Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Purchase Inquiry.xla.xlsx

Overview

General Information

Sample name:Purchase Inquiry.xla.xlsx
Analysis ID:1636034
MD5:cb34fe6cca91b8e75a9696cf1885a88f
SHA1:2abddcefd9a44d6fe7b002deee04eb8c324bbf1b
SHA256:5158d0d207d89aec3aa2fb28a107269d9bed3f9b0f7f595c0e3668c92c25eb9e
Tags:xlsxuser-lowmal3
Infos:

Detection

Score:56
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Detected non-DNS traffic on DNS port
Document embeds suspicious OLE2 link
Document misses a certain OLE stream usually present in this Microsoft Office document type
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Excel Network Connections
Sigma detected: Suspicious Office Outbound Connections
Unable to load, office file is protected or invalid

Classification

  • System is w11x64_office
  • EXCEL.EXE (PID: 7244 cmdline: "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding MD5: F9F7B6C42211B06E7AC3E4B60AA8FB77)
    • splwow64.exe (PID: 7324 cmdline: C:\Windows\splwow64.exe 12288 MD5: AF4A7EBF6114EE9E6FBCC910EC3C96E6)
  • EXCEL.EXE (PID: 4420 cmdline: "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\user\Desktop\Purchase Inquiry.xla.xlsx" MD5: F9F7B6C42211B06E7AC3E4B60AA8FB77)
  • cleanup
No configs have been found
No yara matches
Source: Network ConnectionAuthor: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0", Tim Shelton: Data: DestinationIp: 5.161.200.29, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE, Initiated: true, ProcessId: 7244, Protocol: tcp, SourceIp: 192.168.2.24, SourceIsIpv6: false, SourcePort: 59440
Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.24, DestinationIsIpv6: false, DestinationPort: 59440, EventID: 3, Image: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE, Initiated: true, ProcessId: 7244, Protocol: tcp, SourceIp: 5.161.200.29, SourceIsIpv6: false, SourcePort: 443
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Purchase Inquiry.xla.xlsxAvira: detected
Source: Purchase Inquiry.xla.xlsxVirustotal: Detection: 42%Perma Link
Source: Purchase Inquiry.xla.xlsxReversingLabs: Detection: 31%
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEDirectory created: C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xmlJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile opened: C:\Program Files\Microsoft Office\root\vfs\System\MSVCR100.dllJump to behavior
Source: unknownHTTPS traffic detected: 13.107.246.40:443 -> 192.168.2.24:57376 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.246.40:443 -> 192.168.2.24:57375 version: TLS 1.2
Source: global trafficDNS query: name: st3.pro
Source: global trafficDNS query: name: st3.pro
Source: global trafficDNS query: name: otelrules.svc.static.microsoft
Source: global trafficDNS query: name: otelrules.svc.static.microsoft
Source: global trafficTCP traffic: 192.168.2.24:57376 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:57375 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:59440 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.24:59440 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.24:59440 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.24:59440 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.24:59440 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.24:59440 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.24:59441 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.24:59441 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.24:59441 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.24:59441 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.24:59441 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.24:59441 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.24:57375 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:57376 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:57375 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:57376 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:57376 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:57375 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:57376 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:57376 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:57376 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:57375 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:57375 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:57375 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:57376 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:57376 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:57376 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:57375 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:57375 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:57375 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:57375 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:52199 -> 1.1.1.1:53
