has Been Successfully Booked Ocean Breeze Retreat.msgGet hashmaliciousScreenConnect ToolBrowse
                                      phish_alert_sp2_2.0.0.0 (3).emlGet hashmaliciousUnknownBrowse
                                        phish_alert_sp2_2.0.0.0-1.emlGet hashmaliciousHTMLPhisherBrowse
                                          PayeeRemittanceNotice_ GQUMJOTASN.emlGet hashmaliciousUnknownBrowse
                                            desaremix.exeGet hashmaliciousKillMBRBrowse
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              s-0005.dual-s-msedge.netinbound CaIIer left (2) 0033secsCaII__[MSG-ID-df8a922f18abc71f9a730a93c234d77c.emlGet hashmaliciousUnknownBrowse
                                              • 52.123.129.14
                                              221036299-043825-sanlccjavap0004-6531.xlsGet hashmaliciousUnknownBrowse
                                              • 52.123.128.14
                                              221036299-043825-sanlccjavap0004-6531.xlsGet hashmaliciousUnknownBrowse
                                              • 52.123.128.14
                                              L#U00f6senordet f#U00f6r tommy.mobrin@skolverket.se g#U00e5r ut idag!.msgGet hashmaliciousUnknownBrowse
                                              • 52.123.129.14
                                              FW 188355..msgGet hashmaliciousHTMLPhisherBrowse
                                              • 52.123.129.14
                                              Message.emlGet hashmaliciousUnknownBrowse
                                              • 52.123.129.14
                                              Message_3521513.emlGet hashmaliciousUnknownBrowse
                                              • 52.123.129.14
                                              PastePictures 1.xlaGet hashmaliciousUnknownBrowse
                                              • 52.123.129.14
                                              POETDB24-25771.xla.xlsxGet hashmaliciousUnknownBrowse
                                              • 52.123.128.14
                                              f1215469392.dllGet hashmaliciousUnknownBrowse
                                              • 52.123.129.14
                                              s-part-0044.t-0009.fb-t-msedge.net221036299-043825-sanlccjavap0004-6531.xlsGet hashmaliciousUnknownBrowse
                                              • 13.107.253.72
                                              https://assets-fra.mkt.dynamics.com/b3baa109-6efd-ef11-b016-002248d9b9fa/digitalassets/standaloneforms/fe7058e5-a1fd-ef11-bae3-000d3a959714#_msdynmkt_donottrack=0,_msdynmkt_linkid=37db13e4-8bf7-4e91-a0fa-9dd02c9e6ee4Get hashmaliciousHTMLPhisherBrowse
                                              • 13.107.253.72
                                              https://0utl00k_secure_pdfsharing.wesendit.com/dl/9WeFG1R9WGJTbgaCO/a3Jpc3RhbC5wbGFpc3RlZEBzb2RleG8uY29t__;!!P5FZM7ryyeY!UznDjsW7gO6EJncqNmJhgeM1Zawk4R__aUyCoG6Jb-mYlr-79K2gn3tFm6bOpnkuKuN_n69fA8HZASZsr-9bQyk$Get hashmaliciousUnknownBrowse
                                              • 13.107.253.72
                                              https://0utl00k_secure_pdfsharing.wesendit.com/dl/9WeFG1R9WGJTbgaCO/a3Jpc3RhbC5wbGFpc3RlZEBzb2RleG8uY29t__;!!P5FZM7ryyeY!UznDjsW7gO6EJncqNmJhgeM1Zawk4R__aUyCoG6Jb-mYlr-79K2gn3tFm6bOpnkuKuN_n69fA8HZASZsr-9bQyk$Get hashmaliciousUnknownBrowse
                                              • 13.107.253.72
                                              PastePictures 1.xlaGet hashmaliciousUnknownBrowse
                                              • 13.107.253.72
                                              Purchase Inquiry.xla.xlsxGet hashmaliciousUnknownBrowse
                                              • 13.107.253.72
                                              f1215469392.dllGet hashmaliciousUnknownBrowse
                                              • 13.107.253.72
                                              POETDB24-25771.xla.xlsxGet hashmaliciousUnknownBrowse
                                              • 13.107.253.72
                                              Purchase Inquiry.xla.xlsxGet hashmaliciousUnknownBrowse
                                              • 13.107.253.72
                                              https://go.irt.calyx.ai/LiveGet hashmaliciousUnknownBrowse
                                              • 13.107.253.72
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              MICROSOFT-CORP-MSN-AS-BLOCKUSinbound CaIIer left (2) 0033secsCaII__[MSG-ID-df8a922f18abc71f9a730a93c234d77c.emlGet hashmaliciousUnknownBrowse
                                              • 52.123.129.14
                                              221036299-043825-sanlccjavap0004-6531.xlsGet hashmaliciousUnknownBrowse
                                              • 52.123.128.14
