Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
R.D. Bitzer Co., Inc.xlsm

Overview

General Information

Sample name:R.D. Bitzer Co., Inc.xlsm
Analysis ID:1634051
MD5:f91a049a60e50bbf3dc141e4894a4d20
SHA1:0561d8cbbcb9063abb74c5442552fe9fde7c7b55
SHA256:e1f80b47cbbfd6f89f51578dfdae495affe300fec942535ea806b815e4bdcb0d
Infos:

Detection

Score:64
Range:0 - 100
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Document contains an embedded VBA macro with suspicious strings
Document contains an embedded VBA with functions possibly related to HTTP operations
Document contains an embedded VBA macro which executes code when the document is opened / closed
Document contains embedded VBA macros
Document misses a certain OLE stream usually present in this Microsoft Office document type
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Excel Network Connections
Sigma detected: Suspicious Office Outbound Connections
Unable to load, office file is protected or invalid

Classification

  • System is w11x64_office
  • EXCEL.EXE (PID: 7600 cmdline: "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding MD5: F9F7B6C42211B06E7AC3E4B60AA8FB77)
    • splwow64.exe (PID: 6932 cmdline: C:\Windows\splwow64.exe 12288 MD5: AF4A7EBF6114EE9E6FBCC910EC3C96E6)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Network ConnectionAuthor: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0", Tim Shelton: Data: DestinationIp: 2.22.242.89, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE, Initiated: true, ProcessId: 7600, Protocol: tcp, SourceIp: 192.168.2.25, SourceIsIpv6: false, SourcePort: 49741
Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.25, DestinationIsIpv6: false, DestinationPort: 49741, EventID: 3, Image: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE, Initiated: true, ProcessId: 7600, Protocol: tcp, SourceIp: 2.22.242.89, SourceIsIpv6: false, SourcePort: 443
Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE, ProcessId: 7600, TargetFilename: C:\Users\user\Desktop\~$R.D. Bitzer Co., Inc.xlsm
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: R.D. Bitzer Co., Inc.xlsmVirustotal: Detection: 16%Perma Link
Source: R.D. Bitzer Co., Inc.xlsmReversingLabs: Detection: 21%
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEDirectory created: C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xmlJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile opened: C:\Program Files\Microsoft Office\root\vfs\System\MSVCR100.dllJump to behavior
Source: global trafficTCP traffic: 192.168.2.25:49741 -> 2.22.242.89:443
Source: global trafficTCP traffic: 192.168.2.25:49741 -> 2.22.242.89:443
Source: global trafficTCP traffic: 192.168.2.25:49741 -> 2.22.242.89:443
Source: global trafficTCP traffic: 192.168.2.25:49742 -> 52.123.128.14:443
Source: global trafficTCP traffic: 192.168.2.25:49742 -> 52.123.128.14:443
Source: global trafficTCP traffic: 192.168.2.25:49742 -> 52.123.128.14:443
Source: global trafficTCP traffic: 192.168.2.25:49741 -> 2.22.242.89:443
Source: global trafficTCP traffic: 192.168.2.25:49742 -> 52.123.128.14:443
Source: global trafficTCP traffic: 192.168.2.25:49741 -> 2.22.242.89:443
Source: global trafficTCP traffic: 2.22.242.89:443 -> 192.168.2.25:49741
Source: global trafficTCP traffic: 192.168.2.25:49741 -> 2.22.242.89:443
Source: global trafficTCP traffic: 192.168.2.25:49741 -> 2.22.242.89:443
Source: global trafficTCP traffic: 2.22.242.89:443 -> 192.168.2.25:49741
Source: global trafficTCP traffic: 192.168.2.25:49742 -> 52.123.128.14:443
Source: global trafficTCP traffic: 52.123.128.14:443 -> 192.168.2.25:49742
Source: global trafficTCP traffic: 192.168.2.25:49742 -> 52.123.128.14:443
Source: global trafficTCP traffic: 192.168.2.25:49742 -> 52.123.128.14:443
Source: global trafficTCP traffic: 52.123.128.14:443 -> 192.168.2.25:49742
Source: global trafficTCP traffic: 192.168.2.25:49741 -> 2.22.242.89:443
Source: global trafficTCP traffic: 192.168.2.25:49742 -> 52.123.128.14:443
Source: Joe Sandbox ViewIP Address: 52.123.128.14 52.123.128.14
Source: Primary1741627134649814500_F9D14BC6-EFAF-4443-8196-DB109BAE6AE0.log.0.drString found in binary or memory: https://res.cdn.office.net/mro1cdnstorage/fonts/prod/4.40/flatfontassets.pkg
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443

System Summary

barindex
Source: screenshotOCR: Enable Editing" button at the yellow bar and then click 'Enable content". Microsoft Excel Compatibil
Source: screenshotOCR: Enable content". Microsoft Excel Compatibility We're sorry, something went wrong. This spreadsheet i