Source: global trafficTCP traffic: 1.1.1.1:53 -> 192.168.2.24:52199
Source: global trafficTCP traffic: 192.168.2.24:52199 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.24:52199 -> 1.1.1.1:53
Source: global trafficTCP traffic: 1.1.1.1:53 -> 192.168.2.24:52199
Source: global trafficTCP traffic: 1.1.1.1:53 -> 192.168.2.24:52199
Source: global trafficTCP traffic: 192.168.2.24:52199 -> 1.1.1.1:53
Source: global trafficTCP traffic: 1.1.1.1:53 -> 192.168.2.24:52199
Source: global trafficTCP traffic: 192.168.2.24:52199 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.24:59439 -> 1.1.1.1:53
Source: global trafficTCP traffic: 1.1.1.1:53 -> 192.168.2.24:59439
Source: global trafficTCP traffic: 192.168.2.24:59439 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.24:59439 -> 1.1.1.1:53
Source: global trafficTCP traffic: 1.1.1.1:53 -> 192.168.2.24:59439
Source: global trafficTCP traffic: 1.1.1.1:53 -> 192.168.2.24:59439
Source: global trafficTCP traffic: 192.168.2.24:59439 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.24:59439 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.24:59440 -> 5.161.200.29:443
Source: global trafficTCP traffic: 5.161.200.29:443 -> 192.168.2.24:59440
Source: global trafficTCP traffic: 192.168.2.24:59440 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.24:59440 -> 5.161.200.29:443
Source: global trafficTCP traffic: 5.161.200.29:443 -> 192.168.2.24:59440
Source: global trafficTCP traffic: 1.1.1.1:53 -> 192.168.2.24:59439
Source: global trafficTCP traffic: 192.168.2.24:59439 -> 1.1.1.1:53
Source: global trafficTCP traffic: 5.161.200.29:443 -> 192.168.2.24:59440
Source: global trafficTCP traffic: 192.168.2.24:59440 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.24:59440 -> 5.161.200.29:443
Source: global trafficTCP traffic: 5.161.200.29:443 -> 192.168.2.24:59440
Source: global trafficTCP traffic: 192.168.2.24:59440 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.24:59441 -> 5.161.200.29:443
Source: global trafficTCP traffic: 5.161.200.29:443 -> 192.168.2.24:59441
Source: global trafficTCP traffic: 192.168.2.24:59441 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.24:59441 -> 5.161.200.29:443
Source: global trafficTCP traffic: 5.161.200.29:443 -> 192.168.2.24:59441
Source: global trafficTCP traffic: 5.161.200.29:443 -> 192.168.2.24:59441
Source: global trafficTCP traffic: 192.168.2.24:59441 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.24:59441 -> 5.161.200.29:443
Source: global trafficTCP traffic: 5.161.200.29:443 -> 192.168.2.24:59441
Source: global trafficTCP traffic: 192.168.2.24:59441 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.24:57374 -> 1.1.1.1:53
Source: global trafficTCP traffic: 1.1.1.1:53 -> 192.168.2.24:57374
Source: global trafficTCP traffic: 192.168.2.24:57374 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.24:57374 -> 1.1.1.1:53
Source: global trafficTCP traffic: 1.1.1.1:53 -> 192.168.2.24:57374
Source: global trafficTCP traffic: 1.1.1.1:53 -> 192.168.2.24:57374
Source: global trafficTCP traffic: 192.168.2.24:57374 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.24:57375 -> 13.107.246.40:443
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:57375
Source: global trafficTCP traffic: 192.168.2.24:57376 -> 13.107.246.40:443
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:57376
Source: global trafficTCP traffic: 192.168.2.24:57375 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:57376 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:57376 -> 13.107.246.40:443
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:57376
Source: global trafficTCP traffic: 192.168.2.24:57375 -> 13.107.246.40:443
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:57375
Source: global trafficTCP traffic: 1.1.1.1:53 -> 192.168.2.24:57374
Source: global trafficTCP traffic: 192.168.2.24:57374 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.24:63950 -> 1.1.1.1:53
Source: global trafficTCP traffic: 1.1.1.1:53 -> 192.168.2.24:63950
Source: global trafficTCP traffic: 192.168.2.24:63950 -> 1.1.1.1:53
Source: global trafficTCP traffic: 1.1.1.1:53 -> 192.168.2.24:63950
Source: global trafficTCP traffic: 192.168.2.24:63950 -> 1.1.1.1:53
Source: global trafficTCP traffic: 1.1.1.1:53 -> 192.168.2.24:63950
Source: global trafficTCP traffic: 192.168.2.24:63950 -> 1.1.1.1:53
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:57376
Source: global trafficTCP traffic: 192.168.2.24:57376 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:57376 -> 13.107.246.40:443
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:57376
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:57376