                                              Would you please take a look at this for Miss Robin.msgGet hashmaliciousUnknownBrowse
                                              • 52.123.130.14
                                              221036299-043825-sanlccjavap0004-6531.xlsGet hashmaliciousUnknownBrowse
                                              • 13.107.253.72
                                              L#U00f6senordet f#U00f6r tommy.mobrin@skolverket.se g#U00e5r ut idag!.msgGet hashmaliciousUnknownBrowse
                                              • 52.123.129.14
                                              Orange county sheriffs office Reference Number(s)_FLD9390700107 (SOP 00900) Note(s).docxGet hashmaliciousUnknownBrowse
                                              • 52.168.117.169
                                              FW 188355..msgGet hashmaliciousHTMLPhisherBrowse
                                              • 52.109.28.46
                                              221036299-043825-sanlccjavap0004-6531.xlsGet hashmaliciousUnknownBrowse
                                              • 52.109.76.240
                                              Message.emlGet hashmaliciousUnknownBrowse
                                              • 52.102.16.140
                                              https://assets-fra.mkt.dynamics.com/b3baa109-6efd-ef11-b016-002248d9b9fa/digitalassets/standaloneforms/fe7058e5-a1fd-ef11-bae3-000d3a959714#_msdynmkt_donottrack=0,_msdynmkt_linkid=37db13e4-8bf7-4e91-a0fa-9dd02c9e6ee4Get hashmaliciousHTMLPhisherBrowse
                                              • 51.138.215.192
                                              MICROSOFT-CORP-MSN-AS-BLOCKUSinbound CaIIer left (2) 0033secsCaII__[MSG-ID-df8a922f18abc71f9a730a93c234d77c.emlGet hashmaliciousUnknownBrowse
                                              • 52.123.129.14
                                              221036299-043825-sanlccjavap0004-6531.xlsGet hashmaliciousUnknownBrowse
                                              • 52.123.128.14
                                              Would you please take a look at this for Miss Robin.msgGet hashmaliciousUnknownBrowse
                                              • 52.123.130.14
                                              221036299-043825-sanlccjavap0004-6531.xlsGet hashmaliciousUnknownBrowse
                                              • 13.107.253.72
                                              L#U00f6senordet f#U00f6r tommy.mobrin@skolverket.se g#U00e5r ut idag!.msgGet hashmaliciousUnknownBrowse
                                              • 52.123.129.14
                                              Orange county sheriffs office Reference Number(s)_FLD9390700107 (SOP 00900) Note(s).docxGet hashmaliciousUnknownBrowse
                                              • 52.168.117.169
                                              FW 188355..msgGet hashmaliciousHTMLPhisherBrowse
                                              • 52.109.28.46
                                              221036299-043825-sanlccjavap0004-6531.xlsGet hashmaliciousUnknownBrowse
                                              • 52.109.76.240
                                              Message.emlGet hashmaliciousUnknownBrowse
                                              • 52.102.16.140
                                              https://assets-fra.mkt.dynamics.com/b3baa109-6efd-ef11-b016-002248d9b9fa/digitalassets/standaloneforms/fe7058e5-a1fd-ef11-bae3-000d3a959714#_msdynmkt_donottrack=0,_msdynmkt_linkid=37db13e4-8bf7-4e91-a0fa-9dd02c9e6ee4Get hashmaliciousHTMLPhisherBrowse
                                              • 51.138.215.192
                                              No context
                                              No context
                                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
                                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):118
                                              Entropy (8bit):3.5700810731231707
                                              Encrypted:false
                                              SSDEEP:3:QaklTlAlXMLLmHlIlFLlmIK/5lTn84vlJlhlXlDHlA6l3l6Als:QFulcLk04/5p8GVz6QRq
                                              MD5:573220372DA4ED487441611079B623CD
                                              SHA1:8F9D967AC6EF34640F1F0845214FBC6994C0CB80
                                              SHA-256:BE84B842025E4241BFE0C9F7B8F86A322E4396D893EF87EA1E29C74F47B6A22D
                                              SHA-512:F19FA3583668C3AF92A9CEF7010BD6ECEC7285F9C8665F2E9528DBA606F105D9AF9B1DB0CF6E7F77EF2E395943DC0D5CB37149E773319078688979E4024F9DD7
                                              Malicious:false
                                              Reputation:high, very likely benign file
                                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.H.e.a.r.t.b.e.a.t.C.a.c.h.e./.>.
