Windows
Analysis Report
R.D. Bitzer Co., Inc.xlsm
Overview
General Information
Detection
Score: | 64 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Classification
- System is w11x64_office
EXCEL.EXE (PID: 7600 cmdline:
"C:\Progra m Files\Mi crosoft Of fice\Root\ Office16\E XCEL.EXE" /automatio n -Embeddi ng MD5: F9F7B6C42211B06E7AC3E4B60AA8FB77) splwow64.exe (PID: 6932 cmdline:
C:\Windows \splwow64. exe 12288 MD5: AF4A7EBF6114EE9E6FBCC910EC3C96E6)
- cleanup
System Summary |
---|
Source: | Author: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0", Tim Shelton: |
Source: | Author: X__Junior (Nextron Systems): |
Source: | Author: Nasreddine Bencherchali (Nextron Systems): |
Click to jump to signature section
AV Detection |
---|
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Directory created: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | IP Address: |
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
System Summary |
---|
Source: | OCR: | ||
Source: | OCR: | ||
Source: | OCR: | ||
Source: | OCR: | ||
Source: | OCR: | ||
Source: | OCR: | ||
Source: | OCR: | ||
Source: | OCR: | ||
Source: | OCR: | ||
Source: | OCR: | ||
Source: | OCR: | ||
Source: | OCR: |
Source: | OLE, VBA macro line: |
Source: | Stream path 'VBA/Module1' : |
Source: | OLE, VBA macro line: |
Source: | OLE indicator, VBA macros: |
Source: | OLE stream indicators for Word, Excel, PowerPoint, and Visio: |
Source: | Window title found: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | OLE indicator, Workbook stream: |
Source: | File read: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Window detected: |
Source: | Initial sample: | ||
Source: | Initial sample: |
Source: | Key opened: | Jump to behavior |
Source: | Directory created: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Initial sample: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Window / User API: | Jump to behavior |
Source: | Last function: | ||
Source: | Last function: |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | 22 Scripting | Valid Accounts | 2 Exploitation for Client Execution | 22 Scripting | 1 Process Injection | 3 Masquerading | OS Credential Dumping | 1 Process Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Disable or Modify Tools | LSASS Memory | 1 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | 11 Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Virtualization/Sandbox Evasion | Security Account Manager | 1 Application Window Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Process Injection | NTDS | 1 File and Directory Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | 1 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
17% | Virustotal | Browse | ||
21% | ReversingLabs |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
a726.dscd.akamai.net | 2.22.242.89 | true | false | high | |
s-0005.dual-s-msedge.net | 52.123.128.14 | true | false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
2.22.242.89 | a726.dscd.akamai.net | European Union | 20940 | AKAMAI-ASN1EU | false | |
52.123.128.14 | s-0005.dual-s-msedge.net | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1634051 |