Source: screenshotOCR: Enable Editing" button at the yellow bar and then click 'Enable content". Sheetl Ready t Accessibili
Source: screenshotOCR: Enable content". Sheetl Ready t Accessibility: Good to go 13119 ENG Q Search Bewlkt 10/03/2025
Source: screenshotOCR: Enable Editing" button at the yellow bar and then click 'Enable content". Windows Security Windows S
Source: screenshotOCR: Enable content". Windows Security Windows Security Turn on Windows Firewall Windows Firewall is turn
Source: screenshotOCR: Enable Editing" button at the yellow bar and then click 'Enable content". Sheetl Ready t Accessibili
Source: screenshotOCR: Enable content". Sheetl Ready t Accessibility: Good to go 13119 ENG Q Search Bewlkt 10/03/2025
Source: screenshotOCR: Enable Editing" button at the yellow bar and then click 'Enable content". Sheetl Ready t Accessibili
Source: screenshotOCR: Enable content". Sheetl Ready t Accessibility: Good to go 13119 ENG Q Search Bewlkt 10/03/2025
Source: screenshotOCR: Enable Editing" button at the yellow bar and then click 'Enable content". Sheetl Ready t Accessibili
Source: screenshotOCR: Enable content". Sheetl Ready t Accessibility: Good to go 13119 ENG Q Search Bewlkt 10/03/2025
Source: B6240000.0.drOLE, VBA macro line: Set MOFOFXRPSPFOWBELNZW = JJLCEKWKKOTCAWWFGRO.CreateTextFile(RIYTFQPORBNBYTVTK)
Source: B6240000.0.drStream path 'VBA/Module1' : found possibly 'XMLHttpRequest' functions response, responsetext, open, send
Source: B6240000.0.drOLE, VBA macro line: Private Sub Workbook_Open()
Source: B6240000.0.drOLE indicator, VBA macros: true
Source: ~DFC54C30DDB6AC8582.TMP.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEWindow title found: microsoft excel compatibility okwe're sorry something went wrong. this spreedsheet is protected by information rights management or in a format not supported by excel services.
Source: classification engineClassification label: mal64.expl.winXLSM@3/11@0/2
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xmlJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Users\user\Desktop\~$R.D. Bitzer Co., Inc.xlsmJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\{F9D14BC6-EFAF-4443-8196-DB109BAE6AE0} - OProcSessId.datJump to behavior
Source: B6240000.0.drOLE indicator, Workbook stream: true
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: R.D. Bitzer Co., Inc.xlsmVirustotal: Detection: 16%
Source: R.D. Bitzer Co., Inc.xlsmReversingLabs: Detection: 21%
Source: unknownProcess created: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288Jump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{88d96a0f-f192-11d4-a65f-0040963251e5}\InProcServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: B6240000.0.drInitial sample: OLE zip file path = xl/media/image1.png
Source: B6240000.0.drInitial sample: OLE zip file path = docProps/custom.xml
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\CommonJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEDirectory created: C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xmlJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile opened: C:\Program Files\Microsoft Office\root\vfs\System\MSVCR100.dllJump to behavior
Source: ~DFC54C30DDB6AC8582.TMP.0.drInitial sample: OLE indicators vbamacros = False
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeWindow / User API: threadDelayed 910Jump to behavior
Source: C:\Windows\splwow64.exeLast function: Thread delayed
Source: C:\Windows\splwow64.exeLast function: Thread delayed
Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information queried: ProcessInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information22
Scripting
Valid Accounts2
Exploitation for Client Execution
22
Scripting
1
Process Injection
3
Masquerading
OS Credential Dumping1
Process Discovery
Remote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Disable or Modify Tools
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media11
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Virtualization/Sandbox Evasion
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Process Injection
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
R.D. Bitzer Co., Inc.xlsm17%VirustotalBrowse
R.D. Bitzer Co., Inc.xlsm21%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
a726.dscd.akamai.net
2.22.242.89
truefalse
    high
    s-0005.dual-s-msedge.net
    52.123.128.14
    truefalse
      high
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      2.22.242.89
      a726.dscd.akamai.netEuropean Union