                                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):646
                                              Entropy (8bit):4.431068085028775
                                              Encrypted:false
                                              SSDEEP:12:LYaBFN89D71CdL/Hqm6v+/8WJezEkDvwZkniUSvWrBk8JAg6ee:L5DOkLv6zEPZkniUSOrRJQ
                                              MD5:7111BFA692A22E4B3C07F1E6C6FF6F72
                                              SHA1:297E8C4E4CFBCE24AAEDE0C1F11BDFF5AD6B9D37
                                              SHA-256:10BF6E15C08C8C7F5D96B658BAB78AED86D1DE20F08E7871EEFBA0939AF11A02
                                              SHA-512:C2E50510263E102FACC076B9981893B54DFD7F18672429B4709ED4A5A6889F2EF2CBE05C03EF55BBD90F20AF7C54FF654ED9126E78F08B775E7E1DF81DEE081D
                                              Malicious:false
                                              Reputation:low
                                              Preview:-------------------------------------------------------------------------..GMREADME.TXT..Copyright (c) 1998-2000 Microsoft Corporation. All Rights Reserved...------------....The GM.DLS file contains the Roland SoundCanvas Sound Set which is ..protected under the following copyright: ..Roland GS Sound Set/Microsoft (P) 1996 Roland Corporation U.S. ..The Roland SoundCanvas Sound Set is licensed under Microsoft's ..End User License Agreement for use with Microsoft operating ..system products only. All other uses require a separate written ..license from Roland.....-------------------------------------------------------------------------..
                                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
                                              File Type:Composite Document File V2 Document, Cannot read section info
                                              Category:dropped
                                              Size (bytes):32768
                                              Entropy (8bit):4.5065189319039565
                                              Encrypted:false
                                              SSDEEP:384:0HKUSjolKLPqxG7Dqaqpo08JDBRKnlwSUUItW1ThEfj/8:6KUCLLPymqVpoNJDBgNUUItW1g/8
                                              MD5:58198B2E81C7F7982C753F3CE0D3497C
                                              SHA1:192B947906E0880E8346910ACA59798B295EB5C7
                                              SHA-256:0158F86CF9D02176D40FAEB0D03D914B81A0427E9448CC403540858534A4630F
                                              SHA-512:2647C1FB4DD9E237727C1EB03D4148B48A48622EF783CD8E46C0A74B68274F2B3543941297EDE9DF11E1B235E3986C784290CD088FDC9893A4713272DB28A6D5
                                              Malicious:false
                                              Reputation:low
                                              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
                                              File Type:Microsoft Excel 2007+
                                              Category:dropped
                                              Size (bytes):37355
                                              Entropy (8bit):7.732093144392371
                                              Encrypted:false
                                              SSDEEP:768:YbTzxKj7McCpp/txkw30Zfzmxwr5PDlJMYW11sdhx/uxRsWthC6ceIix:YHzxBcCpJtj0ZfDrlDlJjWnsdX/4RDZ
                                              MD5:FCD1205103764078E295D82FD1E24C29
                                              SHA1:E8B8DA493C31E6B076DE3B3DAFF7C0CF9C69B713
                                              SHA-256:A390E6A0B9F84AC035160FE58C9566A1F38FDE42FDAF5317927018F31E530752
                                              SHA-512:B640E505D2FD55334CE785B77706D5FDC6DEFD438FE2F56FB5A877BDD618A1DF64F69B4D693E9B43B23025968DE856C2ABF47F9636439D6A87E3FB79DFDF86B2
                                              Malicious:false
                                              Reputation:low
                                              Preview:PK..........!.?&..............[Content_Types].xml ...(....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................T.n.0....?..."......C....M?`M.-.|.K;..w.H......H........f.]..L6.F\..0.hlX7........@0.b.F...........*......U).-z ...>Y...g^..z.kT.f..J.P0..t.b1..+.R..y{P..AT..:.F@J.j(,T...ZY.r.......B..Ka....NL..<".....I.c..#{...D........._\.l.Vw..O.l..;...f..F...].F'.E,...6..!;.6<*<..G.._..|a.P$...s.%..`z0.d.I...Q.b..K.a&.....;g;.N1......[.....=..dx.$.qq..#.9^.&..xDd|...M.E..0..Omx.?1.|.....0...zK%.....#..........PK.....