Source: global trafficTCP traffic: 192.168.2.24:57376 -> 13.107.246.40:443
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:57376
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:57375
Source: global trafficTCP traffic: 192.168.2.24:57375 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:57375 -> 13.107.246.40:443
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:57375
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:57375
Source: global trafficTCP traffic: 192.168.2.24:57375 -> 13.107.246.40:443
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:57375
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:57376
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:57376
Source: global trafficTCP traffic: 192.168.2.24:57376 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:57376 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:57376 -> 13.107.246.40:443
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:57376
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:57376
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:57375
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:57375
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:57375
Source: global trafficTCP traffic: 192.168.2.24:57375 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:57375 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:57375 -> 13.107.246.40:443
Source: global trafficTCP traffic: 192.168.2.24:57375 -> 13.107.246.40:443
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:57375
Source: global trafficTCP traffic: 13.107.246.40:443 -> 192.168.2.24:57375
Source: global trafficTCP traffic: 192.168.2.24:63950 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.24:52199 -> 1.1.1.1:53
Source: Joe Sandbox ViewIP Address: 13.107.246.40 13.107.246.40
Source: Joe Sandbox ViewIP Address: 13.107.246.40 13.107.246.40
Source: Joe Sandbox ViewIP Address: 5.161.200.29 5.161.200.29
Source: Joe Sandbox ViewJA3 fingerprint: 258a5a1e95b8a911872bae9081526644
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /rules/rule170146v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.18129; Pro)Host: otelrules.svc.static.microsoft
Source: global trafficHTTP traffic detected: GET /rules/rule120201v19s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.18129; Pro)Host: otelrules.svc.static.microsoft
Source: global trafficDNS traffic detected: DNS query: st3.pro
Source: global trafficDNS traffic detected: DNS query: otelrules.svc.static.microsoft
Source: Primary1741772219746597000_99247D38-7F80-463F-9A1C-C9F56FD34AB5.log.0.drString found in binary or memory: https://res.cdn.office.net/mro1cdnstorage/fonts/prod/4.41/flatfontassets.pkg
Source: Purchase Inquiry.xla.xlsx, 7A650000.0.drString found in binary or memory: https://st3.pro/hNjKTUf?&chit-chat=selective&missile=curious&pamphlet=vivacious&orderk
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57375
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57376
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59440
Source: unknownNetwork traffic detected: HTTP traffic on port 59440 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 59441 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59441
Source: unknownNetwork traffic detected: HTTP traffic on port 57375 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 57376 -> 443
Source: unknownHTTPS traffic detected: 13.107.246.40:443 -> 192.168.2.24:57376 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.246.40:443 -> 192.168.2.24:57375 version: TLS 1.2
Source: Purchase Inquiry.xla.xlsxStream path 'MBD00A93362/\x1Ole' : https://st3.pro/hNjKTUf?&chit-chat=selective&missile=curious&pamphlet=vivacious&orderk?@1?o>_ckJIqw5^:a4?6,UA`bLp'{Og#zS+UZ4sn`HX9f}9QWB:ivpNgB5}vDu %|_n]g}Q(zo<~nby rehS;MO:>by$Fi?_%$vlUDrELjB2SDuFnVpFmfauO98uegHhKGhqIyP58F2qFvd6kTlddQzXMJCYFz9RJCUzlz4vc99VvOBwI2H3HZQ6VBnbparjM7UYFbS5hLVhG0XWbI9yeyV8pV3Kh6e3LTErIO1F7PBBjaH7sKWe4vRf0o6uLTdVthCHw6hkelQiwCpWAkQeEq5JkOKkflkVC ]NYRoTcn
Source: 7A650000.0.drStream path 'MBD00A93362/\x1Ole' : https://st3.pro/hNjKTUf?&chit-chat=selective&missile=curious&pamphlet=vivacious&orderk?@1?o>_ckJIqw5^:a4?6,UA`bLp'{Og#zS+UZ4sn`HX9f}9QWB:ivpNgB5}vDu %|_n]g}Q(zo<~nby rehS;MO:>by$Fi?_%$vlUDrELjB2SDuFnVpFmfauO98uegHhKGhqIyP58F2qFvd6kTlddQzXMJCYFz9RJCUzlz4vc99VvOBwI2H3HZQ6VBnbparjM7UYFbS5hLVhG0XWbI9yeyV8pV3Kh6e3LTErIO1F7PBBjaH7sKWe4vRf0o6uLTdVthCHw6hkelQiwCpWAkQeEq5JkOKkflkVC ]NYRoTcn
Source: ~DF1ACB2073C51D320C.TMP.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEWindow title found: microsoft excel okexcel cannot open the file 'purchase inquiry.xla.xlsx' because the file format or file extension is not valid. verify that the file has not been corrupted and that the file extension matches the format of the file.