      20940AKAMAI-ASN1EUfalse
      52.123.128.14
      s-0005.dual-s-msedge.netUnited States
      8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
      Joe Sandbox version:42.0.0 Malachite
      Analysis ID:1634051
      Start date and time:2025-03-10 18:17:57 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 4m 51s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:defaultwindowsofficecookbook.jbs
      Analysis system description:Windows 11 23H2 with Office Professional Plus 2021, Chrome 131, Firefox 133, Adobe Reader DC 24, Java 8 Update 431, 7zip 24.09
      Run name:Potential for more IOCs and behavior
      Number of analysed new started processes analysed:15
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:R.D. Bitzer Co., Inc.xlsm
      Detection:MAL
      Classification:mal64.expl.winXLSM@3/11@0/2
      Cookbook Comments:
      • Found application associated with file extension: .xlsm
      • Found Word or Excel or PowerPoint or XPS Viewer
      • Attach to Office via COM
      • Scroll down
      • Close Viewer
      • Exclude process from analysis (whitelisted): SecurityHealthHost.exe, dllhost.exe, sppsvc.exe, RuntimeBroker.exe, ShellExperienceHost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 52.109.28.46, 52.109.76.243, 52.109.76.144, 20.189.173.27
      • Excluded domains from analysis (whitelisted): neu-azsc-000.odc.officeapps.live.com, odc.officeapps.live.com, slscr.update.microsoft.com, europe.odcsm1.live.com.akadns.net, res-1.cdn.office.net, eur.roaming1.live.com.akadns.net, neu-azsc-000.roaming.officeapps.live.com, mobile.events.data.microsoft.com, roaming.officeapps.live.com, dual-s-0005-office.config.skype.com, login.live.com, otelrules.svc.static.microsoft, onedscolprdwus21.westus.cloudapp.azure.com, officeclient.microsoft.com, osiprod-neu-bronze-azsc-000.northeurope.cloudapp.azure.com, assets.msn.com, ecs.office.com, client.wns.windows.com, fs.microsoft.com, browser.events.data.msn.cn, prod.configsvc1.live.com.akadns.net, prod.roaming1.live.com.akadns.net, res-stls-prod.edgesuite.net, res-prod.trafficmanager.net, config.officeapps.live.com, osiprod-neu-buff-azsc-000.northeurope.cloudapp.azure.com, ecs.office.trafficmanager.net, res.cdn.office.net, europe.configsvc1.live.com.akadns.net, prod.odcsm1.live.com.akadns.net, mobile.events.data.trafficmanager
      • Report size getting too big, too many NtCreateKey calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      • Report size getting too big, too many NtReadVirtualMemory calls found.
      TimeTypeDescription
      13:19:55API Interceptor935x Sleep call for process: splwow64.exe modified
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      2.22.242.89https://1drv.ms/f/s!AjoVkDIsGnpOd7LuARNPe9SBPXk?e=Pdaap6Get hashmaliciousUnknownBrowse
        updater.exeGet hashmaliciousVidarBrowse
          https://autheanfication-proconnexion.inovaperf.me/Get hashmaliciousUnknownBrowse
            Projects.Docu013825#.xlsxGet hashmaliciousUnknownBrowse
              52.123.128.14Fw Invitation for Eligibilitytrackingcalculators to Participate in Asset Growth.msgGet hashmaliciousUnknownBrowse
                221036299-043825-sanlccjavap0004-6531.xlsGet hashmaliciousUnknownBrowse
                  phish_alert_sp2_2.0.0.0.emlGet hashmaliciousHTMLPhisherBrowse
                    desaremix.exeGet hashmaliciousKillMBRBrowse
                      desaremix.exeGet hashmaliciousKillMBRBrowse
                        phish_alert_sp2_2.0.0.0.msgGet hashmaliciousunknownBrowse
                          Urgent Suspicious Scam Email.emlGet hashmaliciousUnknownBrowse
                            phish_alert_iocp_v1.4.48 - 2025-03-04T101341.702.emlGet hashmaliciousUnknownBrowse
                              FW_ RE_ Financials for Krohns Appliance (#Ud83d#Udceb Action Required).msgGet hashmaliciousUnknownBrowse
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                s-0005.dual-s-msedge.netFw Invitation for Eligibilitytrackingcalculators to Participate in Asset Growth.msgGet hashmaliciousUnknownBrowse
                                • 52.123.128.14
                                Would you please take a look at this for Miss Robin.msgGet hashmaliciousUnknownBrowse
                                • 52.123.129.14
                                R.D. Bitzer Co. Inc.xlsmGet hashmaliciousUnknownBrowse
                                • 52.123.129.14
                                inbound CaIIer left (2) 0033secsCaII__[MSG-ID-df8a922f18abc71f9a730a93c234d77c.emlGet hashmaliciousUnknownBrowse