                                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:modified
                                              Size (bytes):26
                                              Entropy (8bit):3.95006375643621
                                              Encrypted:false
                                              SSDEEP:3:ggPYV:rPYV
                                              MD5:187F488E27DB4AF347237FE461A079AD
                                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                              Malicious:false
                                              Reputation:high, very likely benign file
                                              Preview:[ZoneTransfer]....ZoneId=0
                                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
                                              File Type:Microsoft Excel 2007+
                                              Category:dropped
                                              Size (bytes):37355
                                              Entropy (8bit):7.732093144392371
                                              Encrypted:false
                                              SSDEEP:768:YbTzxKj7McCpp/txkw30Zfzmxwr5PDlJMYW11sdhx/uxRsWthC6ceIix:YHzxBcCpJtj0ZfDrlDlJjWnsdX/4RDZ
                                              MD5:FCD1205103764078E295D82FD1E24C29
                                              SHA1:E8B8DA493C31E6B076DE3B3DAFF7C0CF9C69B713
                                              SHA-256:A390E6A0B9F84AC035160FE58C9566A1F38FDE42FDAF5317927018F31E530752
                                              SHA-512:B640E505D2FD55334CE785B77706D5FDC6DEFD438FE2F56FB5A877BDD618A1DF64F69B4D693E9B43B23025968DE856C2ABF47F9636439D6A87E3FB79DFDF86B2
                                              Malicious:true
                                              Preview:PK..........!.?&..............[Content_Types].xml ...(....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................T.n.0....?..."......C....M?`M.-.|.K;..w.H......H........f.]..L6.F\..0.hlX7........@0.b.F...........*......U).-z ...>Y...g^..z.kT.f..J.P0..t.b1..+.R..y{P..AT..:.F@J.j(,T...ZY.r.......B..Ka....NL..<".....I.c..#{...D........._\.l.Vw..O.l..;...f..F...].F'.E,...6..!;.6<*<..G.._..|a.P$...s.%..`z0.d.I...Q.b..K.a&.....;g;.N1......[.....=..dx.$.qq..#.9^.&..xDd|...M.E..0..Omx.?1.|.....0...zK%.....#..........PK.....