Source: classification engineClassification label: mal56.winXLSX@4/14@4/2
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xmlJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Users\user\Desktop\~$Purchase Inquiry.xla.xlsxJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\{99247D38-7F80-463F-9A1C-C9F56FD34AB5} - OProcSessId.datJump to behavior
Source: Purchase Inquiry.xla.xlsxOLE indicator, Workbook stream: true
Source: 7A650000.0.drOLE indicator, Workbook stream: true
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: Purchase Inquiry.xla.xlsxVirustotal: Detection: 42%
Source: Purchase Inquiry.xla.xlsxReversingLabs: Detection: 31%
Source: unknownProcess created: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288
Source: unknownProcess created: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\user\Desktop\Purchase Inquiry.xla.xlsx"
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288Jump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{3EE60F5C-9BAD-4CD8-8E21-AD2D001D06EB}\InprocServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\CommonJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEDirectory created: C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xmlJump to behavior
Source: Purchase Inquiry.xla.xlsxStatic file information: File size 1268736 > 1048576
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile opened: C:\Program Files\Microsoft Office\root\vfs\System\MSVCR100.dllJump to behavior
Source: Purchase Inquiry.xla.xlsxInitial sample: OLE indicators vbamacros = False
Source: Purchase Inquiry.xla.xlsxInitial sample: OLE indicators encrypted = True
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Purchase Inquiry.xla.xlsxStream path 'MBD00A93361/Package' entropy: 7.99615762638 (max. 8.0)
Source: Purchase Inquiry.xla.xlsxStream path 'Workbook' entropy: 7.96069223166 (max. 8.0)
Source: 7A650000.0.drStream path 'Workbook' entropy: 7.94244856428 (max. 8.0)
Source: C:\Windows\splwow64.exeWindow / User API: threadDelayed 840Jump to behavior
Source: C:\Windows\splwow64.exeLast function: Thread delayed
Source: C:\Windows\splwow64.exeLast function: Thread delayed
Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information queried: ProcessInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
Exploitation for Client Execution
Path Interception1
Process Injection
3
Masquerading
OS Credential Dumping1
Process Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Purchase Inquiry.xla.xlsx43%VirustotalBrowse
Purchase Inquiry.xla.xlsx32%ReversingLabsWin32.Exploit.CVE-2017-0199
Purchase Inquiry.xla.xlsx100%AviraEXP/CVE-2017-0199.dmrct
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://st3.pro/hNjKTUf?&chit-chat=selective&missile=curious&pamphlet=vivacious&orderk0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
s-part-0012.t-0009.t-msedge.net
13.107.246.40
truefalse
    high
    bg.microsoft.map.fastly.net
    199.232.214.172
    truefalse
      high
      st3.pro
      5.161.200.29
      truefalse
        high
        a726.dscd.akamai.net
        2.22.242.113
        truefalse
          high
          s-0005.dual-s-dc-msedge.net
          52.123.131.14
          truefalse
            high
            otelrules.svc.static.microsoft
            unknown
            unknownfalse
              high
              NameMaliciousAntivirus DetectionReputation
              https://otelrules.svc.static.microsoft/rules/rule170146v0s19.xmlfalse
                high
                https://otelrules.svc.static.microsoft/rules/rule120201v19s19.xmlfalse
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://st3.pro/hNjKTUf?&chit-chat=selective&missile=curious&pamphlet=vivacious&orderkPurchase Inquiry.xla.xlsx, 7A650000.0.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  13.107.246.40
                  s-part-0012.t-0009.t-msedge.netUnited States
                  8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                  5.161.200.29
                  st3.proGermany
                  24940HETZNER-ASDEfalse
                  Joe Sandbox version:42.0.0 Malachite
                  Analysis ID:1636034
                  Start date and time:2025-03-12 10:35:56 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 5m 38s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:defaultwindowsofficecookbook.jbs
                  Analysis system description:Windows 11 23H2 with Office Professional Plus 2021, Chrome 131, Firefox 133, Adobe Reader DC 24, Java 8 Update 431, 7zip 24.09
                  Run name:Potential for more IOCs and behavior