                                • 52.123.129.14
                                221036299-043825-sanlccjavap0004-6531.xlsGet hashmaliciousUnknownBrowse
                                • 52.123.128.14
                                221036299-043825-sanlccjavap0004-6531.xlsGet hashmaliciousUnknownBrowse
                                • 52.123.128.14
                                L#U00f6senordet f#U00f6r tommy.mobrin@skolverket.se g#U00e5r ut idag!.msgGet hashmaliciousUnknownBrowse
                                • 52.123.129.14
                                FW 188355..msgGet hashmaliciousHTMLPhisherBrowse
                                • 52.123.129.14
                                Message.emlGet hashmaliciousUnknownBrowse
                                • 52.123.129.14
                                a726.dscd.akamai.netR.D. Bitzer Co. Inc.xlsmGet hashmaliciousUnknownBrowse
                                • 2.22.242.120
                                221036299-043825-sanlccjavap0004-6531.xlsGet hashmaliciousUnknownBrowse
                                • 2.22.242.90
                                Orange county sheriffs office Reference Number(s)_FLD9390700107 (SOP 00900) Note(s).docxGet hashmaliciousUnknownBrowse
                                • 2.22.242.128
                                Message.emlGet hashmaliciousUnknownBrowse
                                • 2.22.242.130
                                POETDB24-25771.xla.xlsxGet hashmaliciousUnknownBrowse
                                • 2.16.164.32
                                Purchase Inquiry.xla.xlsxGet hashmaliciousUnknownBrowse
                                • 2.16.164.25
                                Purchase Order No 1417.docGet hashmaliciousUnknownBrowse
                                • 2.16.202.96
                                Purchase Order No 1417.docGet hashmaliciousUnknownBrowse
                                • 2.16.164.9
                                f492136216_mpengine_dllGet hashmaliciousUnknownBrowse
                                • 2.22.242.98
                                RFQ-JC25-#595837.xlsxGet hashmaliciousUnknownBrowse
                                • 2.19.11.111
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                AKAMAI-ASN1EUOnline Notification.pdfGet hashmaliciousHTMLPhisherBrowse
                                • 88.221.110.145
                                https://dc1.convertc.com/event/v1/80401460/82362114/recentpurc/208463838.0153674575/6/cV9sU2Hc/B751BVZb/X.wgBlUMmEtoL7lLreHRS.dIbQhLbIKHVgjj1IvzEh_5AuOYVcDstYG0DCzEP9XO2LU-/click?url=https://gamma.app/docs/Sayer-Regan-Thayer-LLP-siiq7nvr7y2s7k4?mode=present#card-um3vy81gbcrpf02Get hashmaliciousUnknownBrowse
                                • 2.16.164.59
                                R.D. Bitzer Co. Inc.xlsmGet hashmaliciousUnknownBrowse
                                • 2.22.242.120
                                Clementine.exe1.exeGet hashmaliciousLummaC StealerBrowse
                                • 23.197.127.21
                                Orange county sheriffs office Reference Number(s)_FLD9390700107 (SOP 00900) Note(s).docxGet hashmaliciousUnknownBrowse
                                • 2.22.242.128
                                Loader.exeGet hashmaliciousLummaC StealerBrowse
                                • 23.197.127.21
                                MDE_File_Sample_e8e8075e078f22844c0c37941f5d76e693e83914.zipGet hashmaliciousUnknownBrowse
                                • 88.221.110.91
                                wanscam software ocx setup download.exeGet hashmaliciousUnknownBrowse
                                • 23.197.127.21
                                wanscam software ocx setup download.exeGet hashmaliciousUnknownBrowse
                                • 23.197.127.21
                                https://courtyard.mspage.digitalGet hashmaliciousHTMLPhisherBrowse
                                • 23.213.161.198
                                MICROSOFT-CORP-MSN-AS-BLOCKUSFw Invitation for Eligibilitytrackingcalculators to Participate in Asset Growth.msgGet hashmaliciousUnknownBrowse
                                • 104.208.16.95
                                https://tjjrotk.bishirian.my/Get hashmaliciousHTMLPhisherBrowse
                                • 40.114.177.156
                                Theresa Badham_blmgmxdkjbwlx.htmlGet hashmaliciousUnknownBrowse
                                • 40.114.177.156