                                              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):165
                                              Entropy (8bit):1.610853976637159
                                              Encrypted:false
                                              SSDEEP:3:iXFQLjLlAWFd:97
                                              MD5:CA2C2DB316A89F044206082EEB3A366E
                                              SHA1:B1B7DFF94B991B26093AA29BF3793DDE245412E1
                                              SHA-256:12393F1035745AD02C149920E37AFFE459CD0448A2AFEE25C1FABA8060758FF7
                                              SHA-512:66BC8C779431737A3FA00AF7697C299BC473B6FD22D48914986821DA7C0AB90554D32F7F2B471EAB5410F9C0DE7E076F4D6DEDDCCE1948818F7781DAE9EDEBE7
                                              Malicious:true
                                              Preview:.user ..e.n.g.i.n.e.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                              File type:Microsoft OOXML
                                              Entropy (8bit):7.95067434508178
                                              TrID:
                                              • Excel Microsoft Office Open XML Format document with Macro (52504/1) 54.97%
                                              • Excel Microsoft Office Open XML Format document (35004/1) 36.65%
                                              • ZIP compressed archive (8000/1) 8.38%
                                              File name:R.D. Bitzer Co. Inc.xlsm
                                              File size:30'044 bytes
                                              MD5:5e3d30f59e0c7d0537eb8e2a92b1c6b0
                                              SHA1:2aaec5aecd33729cb6f7893adc9697ec43d66595
                                              SHA256:81a39805caf3486d46b1ee45c0d8094b9aa4e3d138e7145d38599848eff23046
                                              SHA512:c8d1d32753e8fb9aaaf55a7d459601a6fa5f02f21a82fc9014fbcf860a9a529403aa73a4801eae7b81b5bb2413593a105f979f54eef3fcd214e256e0871ab6a0
                                              SSDEEP:384:Oj7VKV7jrNLxFw+E+rKpeZK/7vpofciV3QCGh0gUwwvuQ+LxHUG0oWjkgPe24ld6:AKV7jNxFVE4m7vCp2CoYuQKxHUXjkLK
                                              TLSH:17D2D17A6F80080DC26FF2F521AD089745A6A3DA0446F25A217E01DE44E69DF1FAF5AC
                                              File Content Preview:PK..........!.?&..............[Content_Types].xml...n.0............b....u..@..`$&../.J..}i;-.".W........LMo..U..dch.........e#.<..........l..I........Tqt.F....J.n....0.e......T......&.k.c(.J]:.1.....].n..=d2.AT?.....H.Y...j...T...j..9....u...X..wb.w.t..#2
                                              Icon Hash:1d356664a4a09519
                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                              2025-03-10T16:11:42.516820+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64969913.107.253.72443TCP
                                              2025-03-10T16:11:42.516820+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64970013.107.253.72443TCP
                                              2025-03-10T16:11:42.516820+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64969813.107.253.72443TCP
                                              2025-03-10T16:11:42.516820+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64969613.107.253.72443TCP
                                              2025-03-10T16:11:42.516820+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64969713.107.253.72443TCP
                                              2025-03-10T16:13:21.177200+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64968952.123.129.14443TCP
                                              2025-03-10T16:13:49.173500+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64969513.107.253.72443TCP
                                              TimestampSource PortDest PortSource IPDest IP
                                              Mar 10, 2025 16:12:21.220660925 CET49689443192.168.2.652.123.129.14
                                              Mar 10, 2025 16:12:21.220694065 CET4434968952.123.129.14192.168.2.6
                                              Mar 10, 2025 16:12:21.220766068 CET49689443192.168.2.652.123.129.14
                                              Mar 10, 2025 16:12:21.221096039 CET49689443192.168.2.652.123.129.14
                                              Mar 10, 2025 16:12:21.221106052 CET4434968952.123.129.14192.168.2.6
                                              Mar 10, 2025 16:13:21.177200079 CET49689443192.168.2.652.123.129.14
                                              Mar 10, 2025 16:13:27.731331110 CET49695443192.168.2.613.107.253.72
                                              Mar 10, 2025 16:13:27.731367111 CET4434969513.107.253.72192.168.2.6
                                              Mar 10, 2025 16:13:27.731443882 CET49695443192.168.2.613.107.253.72
                                              Mar 10, 2025 16:13:27.731781960 CET49695443192.168.2.613.107.253.72
                                              Mar 10, 2025 16:13:27.731796980 CET4434969513.107.253.72192.168.2.6
                                              Mar 10, 2025 16:13:49.173500061 CET49695443192.168.2.613.107.253.72
                                              Mar 10, 2025 16:13:49.404690981 CET49696443192.168.2.613.107.253.72