                  Number of analysed new started processes analysed:22
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:Purchase Inquiry.xla.xlsx
                  Detection:MAL
                  Classification:mal56.winXLSX@4/14@4/2
                  EGA Information:Failed
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Found application associated with file extension: .xlsx
                  • Found Word or Excel or PowerPoint or XPS Viewer
                  • Attach to Office via COM
                  • Active ActiveX Object
                  • Active ActiveX Object
                  • Scroll down
                  • Close Viewer
                  • Exclude process from analysis (whitelisted): dllhost.exe, sppsvc.exe, RuntimeBroker.exe, SystemSettingsBroker.exe, SIHClient.exe, appidcertstorecheck.exe, conhost.exe, svchost.exe
                  • Excluded IPs from analysis (whitelisted): 52.109.89.18, 52.109.32.7, 52.109.68.130, 20.42.73.26, 199.232.214.172, 52.123.131.14, 20.109.210.53, 40.126.32.140, 52.149.20.212, 2.22.242.113, 95.101.54.113
                  • Excluded domains from analysis (whitelisted): odc.officeapps.live.com, slscr.update.microsoft.com, europe.odcsm1.live.com.akadns.net, res-1.cdn.office.net, weu-azsc-config.officeapps.live.com, osiprod-ukw-buff-azsc-000.ukwest.cloudapp.azure.com, eur.roaming1.live.com.akadns.net, mobile.events.data.microsoft.com, roaming.officeapps.live.com, dual-s-0005-office.config.skype.com, login.live.com, onedscolprdeus09.eastus.cloudapp.azure.com, officeclient.microsoft.com, c.pki.goog, wu-b-net.trafficmanager.net, ecs.office.com, ukw-azsc-000.roaming.officeapps.live.com, ctldl.windowsupdate.com.delivery.microsoft.com, prod.configsvc1.live.com.akadns.net, frc-azsc-000.odc.officeapps.live.com, uci.cdn.office.net, ctldl.windowsupdate.com, prod.roaming1.live.com.akadns.net, res-stls-prod.edgesuite.net, fe3cr.delivery.mp.microsoft.com, res-prod.trafficmanager.net, config.officeapps.live.com, osiprod-frc-bronze-azsc-000.francecentral.cloudapp.azure.com, ecs.office.trafficmanager.net, res.cdn.office.net, europe.configsvc1.live
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtCreateKey calls found.
                  • Report size getting too big, too many NtOpenFile calls found.
                  • Report size getting too big, too many NtQueryAttributesFile calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • Report size getting too big, too many NtReadFile calls found.
                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                  • Report size getting too big, too many NtSetValueKey calls found.
                  TimeTypeDescription
                  05:38:02API Interceptor902x Sleep call for process: splwow64.exe modified
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  13.107.246.40Payment Transfer Receipt.shtmlGet hashmaliciousHTMLPhisherBrowse
                  • www.aib.gov.uk/
                  NEW ORDER.xlsGet hashmaliciousUnknownBrowse
                  • 2s.gg/3zs
                  PO_OCF 408.xlsGet hashmaliciousUnknownBrowse
                  • 2s.gg/42Q
                  06836722_218 Aluplast.docx.docGet hashmaliciousUnknownBrowse
                  • 2s.gg/3zk
                  Quotation.xlsGet hashmaliciousUnknownBrowse
                  • 2s.gg/3zM
                  5.161.200.29Purchase Inquiry.xla.xlsxGet hashmaliciousUnknownBrowse
                    Purchase Inquiry.xla.xlsxGet hashmaliciousUnknownBrowse
                      Purchase Inquiry.xla.xlsxGet hashmaliciousUnknownBrowse
                        Ref PO24777.xlsGet hashmaliciousUnknownBrowse
                          Ref PO24777.xlsGet hashmaliciousUnknownBrowse
                            Ref PO24777.xlsGet hashmaliciousUnknownBrowse
                              COTA#U00c7#U00c3O.xlsGet hashmaliciousUnknownBrowse
                                Nouvelle_commande9353834.xlsGet hashmaliciousUnknownBrowse
                                  COTA#U00c7#U00c3O.xlsGet hashmaliciousUnknownBrowse
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    bg.microsoft.map.fastly.netzlient.exeGet hashmaliciousUnknownBrowse
                                    • 199.232.210.172
                                    SecuriteInfo.com.Variant.Genie.8DN.315.18074.27911.exeGet hashmaliciousFormBookBrowse
                                    • 199.232.214.172
                                    1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 199.232.214.172
                                    Setup.exeGet hashmaliciousUnknownBrowse