                                Online Notification.pdfGet hashmaliciousHTMLPhisherBrowse
                                • 13.107.42.14
                                Would you please take a look at this for Miss Robin.msgGet hashmaliciousUnknownBrowse
                                • 52.123.129.14
                                R.D. Bitzer Co. Inc.xlsmGet hashmaliciousUnknownBrowse
                                • 52.123.131.14
                                R.D. Bitzer Co. Inc.xlsmGet hashmaliciousUnknownBrowse
                                • 52.123.129.14
                                inbound CaIIer left (2) 0033secsCaII__[MSG-ID-df8a922f18abc71f9a730a93c234d77c.emlGet hashmaliciousUnknownBrowse
                                • 52.123.129.14
                                221036299-043825-sanlccjavap0004-6531.xlsGet hashmaliciousUnknownBrowse
                                • 52.123.128.14
                                No context
                                No context
                                Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):118
                                Entropy (8bit):3.5700810731231707
                                Encrypted:false
                                SSDEEP:3:QaklTlAlXMLLmHlIlFLlmIK/5lTn84vlJlhlXlDHlA6l3l6Als:QFulcLk04/5p8GVz6QRq
                                MD5:573220372DA4ED487441611079B623CD
                                SHA1:8F9D967AC6EF34640F1F0845214FBC6994C0CB80
                                SHA-256:BE84B842025E4241BFE0C9F7B8F86A322E4396D893EF87EA1E29C74F47B6A22D
                                SHA-512:F19FA3583668C3AF92A9CEF7010BD6ECEC7285F9C8665F2E9528DBA606F105D9AF9B1DB0CF6E7F77EF2E395943DC0D5CB37149E773319078688979E4024F9DD7
                                Malicious:false
                                Reputation:high, very likely benign file
                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.H.e.a.r.t.b.e.a.t.C.a.c.h.e./.>.
                                Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                File Type:data
                                Category:dropped
                                Size (bytes):20971520
                                Entropy (8bit):8.112143835430977E-5
                                Encrypted:false
                                SSDEEP:3:Tuekk9NJtHFfs1XsExe/t:qeVJ8
                                MD5:AFDEAC461EEC32D754D8E6017E845D21
                                SHA1:5D0874C19B70638A0737696AEEE55BFCC80D7ED8
                                SHA-256:3A96B02F6A09F6A6FAC2A44A5842FF9AEB17EB4D633E48ABF6ADDF6FB447C7E2
                                SHA-512:CAB6B8F9FFDBD80210F42219BAC8F1124D6C0B6995C5128995F7F48CED8EF0F2159EA06A2CD09B1FDCD409719F94A7DB437C708D3B1FDA01FDC80141A4595FC7
                                Malicious:false
                                Reputation:moderate, very likely benign file
                                Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                File Type:data
                                Category:dropped
                                Size (bytes):20971520
                                Entropy (8bit):0.0
                                Encrypted:false
                                SSDEEP:3::
                                MD5:8F4E33F3DC3E414FF94E5FB6905CBA8C
                                SHA1:9674344C90C2F0646F0B78026E127C9B86E3AD77
                                SHA-256:CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC
                                SHA-512:7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB
                                Malicious:false
                                Reputation:high, very likely benign file
                                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                File Type:ASCII text, with very long lines (28778), with CRLF line terminators
                                Category:dropped
                                Size (bytes):20971520
                                Entropy (8bit):0.2061391279825819
                                Encrypted:false
                                SSDEEP:1536:YyzhYAYThHvgpBCiF+vIychg/j/3hk4LndmzCqSQYAVS1+gtd1+C7003jrvUEqOd:llYzoqiF5yAgSknwE9Kf1hF6n
                                MD5:5C4EEC608F94D5D941512F2D6A0DF24C
                                SHA1:36C6F2730F55B8691CA6AA655075825640F12F14
                                SHA-256:6D451B07877711CE5FDB25F988FD9771B1BE31ADC4BE431A22462C40F55EC317