Start date and time: | 2025-03-10 18:17:57 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 51s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsofficecookbook.jbs |
Analysis system description: | Windows 11 23H2 with Office Professional Plus 2021, Chrome 131, Firefox 133, Adobe Reader DC 24, Java 8 Update 431, 7zip 24.09 |
Run name: | Potential for more IOCs and behavior |
Number of analysed new started processes analysed: | 15 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | R.D. Bitzer Co., Inc.xlsm |
Detection: | MAL |
Classification: | mal64.expl.winXLSM@3/11@0/2 |
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): SecurityHealthHost.exe, dllhost.exe, sppsvc.exe, RuntimeBroker.exe, ShellExperienceHost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 52.109.28.46, 52.109.76.243, 52.109.76.144, 20.189.173.27
- Excluded domains from analysis (whitelisted): neu-azsc-000.odc.officeapps.live.com, odc.officeapps.live.com, slscr.update.microsoft.com, europe.odcsm1.live.com.akadns.net, res-1.cdn.office.net, eur.roaming1.live.com.akadns.net, neu-azsc-000.roaming.officeapps.live.com, mobile.events.data.microsoft.com, roaming.officeapps.live.com, dual-s-0005-office.config.skype.com, login.live.com, otelrules.svc.static.microsoft, onedscolprdwus21.westus.cloudapp.azure.com, officeclient.microsoft.com, osiprod-neu-bronze-azsc-000.northeurope.cloudapp.azure.com, assets.msn.com, ecs.office.com, client.wns.windows.com, fs.microsoft.com, browser.events.data.msn.cn, prod.configsvc1.live.com.akadns.net, prod.roaming1.live.com.akadns.net, res-stls-prod.edgesuite.net, res-prod.trafficmanager.net, config.officeapps.live.com, osiprod-neu-buff-azsc-000.northeurope.cloudapp.azure.com, ecs.office.trafficmanager.net, res.cdn.office.net, europe.configsvc1.live.com.akadns.net, prod.odcsm1.live.com.akadns.net, mobile.events.data.trafficmanager
- Report size getting too big, too many NtCreateKey calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
Time | Type | Description |
---|---|---|
13:19:55 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
2.22.242.89 | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Vidar | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
52.123.128.14 | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | HTMLPhisher | Browse | |||
Get hash | malicious | KillMBR | Browse | |||
Get hash | malicious | KillMBR | Browse | |||
Get hash | malicious | unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
s-0005.dual-s-msedge.net | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
a726.dscd.akamai.net | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
AKAMAI-ASN1EU | Get hash | malicious | HTMLPhisher | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
MICROSOFT-CORP-MSN-AS-BLOCKUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\OFFICE\Heartbeat\HeartbeatCache.xml
Download File
Process: | C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 118 |
Entropy (8bit): | 3.5700810731231707 |
Encrypted: | false |
SSDEEP: | 3:QaklTlAlXMLLmHlIlFLlmIK/5lTn84vlJlhlXlDHlA6l3l6Als:QFulcLk04/5p8GVz6QRq |
MD5: | 573220372DA4ED487441611079B623CD |
SHA1: | 8F9D967AC6EF34640F1F0845214FBC6994C0CB80 |