                                    • 199.232.214.172
                                    file_1741726008685.pdfGet hashmaliciousUnknownBrowse
                                    • 199.232.210.172
                                    http://ssa-services-gov.com/ssa/SSsowlkfifa.htmlGet hashmaliciousScreenConnect ToolBrowse
                                    • 199.232.214.172
                                    MyProfessionalResume_Updated.exeGet hashmaliciousUnknownBrowse
                                    • 199.232.210.172
                                    Set-up.exeGet hashmaliciousGO Backdoor, LummaC StealerBrowse
                                    • 199.232.210.172
                                    cndx.com.emlGet hashmaliciousHTMLPhisher, Invisible JS, Tycoon2FABrowse
                                    • 199.232.214.172
                                    s-part-0012.t-0009.t-msedge.netfile.exeGet hashmaliciousVidarBrowse
                                    • 13.107.246.40
                                    SecuriteInfo.com.Trojan.DownLoader19.10887.56.7494.exeGet hashmaliciousUnknownBrowse
                                    • 13.107.246.40
                                    FOZkdjzquG.exeGet hashmaliciousLummaC StealerBrowse
                                    • 13.107.246.40
                                    ffY6vVoRx0.exeGet hashmaliciousBerbewBrowse
                                    • 13.107.246.40
                                    hmm_dec.exeGet hashmaliciousLummaC StealerBrowse
                                    • 13.107.246.40
                                    Message.emlGet hashmaliciousUnknownBrowse
                                    • 13.107.246.40
                                    uwmC39FNho.exeGet hashmaliciousRemcosBrowse
                                    • 13.107.246.40
                                    Handler.exeGet hashmaliciousDanaBot, PureLog Stealer, VidarBrowse
                                    • 13.107.246.40
                                    https://securityalert-corporate.com/click/f288bff9-842d-4e34-8d2d-41ad20e48e9dGet hashmaliciousUnknownBrowse
                                    • 13.107.246.40
                                    Debh Payment Detail.htmlGet hashmaliciousUnknownBrowse
                                    • 13.107.246.40
                                    st3.proPurchase Inquiry.xla.xlsxGet hashmaliciousUnknownBrowse
                                    • 5.161.200.29
                                    Purchase Inquiry.xla.xlsxGet hashmaliciousUnknownBrowse
                                    • 5.161.200.29
                                    Purchase Inquiry.xla.xlsxGet hashmaliciousUnknownBrowse
                                    • 5.161.200.29
                                    Ref PO24777.xlsGet hashmaliciousUnknownBrowse
                                    • 5.161.200.29
                                    Ref PO24777.xlsGet hashmaliciousUnknownBrowse
                                    • 5.161.200.29
                                    Ref PO24777.xlsGet hashmaliciousUnknownBrowse
                                    • 5.161.200.29
                                    COTA#U00c7#U00c3O.xlsGet hashmaliciousUnknownBrowse
                                    • 5.161.200.29
                                    COTA#U00c7#U00c3O.xlsGet hashmaliciousUnknownBrowse
                                    • 5.161.200.29
                                    Nouvelle_commande9353834.xlsGet hashmaliciousUnknownBrowse
                                    • 5.161.200.29
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    HETZNER-ASDEPurchase Inquiry.xla.xlsxGet hashmaliciousUnknownBrowse
                                    • 5.161.200.29
                                    Transferencia 6997900002017937.exeGet hashmaliciousFormBookBrowse
                                    • 144.76.229.203
                                    Quotation.exeGet hashmaliciousFormBookBrowse
                                    • 144.76.229.203
                                    resgod.arm.elfGet hashmaliciousMiraiBrowse
                                    • 46.4.110.17
                                    na.elfGet hashmaliciousPrometeiBrowse
                                    • 88.198.246.242
                                    na.elfGet hashmaliciousPrometeiBrowse
                                    • 88.198.246.242
                                    na.elfGet hashmaliciousPrometeiBrowse
                                    • 88.198.246.242