                                SHA-512:5F78EEE4388CE3167CF21EBC1FE227D97185B5647C023085008E93512F3471A635FA932BFD2F19CDFAA597EE4FDFAF0034C301DCC71F020680B72D5FB06AEE88
                                Malicious:false
                                Reputation:low
                                Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation..03/10/2025 17:18:54.662.EXCEL (0x1DB0).0x1E00.Microsoft Excel.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Experimentation.FeatureQueryBatched","Flags":33777005812056321,"InternalSequenceNumber":17,"Time":"2025-03-10T17:18:54.662Z","Data.Sequence":0,"Data.Count":128,"Data.Features":"[ { \"ID\" : 1, \"N\" : \"Microsoft.Office.Telemetry.TrackCPSWrites\", \"V\" : false, \"S\" : 1, \"P\" : 0, \"T\" : \"2025-03-10T17:18:54.4593825Z\", \"C\" : \"33\", \"Q\" : 0.0, \"M\" : 0, \"F\" : 5 }, { \"ID\" : 1, \"N\" : \"Microsoft.Office.Telemetry.CPSMaxWrites\", \"V\" : 2, \"S\" : 1, \"P\" : 0, \"T\" : \"2025-03-10T17:18:54.4593825Z\", \"C\" : \"33\", \"Q\" : 0.0, \"M\" : 0, \"F\" : 5 }, { \"ID\" : 1, \"N\" : \"Microsoft.Office.Word.UAEOnSafeModeEnabled\", \"V\" : true, \"S\" : 1, \"P\" : 0, \"T\" : \"2025-03-10T17:18:54.4593825Z\", \"C\" : \"\", \"Q\" : 7.0, \"M\" : 0, \"F\" : 5, \"G\" : \"Opt\" }, { \"ID\" : 1, \"
                                Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                File Type:data
                                Category:dropped
                                Size (bytes):20971520
                                Entropy (8bit):0.0
                                Encrypted:false
                                SSDEEP:3::
                                MD5:8F4E33F3DC3E414FF94E5FB6905CBA8C
                                SHA1:9674344C90C2F0646F0B78026E127C9B86E3AD77
                                SHA-256:CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC
                                SHA-512:7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB
                                Malicious:false
                                Reputation:high, very likely benign file
                                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                File Type:Composite Document File V2 Document, Cannot read section info
                                Category:dropped
                                Size (bytes):32768
                                Entropy (8bit):4.520457860974817
                                Encrypted:false
                                SSDEEP:384:8/3k4ClKnPqxG8Omkp+krEI3H0/dSkdIFW1TpHwNi:K3kMnPygLpjrHH0/wkdIFW1V
                                MD5:4798AE95AD8F72427D3DDF10B29DC575
                                SHA1:178D004287F7D989BB4ABB19A3535DE5C80974E2
                                SHA-256:4926CE7AEE7A9930ED123390D8D3116978333AE8DA55844E2560E9BCCBAEA1FE
                                SHA-512:5972835EFDD213C432A11ED49B75D493A8D9A90DCFFCE5E9A9347BDC395D429EDD6A51691B6421764E531CF373579815ABCB33D15D134871AF128F2E8A74F92C
                                Malicious:false
                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                File Type:Microsoft Excel 2007+
                                Category:modified
                                Size (bytes):38364
                                Entropy (8bit):7.735443349862049
                                Encrypted:false
                                SSDEEP:768:YxGzxKj7McCpp/txkw30ZbLlOBl8ktEmd0xcXRwtrTBqNjd4tDIn:YxGzxBcCpJtj0ZnMBqzmd0xuw/qBP
                                MD5:234AFFE5EB059FF30FDE2D8C41CFFAD8
                                SHA1:72DF2338BD940183393956651A8C1929649E4485
                                SHA-256:8597E450289889B106F21711800ADA395F7C62324AD2AE7158A022A83BA6BB8F
                                SHA-512:4A80046F14800675B7C64990BDE1F43878AADC9AD72103EFF6A44EE9CB6CDC02CFE63ECE0397CD04F7ECE02EF87BC4981C40511306EA5A0AD307752A42B76793
                                Malicious:false
                                Preview:PK..........!.?&..............[Content_Types].xml ...(....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................T.n.0....?..."......C....M?`M.-.|.K;..w.H......H........f.]..L6.F\..0.hlX7........@0.b.F...........*......U).-z ...>Y...g^..z.kT.f..J.P0..t.b1..+.R..y{P..AT..:.F@J.j(,T...ZY.r.......B..Ka....NL..<".....I.c..#{...D........._\.l.Vw..O.l..;...f..F...].F'.E,...6..!;.6<*<..G.._..|a.P$...s.%..`z0.d.I...Q.b..K.a&.....;g;.N1......[.....=..dx.$.qq..#.9^.&..xDd|...M.E..0..Omx.?1.|.....0...zK%.....#..........PK.....