                                              Mar 10, 2025 16:13:49.404758930 CET4434969613.107.253.72192.168.2.6
                                              Mar 10, 2025 16:13:49.404860973 CET49696443192.168.2.613.107.253.72
                                              Mar 10, 2025 16:13:49.498198986 CET49697443192.168.2.613.107.253.72
                                              Mar 10, 2025 16:13:49.498281956 CET4434969713.107.253.72192.168.2.6
                                              Mar 10, 2025 16:13:49.498418093 CET49697443192.168.2.613.107.253.72
                                              Mar 10, 2025 16:13:49.740200996 CET49696443192.168.2.613.107.253.72
                                              Mar 10, 2025 16:13:49.740247011 CET4434969613.107.253.72192.168.2.6
                                              Mar 10, 2025 16:13:49.741084099 CET49697443192.168.2.613.107.253.72
                                              Mar 10, 2025 16:13:49.741133928 CET4434969713.107.253.72192.168.2.6
                                              Mar 10, 2025 16:13:49.744112968 CET49698443192.168.2.613.107.253.72
                                              Mar 10, 2025 16:13:49.744158983 CET4434969813.107.253.72192.168.2.6
                                              Mar 10, 2025 16:13:49.744229078 CET49698443192.168.2.613.107.253.72
                                              Mar 10, 2025 16:13:49.744452953 CET49698443192.168.2.613.107.253.72
                                              Mar 10, 2025 16:13:49.744463921 CET4434969813.107.253.72192.168.2.6
                                              Mar 10, 2025 16:13:49.745011091 CET49699443192.168.2.613.107.253.72
                                              Mar 10, 2025 16:13:49.745059013 CET4434969913.107.253.72192.168.2.6
                                              Mar 10, 2025 16:13:49.745114088 CET49699443192.168.2.613.107.253.72
                                              Mar 10, 2025 16:13:49.745286942 CET49699443192.168.2.613.107.253.72
                                              Mar 10, 2025 16:13:49.745301008 CET4434969913.107.253.72192.168.2.6
                                              Mar 10, 2025 16:13:49.747358084 CET49700443192.168.2.613.107.253.72
                                              Mar 10, 2025 16:13:49.747407913 CET4434970013.107.253.72192.168.2.6
                                              Mar 10, 2025 16:13:49.747462034 CET49700443192.168.2.613.107.253.72
                                              Mar 10, 2025 16:13:49.747627020 CET49700443192.168.2.613.107.253.72
                                              Mar 10, 2025 16:13:49.747647047 CET4434970013.107.253.72192.168.2.6
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Mar 10, 2025 16:12:21.219656944 CET1.1.1.1192.168.2.60x8294No error (0)ecs-office.s-0005.dual-s-msedge.nets-0005.dual-s-msedge.netCNAME (Canonical name)IN (0x0001)false
                                              Mar 10, 2025 16:12:21.219656944 CET1.1.1.1192.168.2.60x8294No error (0)s-0005.dual-s-msedge.net52.123.129.14A (IP address)IN (0x0001)false
                                              Mar 10, 2025 16:12:21.219656944 CET1.1.1.1192.168.2.60x8294No error (0)s-0005.dual-s-msedge.net52.123.128.14A (IP address)IN (0x0001)false
                                              Mar 10, 2025 16:13:27.730415106 CET1.1.1.1192.168.2.60xc52bNo error (0)shed.dual-low.s-part-0048.t-0009.t-msedge.netazurefd-t-fb-prod.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                                              Mar 10, 2025 16:13:27.730415106 CET1.1.1.1192.168.2.60xc52bNo error (0)azurefd-t-fb-prod.trafficmanager.netdual.s-part-0044.t-0009.fb-t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                              Mar 10, 2025 16:13:27.730415106 CET1.1.1.1192.168.2.60xc52bNo error (0)dual.s-part-0044.t-0009.fb-t-msedge.nets-part-0044.t-0009.fb-t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                              Mar 10, 2025 16:13:27.730415106 CET1.1.1.1192.168.2.60xc52bNo error (0)s-part-0044.t-0009.fb-t-msedge.net13.107.253.72A (IP address)IN (0x0001)false

                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:11:11:46
                                              Start date:10/03/2025
                                              Path:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Program Files (x86)\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
                                              Imagebase:0x7b0000
                                              File size:53'161'064 bytes
                                              MD5 hash:4A871771235598812032C822E6F68F19
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:false

                                              Target ID:8
                                              Start time:11:12:55
                                              Start date:10/03/2025
                                              Path:C:\Windows\splwow64.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\splwow64.exe 12288
                                              Imagebase:0x7ff6f2390000
                                              File size:163'840 bytes
                                              MD5 hash:77DE7761B037061C7C112FD3C5B91E73
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:false

                                              No disassembly