                                    SecuriteInfo.com.Variant.Genie.8DN.315.18074.27911.exeGet hashmaliciousFormBookBrowse
                                    • 144.76.229.203
                                    na.elfGet hashmaliciousPrometeiBrowse
                                    • 88.198.246.242
                                    MICROSOFT-CORP-MSN-AS-BLOCKUSPurchase Inquiry.xla.xlsxGet hashmaliciousUnknownBrowse
                                    • 13.107.246.76
                                    resgod.mpsl.elfGet hashmaliciousMiraiBrowse
                                    • 20.62.103.71
                                    https://mail.kb4.io/XVUFBTUdUVGF0Q2J1L0tCNTE2U2RMZGVqSDkyR244RFhYSFNPTFU0N3FJRHZ1Vmw5OVdITjQ0aFgvUENQQVF6Y0VWOHhnTnRKM3VHUktPL21ZZHdtcWRaV3EwYWhKd3hVOCtibzFaN2phbkVVQzMxY2xma3h3K2NKb3pWUnEyUXVDWWNsNmtxV0dKVWZjOExIcUFlNnlXUkpvcDlzTlBhNzNCaHNvRzBwZlF0M21CQmJhR2hVUEprN2JmeWtkNThkMVRMbVN3dGx4NWViNUZMejUxaVVjWlhCaWxuT1pBPT0tLVpQV0ZwSVl5K0dCSlpNNVctLWQ3aGk1dFRjMXBtUDJRQ09QakI3M1E9PQ==?cid=2440816513Get hashmaliciousKnowBe4Browse
                                    • 13.107.246.60
                                    https://inv18993383.cloudfaxservice.de/MSovS?e=amatuer_script_kiddys@pwned.comGet hashmaliciousHTMLPhisherBrowse
                                    • 13.107.246.60
                                    TEDGRQXB.exeGet hashmaliciousVidarBrowse
                                    • 204.79.197.203
                                    pCFcu1ilGhGet hashmaliciousUnknownBrowse
                                    • 40.69.147.202
                                    phish_alert_sp2_2.0.0.0.emlGet hashmaliciousUnknownBrowse
                                    • 13.89.179.8
                                    #U25baPlay_VM-NowATTT0003.htmlGet hashmaliciousHTMLPhisherBrowse
                                    • 13.107.246.60
                                    Brian Logie shared _Newfield Construction, Inc Shared a secured Documents_ with you.emlGet hashmaliciousUnknownBrowse
                                    • 52.123.129.14
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    258a5a1e95b8a911872bae9081526644expense-report.xlsxGet hashmaliciousUnknownBrowse
                                    • 13.107.246.40
                                    Purchase Inquiry.xla.xlsxGet hashmaliciousUnknownBrowse
                                    • 13.107.246.40
                                    Bozza nuovo ordine 0010979742.xlsGet hashmaliciousUnknownBrowse
                                    • 13.107.246.40
                                    Quote 09052022_1.xlsxGet hashmaliciousUnknownBrowse
                                    • 13.107.246.40
                                    Ref PO24777.xlsGet hashmaliciousUnknownBrowse
                                    • 13.107.246.40
                                    #U5f38#U5a5c#U6cec#U5ed7#U60d7#U603d#U60ea#U661e.xlsGet hashmaliciousUnknownBrowse
                                    • 13.107.246.40
                                    .xlsGet hashmaliciousUnknownBrowse
                                    • 13.107.246.40
                                    COTA#U00c7#U00c3O.xlsGet hashmaliciousUnknownBrowse
                                    • 13.107.246.40
                                    840.xlsGet hashmaliciousUnknownBrowse
                                    • 13.107.246.40
                                    POETDB24-2577.xla.xlsxGet hashmaliciousUnknownBrowse
                                    • 13.107.246.40
                                    No context
                                    Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):118
                                    Entropy (8bit):3.5700810731231707
                                    Encrypted:false
                                    SSDEEP:3:QaklTlAlXMLLmHlIlFLlmIK/5lTn84vlJlhlXlDHlA6l3l6Als:QFulcLk04/5p8GVz6QRq
                                    MD5:573220372DA4ED487441611079B623CD
                                    SHA1:8F9D967AC6EF34640F1F0845214FBC6994C0CB80
                                    SHA-256:BE84B842025E4241BFE0C9F7B8F86A322E4396D893EF87EA1E29C74F47B6A22D
                                    SHA-512:F19FA3583668C3AF92A9CEF7010BD6ECEC7285F9C8665F2E9528DBA606F105D9AF9B1DB0CF6E7F77EF2E395943DC0D5CB37149E773319078688979E4024F9DD7
                                    Malicious:false
                                    Reputation:high, very likely benign file
                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.H.e.a.r.t.b.e.a.t.C.a.c.h.e./.>.