                                Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):26
                                Entropy (8bit):3.95006375643621
                                Encrypted:false
                                SSDEEP:3:ggPYV:rPYV
                                MD5:187F488E27DB4AF347237FE461A079AD
                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                Malicious:false
                                Preview:[ZoneTransfer]....ZoneId=0
                                Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                File Type:Microsoft Excel 2007+
                                Category:dropped
                                Size (bytes):38364
                                Entropy (8bit):7.735443349862049
                                Encrypted:false
                                SSDEEP:768:YxGzxKj7McCpp/txkw30ZbLlOBl8ktEmd0xcXRwtrTBqNjd4tDIn:YxGzxBcCpJtj0ZnMBqzmd0xuw/qBP
                                MD5:234AFFE5EB059FF30FDE2D8C41CFFAD8
                                SHA1:72DF2338BD940183393956651A8C1929649E4485
                                SHA-256:8597E450289889B106F21711800ADA395F7C62324AD2AE7158A022A83BA6BB8F
                                SHA-512:4A80046F14800675B7C64990BDE1F43878AADC9AD72103EFF6A44EE9CB6CDC02CFE63ECE0397CD04F7ECE02EF87BC4981C40511306EA5A0AD307752A42B76793
                                Malicious:true
                                Preview:PK..........!.?&..............[Content_Types].xml ...(....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................T.n.0....?..."......C....M?`M.-.|.K;..w.H......H........f.]..L6.F\..0.hlX7........@0.b.F...........*......U).-z ...>Y...g^..z.kT.f..J.P0..t.b1..+.R..y{P..AT..:.F@J.j(,T...ZY.r.......B..Ka....NL..<".....I.c..#{...D........._\.l.Vw..O.l..;...f..F...].F'.E,...6..!;.6<*<..G.._..|a.P$...s.%..`z0.d.I...Q.b..K.a&.....;g;.N1......[.....=..dx.$.qq..#.9^.&..xDd|...M.E..0..Omx.?1.|.....0...zK%.....#..........PK.....
                                Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                File Type:data
                                Category:dropped
                                Size (bytes):165
                                Entropy (8bit):1.4377382811115937
                                Encrypted:false
                                SSDEEP:3:EVANFN:EqfN
                                MD5:359140EB88A757E2BBEF2F7D32DCC4E5
                                SHA1:FD16035441ADF907BBFC594A96470C202E265067
                                SHA-256:42CDE461F058A0C6F6C5A69BD1D21114CD55929011C77BCB9A025B9CA43ED71F
                                SHA-512:9ADF6AC24E55AA161D2FFA1AC3BBBF03A7028DEFD8E1722FA52CAF7C730F7CF8AAE2073A50FD8AA004AF46E9A578A3B8088DD89415368E64E1916367CE126741
                                Malicious:true
                                Preview:.user ..M.e.r.c.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):646
                                Entropy (8bit):4.431068085028775
                                Encrypted:false
                                SSDEEP:12:LYaBFN89D71CdL/Hqm6v+/8WJezEkDvwZkniUSvWrBk8JAg6ee:L5DOkLv6zEPZkniUSOrRJQ
                                MD5:7111BFA692A22E4B3C07F1E6C6FF6F72
                                SHA1:297E8C4E4CFBCE24AAEDE0C1F11BDFF5AD6B9D37
                                SHA-256:10BF6E15C08C8C7F5D96B658BAB78AED86D1DE20F08E7871EEFBA0939AF11A02
                                SHA-512:C2E50510263E102FACC076B9981893B54DFD7F18672429B4709ED4A5A6889F2EF2CBE05C03EF55BBD90F20AF7C54FF654ED9126E78F08B775E7E1DF81DEE081D
                                Malicious:false
                                Preview:-------------------------------------------------------------------------..GMREADME.TXT..Copyright (c) 1998-2000 Microsoft Corporation. All Rights Reserved...------------....The GM.DLS file contains the Roland SoundCanvas Sound Set which is ..protected under the following copyright: ..Roland GS Sound Set/Microsoft (P) 1996 Roland Corporation U.S. ..The Roland SoundCanvas Sound Set is licensed under Microsoft's ..End User License Agreement for use with Microsoft operating ..system products only. All other uses require a separate written ..license from Roland.....-------------------------------------------------------------------------..