SHA-256: | BE84B842025E4241BFE0C9F7B8F86A322E4396D893EF87EA1E29C74F47B6A22D |
SHA-512: | F19FA3583668C3AF92A9CEF7010BD6ECEC7285F9C8665F2E9528DBA606F105D9AF9B1DB0CF6E7F77EF2E395943DC0D5CB37149E773319078688979E4024F9DD7 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
C:\Users\user\AppData\Local\Temp\Diagnostics\EXCEL\Additional\Additional1741627134651142300_F9D14BC6-EFAF-4443-8196-DB109BAE6AE0.log
Download File
Process: | C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 20971520 |
Entropy (8bit): | 8.112143835430977E-5 |
Encrypted: | false |
SSDEEP: | 3:Tuekk9NJtHFfs1XsExe/t:qeVJ8 |
MD5: | AFDEAC461EEC32D754D8E6017E845D21 |
SHA1: | 5D0874C19B70638A0737696AEEE55BFCC80D7ED8 |
SHA-256: | 3A96B02F6A09F6A6FAC2A44A5842FF9AEB17EB4D633E48ABF6ADDF6FB447C7E2 |
SHA-512: | CAB6B8F9FFDBD80210F42219BAC8F1124D6C0B6995C5128995F7F48CED8EF0F2159EA06A2CD09B1FDCD409719F94A7DB437C708D3B1FDA01FDC80141A4595FC7 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
C:\Users\user\AppData\Local\Temp\Diagnostics\EXCEL\Additional\Additional1741627134651407700_F9D14BC6-EFAF-4443-8196-DB109BAE6AE0.log
Download File
Process: | C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 20971520 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | 8F4E33F3DC3E414FF94E5FB6905CBA8C |
SHA1: | 9674344C90C2F0646F0B78026E127C9B86E3AD77 |
SHA-256: | CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC |
SHA-512: | 7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
C:\Users\user\AppData\Local\Temp\Diagnostics\EXCEL\Primary1741627134649814500_F9D14BC6-EFAF-4443-8196-DB109BAE6AE0.log
Download File
Process: | C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 20971520 |
Entropy (8bit): | 0.2061391279825819 |
Encrypted: | false |
SSDEEP: | 1536:YyzhYAYThHvgpBCiF+vIychg/j/3hk4LndmzCqSQYAVS1+gtd1+C7003jrvUEqOd:llYzoqiF5yAgSknwE9Kf1hF6n |
MD5: | 5C4EEC608F94D5D941512F2D6A0DF24C |
SHA1: | 36C6F2730F55B8691CA6AA655075825640F12F14 |
SHA-256: | 6D451B07877711CE5FDB25F988FD9771B1BE31ADC4BE431A22462C40F55EC317 |
SHA-512: | 5F78EEE4388CE3167CF21EBC1FE227D97185B5647C023085008E93512F3471A635FA932BFD2F19CDFAA597EE4FDFAF0034C301DCC71F020680B72D5FB06AEE88 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Local\Temp\Diagnostics\EXCEL\Primary1741627134650134900_F9D14BC6-EFAF-4443-8196-DB109BAE6AE0.log
Download File
Process: | C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 20971520 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | 8F4E33F3DC3E414FF94E5FB6905CBA8C |
SHA1: | 9674344C90C2F0646F0B78026E127C9B86E3AD77 |
SHA-256: | CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC |
SHA-512: | 7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 32768 |
Entropy (8bit): | 4.520457860974817 |
Encrypted: | false |
SSDEEP: | 384:8/3k4ClKnPqxG8Omkp+krEI3H0/dSkdIFW1TpHwNi:K3kMnPygLpjrHH0/wkdIFW1V |
MD5: | 4798AE95AD8F72427D3DDF10B29DC575 |
SHA1: | 178D004287F7D989BB4ABB19A3535DE5C80974E2 |
SHA-256: | 4926CE7AEE7A9930ED123390D8D3116978333AE8DA55844E2560E9BCCBAEA1FE |
SHA-512: | 5972835EFDD213C432A11ED49B75D493A8D9A90DCFFCE5E9A9347BDC395D429EDD6A51691B6421764E531CF373579815ABCB33D15D134871AF128F2E8A74F92C |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE |
File Type: | |
Category: | modified |
Size (bytes): | 38364 |
Entropy (8bit): | 7.735443349862049 |
Encrypted: | false |
SSDEEP: | 768:YxGzxKj7McCpp/txkw30ZbLlOBl8ktEmd0xcXRwtrTBqNjd4tDIn:YxGzxBcCpJtj0ZnMBqzmd0xuw/qBP |
MD5: | 234AFFE5EB059FF30FDE2D8C41CFFAD8 |
SHA1: | 72DF2338BD940183393956651A8C1929649E4485 |
SHA-256: | 8597E450289889B106F21711800ADA395F7C62324AD2AE7158A022A83BA6BB8F |
SHA-512: | 4A80046F14800675B7C64990BDE1F43878AADC9AD72103EFF6A44EE9CB6CDC02CFE63ECE0397CD04F7ECE02EF87BC4981C40511306EA5A0AD307752A42B76793 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 26 |
Entropy (8bit): | 3.95006375643621 |
Encrypted: | false |
SSDEEP: | 3:ggPYV:rPYV |
MD5: | 187F488E27DB4AF347237FE461A079AD |
SHA1: | 6693BA299EC1881249D59262276A0D2CB21F8E64 |
SHA-256: | 255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309 |
SHA-512: | 89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 38364 |
Entropy (8bit): | 7.735443349862049 |
Encrypted: | false |
SSDEEP: | 768:YxGzxKj7McCpp/txkw30ZbLlOBl8ktEmd0xcXRwtrTBqNjd4tDIn:YxGzxBcCpJtj0ZnMBqzmd0xuw/qBP |
MD5: | 234AFFE5EB059FF30FDE2D8C41CFFAD8 |
SHA1: | 72DF2338BD940183393956651A8C1929649E4485 |
SHA-256: | 8597E450289889B106F21711800ADA395F7C62324AD2AE7158A022A83BA6BB8F |
SHA-512: | 4A80046F14800675B7C64990BDE1F43878AADC9AD72103EFF6A44EE9CB6CDC02CFE63ECE0397CD04F7ECE02EF87BC4981C40511306EA5A0AD307752A42B76793 |
Malicious: | true |
Preview: |
Process: | C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 165 |
Entropy (8bit): | 1.4377382811115937 |
Encrypted: | false |
SSDEEP: | 3:EVANFN:EqfN |
MD5: | 359140EB88A757E2BBEF2F7D32DCC4E5 |
SHA1: | FD16035441ADF907BBFC594A96470C202E265067 |
SHA-256: | 42CDE461F058A0C6F6C5A69BD1D21114CD55929011C77BCB9A025B9CA43ED71F |
SHA-512: | 9ADF6AC24E55AA161D2FFA1AC3BBBF03A7028DEFD8E1722FA52CAF7C730F7CF8AAE2073A50FD8AA004AF46E9A578A3B8088DD89415368E64E1916367CE126741 |
Malicious: | true |
Preview: |
Process: | C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 646 |
Entropy (8bit): | 4.431068085028775 |
Encrypted: | false |
SSDEEP: | 12:LYaBFN89D71CdL/Hqm6v+/8WJezEkDvwZkniUSvWrBk8JAg6ee:L5DOkLv6zEPZkniUSOrRJQ |
MD5: | 7111BFA692A22E4B3C07F1E6C6FF6F72 |
SHA1: | 297E8C4E4CFBCE24AAEDE0C1F11BDFF5AD6B9D37 |
SHA-256: | 10BF6E15C08C8C7F5D96B658BAB78AED86D1DE20F08E7871EEFBA0939AF11A02 |
SHA-512: | C2E50510263E102FACC076B9981893B54DFD7F18672429B4709ED4A5A6889F2EF2CBE05C03EF55BBD90F20AF7C54FF654ED9126E78F08B775E7E1DF81DEE081D |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.947830095260193 |
TrID: |
|
File name: | R.D. Bitzer Co., Inc.xlsm |
File size: | 30'111 bytes |
MD5: | f91a049a60e50bbf3dc141e4894a4d20 |
SHA1: | 0561d8cbbcb9063abb74c5442552fe9fde7c7b55 |
SHA256: | e1f80b47cbbfd6f89f51578dfdae495affe300fec942535ea806b815e4bdcb0d |
SHA512: | b09f938b9e3bf0ebda799862ffa5b02164e64921a450b68f0f61b0ce23aeffd95ff1b1efdf02eea99b3dba03b957b1fb26fd0a81bab806c79d967b7a1f0664e4 |
SSDEEP: | 384:Oj0XMN7jEdjhYNQ44uOwFzIx/lxA1oc0zZ4NZlAtOTDN85wwvuQ+LxHUG0oWjkg+:ENEdjrLuO//liyZGweDWuQKxHUXjkh/ |
TLSH: | BAD2F171A105051AE6BF53B1498A04EED7CE9CC429A335CA2CCD11E88841AC7AFEF7DC |