                                File type:Microsoft OOXML
                                Entropy (8bit):7.947830095260193
                                TrID:
                                • Excel Microsoft Office Open XML Format document with Macro (52504/1) 54.97%
                                • Excel Microsoft Office Open XML Format document (35004/1) 36.65%
                                • ZIP compressed archive (8000/1) 8.38%
                                File name:R.D. Bitzer Co., Inc.xlsm
                                File size:30'111 bytes
                                MD5:f91a049a60e50bbf3dc141e4894a4d20
                                SHA1:0561d8cbbcb9063abb74c5442552fe9fde7c7b55
                                SHA256:e1f80b47cbbfd6f89f51578dfdae495affe300fec942535ea806b815e4bdcb0d
                                SHA512:b09f938b9e3bf0ebda799862ffa5b02164e64921a450b68f0f61b0ce23aeffd95ff1b1efdf02eea99b3dba03b957b1fb26fd0a81bab806c79d967b7a1f0664e4
                                SSDEEP:384:Oj0XMN7jEdjhYNQ44uOwFzIx/lxA1oc0zZ4NZlAtOTDN85wwvuQ+LxHUG0oWjkg+:ENEdjrLuO//liyZGweDWuQKxHUXjkh/
                                TLSH:BAD2F171A105051AE6BF53B1498A04EED7CE9CC429A335CA2CCD11E88841AC7AFEF7DC
                                File Content Preview:PK..........!.?&..............[Content_Types].xml...n.0............b....u..@..`$&../.J..}i;-.".W........LMo..U..dch.........e#.<..........l..I........Tqt.F....J.n....0.e......T......&.k.c(.J]:.1.....].n..=d2.AT?.....H.Y...j...T...j..9....u...X..wb.w.t..#2
                                Icon Hash:1d356664a4a09519
                                TimestampSource PortDest PortSource IPDest IP
                                Mar 10, 2025 18:19:27.796886921 CET49741443192.168.2.252.22.242.89
                                Mar 10, 2025 18:19:27.796928883 CET443497412.22.242.89192.168.2.25
                                Mar 10, 2025 18:19:27.796977043 CET49741443192.168.2.252.22.242.89
                                Mar 10, 2025 18:19:27.797301054 CET49741443192.168.2.252.22.242.89
                                Mar 10, 2025 18:19:27.797312021 CET443497412.22.242.89192.168.2.25
                                Mar 10, 2025 18:19:27.798619986 CET49742443192.168.2.2552.123.128.14
                                Mar 10, 2025 18:19:27.798640966 CET4434974252.123.128.14192.168.2.25
                                Mar 10, 2025 18:19:27.798737049 CET49742443192.168.2.2552.123.128.14
                                Mar 10, 2025 18:19:27.799242020 CET49742443192.168.2.2552.123.128.14
                                Mar 10, 2025 18:19:27.799252033 CET4434974252.123.128.14192.168.2.25
                                Mar 10, 2025 18:20:27.693259954 CET49741443192.168.2.252.22.242.89
                                Mar 10, 2025 18:20:27.693305969 CET49742443192.168.2.2552.123.128.14
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Mar 10, 2025 18:19:27.795941114 CET1.1.1.1192.168.2.250xe850No error (0)res-stls-prod.edgesuite.net.globalredir.akadns88.neta726.dscd.akamai.netCNAME (Canonical name)IN (0x0001)false
                                Mar 10, 2025 18:19:27.795941114 CET1.1.1.1192.168.2.250xe850No error (0)a726.dscd.akamai.net2.22.242.89A (IP address)IN (0x0001)false
                                Mar 10, 2025 18:19:27.795941114 CET1.1.1.1192.168.2.250xe850No error (0)a726.dscd.akamai.net2.22.242.113A (IP address)IN (0x0001)false
                                Mar 10, 2025 18:19:27.795941114 CET1.1.1.1192.168.2.250xe850No error (0)a726.dscd.akamai.net2.22.242.128A (IP address)IN (0x0001)false
                                Mar 10, 2025 18:19:27.795941114 CET1.1.1.1192.168.2.250xe850No error (0)a726.dscd.akamai.net2.22.242.112A (IP address)IN (0x0001)false
                                Mar 10, 2025 18:19:27.795941114 CET1.1.1.1192.168.2.250xe850No error (0)a726.dscd.akamai.net2.22.242.144A (IP address)IN (0x0001)false
                                Mar 10, 2025 18:19:27.797596931 CET1.1.1.1192.168.2.250x3b8cNo error (0)ecs-office.s-0005.dual-s-msedge.nets-0005.dual-s-msedge.netCNAME (Canonical name)IN (0x0001)false
                                Mar 10, 2025 18:19:27.797596931 CET1.1.1.1192.168.2.250x3b8cNo error (0)s-0005.dual-s-msedge.net52.123.128.14A (IP address)IN (0x0001)false
                                Mar 10, 2025 18:19:27.797596931 CET1.1.1.1192.168.2.250x3b8cNo error (0)s-0005.dual-s-msedge.net52.123.129.14A (IP address)IN (0x0001)false

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:13:18:54
                                Start date:10/03/2025
                                Path:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                Wow64 process (32bit):false
                                Commandline:"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
                                Imagebase:0x7ff6c9560000
                                File size:70'082'712 bytes
                                MD5 hash:F9F7B6C42211B06E7AC3E4B60AA8FB77
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:moderate
                                Has exited:false

                                Target ID:8
                                Start time:13:19:55
                                Start date:10/03/2025
                                Path:C:\Windows\splwow64.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\splwow64.exe 12288
                                Imagebase:0x7ff6acc00000
                                File size:192'512 bytes
                                MD5 hash:AF4A7EBF6114EE9E6FBCC910EC3C96E6
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:moderate
                                Has exited:false

                                No disassembly