File Content Preview: | PK..........!.?&..............[Content_Types].xml...n.0............b....u..@..`$&../.J..}i;-.".W........LMo..U..dch.........e#.<..........l..I........Tqt.F....J.n....0.e......T......&.k.c(.J]:.1.....].n..=d2.AT?.....H.Y...j...T...j..9....u...X..wb.w.t..#2 |
Icon Hash: | 1d356664a4a09519 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 10, 2025 18:19:27.796886921 CET | 49741 | 443 | 192.168.2.25 | 2.22.242.89 |
Mar 10, 2025 18:19:27.796928883 CET | 443 | 49741 | 2.22.242.89 | 192.168.2.25 |
Mar 10, 2025 18:19:27.796977043 CET | 49741 | 443 | 192.168.2.25 | 2.22.242.89 |
Mar 10, 2025 18:19:27.797301054 CET | 49741 | 443 | 192.168.2.25 | 2.22.242.89 |
Mar 10, 2025 18:19:27.797312021 CET | 443 | 49741 | 2.22.242.89 | 192.168.2.25 |
Mar 10, 2025 18:19:27.798619986 CET | 49742 | 443 | 192.168.2.25 | 52.123.128.14 |
Mar 10, 2025 18:19:27.798640966 CET | 443 | 49742 | 52.123.128.14 | 192.168.2.25 |
Mar 10, 2025 18:19:27.798737049 CET | 49742 | 443 | 192.168.2.25 | 52.123.128.14 |
Mar 10, 2025 18:19:27.799242020 CET | 49742 | 443 | 192.168.2.25 | 52.123.128.14 |
Mar 10, 2025 18:19:27.799252033 CET | 443 | 49742 | 52.123.128.14 | 192.168.2.25 |
Mar 10, 2025 18:20:27.693259954 CET | 49741 | 443 | 192.168.2.25 | 2.22.242.89 |
Mar 10, 2025 18:20:27.693305969 CET | 49742 | 443 | 192.168.2.25 | 52.123.128.14 |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Mar 10, 2025 18:19:27.795941114 CET | 1.1.1.1 | 192.168.2.25 | 0xe850 | No error (0) | a726.dscd.akamai.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Mar 10, 2025 18:19:27.795941114 CET | 1.1.1.1 | 192.168.2.25 | 0xe850 | No error (0) | 2.22.242.89 | A (IP address) | IN (0x0001) | false | ||
Mar 10, 2025 18:19:27.795941114 CET | 1.1.1.1 | 192.168.2.25 | 0xe850 | No error (0) | 2.22.242.113 | A (IP address) | IN (0x0001) | false | ||
Mar 10, 2025 18:19:27.795941114 CET | 1.1.1.1 | 192.168.2.25 | 0xe850 | No error (0) | 2.22.242.128 | A (IP address) | IN (0x0001) | false | ||
Mar 10, 2025 18:19:27.795941114 CET | 1.1.1.1 | 192.168.2.25 | 0xe850 | No error (0) | 2.22.242.112 | A (IP address) | IN (0x0001) | false | ||
Mar 10, 2025 18:19:27.795941114 CET | 1.1.1.1 | 192.168.2.25 | 0xe850 | No error (0) | 2.22.242.144 | A (IP address) | IN (0x0001) | false | ||
Mar 10, 2025 18:19:27.797596931 CET | 1.1.1.1 | 192.168.2.25 | 0x3b8c | No error (0) | s-0005.dual-s-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Mar 10, 2025 18:19:27.797596931 CET | 1.1.1.1 | 192.168.2.25 | 0x3b8c | No error (0) | 52.123.128.14 | A (IP address) | IN (0x0001) | false | ||
Mar 10, 2025 18:19:27.797596931 CET | 1.1.1.1 | 192.168.2.25 | 0x3b8c | No error (0) | 52.123.129.14 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 13:18:54 |
Start date: | 10/03/2025 |
Path: | C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6c9560000 |
File size: | 70'082'712 bytes |
MD5 hash: | F9F7B6C42211B06E7AC3E4B60AA8FB77 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | false |
Target ID: | 8 |
Start time: | 13:19:55 |
Start date: | 10/03/2025 |
Path: | C:\Windows\splwow64.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6acc00000 |
File size: | 192'512 bytes |
MD5 hash: | AF4A7EBF6114EE9E6FBCC910EC3C96E6 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | false |