                                    Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):20971520
                                    Entropy (8bit):8.112143835430977E-5
                                    Encrypted:false
                                    SSDEEP:3:Tuekk9NJtHFfs1XsExe/t:qeVJ8
                                    MD5:AFDEAC461EEC32D754D8E6017E845D21
                                    SHA1:5D0874C19B70638A0737696AEEE55BFCC80D7ED8
                                    SHA-256:3A96B02F6A09F6A6FAC2A44A5842FF9AEB17EB4D633E48ABF6ADDF6FB447C7E2
                                    SHA-512:CAB6B8F9FFDBD80210F42219BAC8F1124D6C0B6995C5128995F7F48CED8EF0F2159EA06A2CD09B1FDCD409719F94A7DB437C708D3B1FDA01FDC80141A4595FC7
                                    Malicious:false
                                    Reputation:moderate, very likely benign file
                                    Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):20971520
                                    Entropy (8bit):0.0
                                    Encrypted:false
                                    SSDEEP:3::
                                    MD5:8F4E33F3DC3E414FF94E5FB6905CBA8C
                                    SHA1:9674344C90C2F0646F0B78026E127C9B86E3AD77
                                    SHA-256:CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC
                                    SHA-512:7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB
                                    Malicious:false
                                    Reputation:high, very likely benign file
                                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):71
                                    Entropy (8bit):4.3462513114457515
                                    Encrypted:false
                                    SSDEEP:3:Tuekk9NJtHFfs1XsExen:qeVJ8u
                                    MD5:8F4510F128F81A8BAF2A345D00F7E30C
                                    SHA1:8C711E6C484881ECDC83B6BDAC41C7A19EDE9C37
                                    SHA-256:15AA8B35FC5F139EF0B0FBC641CAA862AED19674625B81D1DC63467BC0AAFED9
                                    SHA-512:78695E5E2337703757903B8452E31A98F860022B04972651212C3004FEBE29017380A8BCA9FCCFD935DE00D8BD73AA556C30A3CEA5FC76E7ADF7E7763D68E78F
                                    Malicious:false
                                    Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation..
                                    Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                    File Type:ASCII text, with very long lines (28676), with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):20971520
                                    Entropy (8bit):0.21703001206329997
                                    Encrypted:false
                                    SSDEEP:1536:xFTZiSUm4zdbbjW3VUSdUj7Hjp6LNFdQnTeBZ2H7OrZzhGhNr8CJ0uIw69JREs7v:HNiL9bjfSd+mNiBnr8uHvfFHBw/3
                                    MD5:96C4CFA53BBE7EE8EFFF3464BA2368B0
                                    SHA1:A270F37C5004279737F7EC2A83EC46F38357098B
                                    SHA-256:86598D38B26F643481BBC395E026D5940484BB660ED66F8EA44E11EA4792CE15
                                    SHA-512:30C23F76E49F6887EE6EA85A520F8283DFC2A6ADE53782921740916BB71BBCCAEFCA0DD3E8A8F9C69E5758956F57FE168587403B40529DC7113488DF00B3A634
                                    Malicious:false
                                    Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation..03/12/2025 09:36:59.757.EXCEL (0x1C4C).0x1CCC.Microsoft Excel.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Experimentation.FeatureQueryBatched","Flags":33777005812056321,"InternalSequenceNumber":17,"Time":"2025-03-12T09:36:59.757Z","Data.Sequence":0,"Data.Count":128,"Data.Features":"[ { \"ID\" : 1, \"N\" : \"Microsoft.Office.Telemetry.TrackCPSWrites\", \"V\" : false, \"S\" : 1, \"P\" : 0, \"T\" : \"2025-03-12T09:36:59.2264620Z\", \"C\" : \"33\", \"Q\" : 0.0, \"M\" : 0, \"F\" : 5 }, { \"ID\" : 1, \"N\" : \"Microsoft.Office.Telemetry.CPSMaxWrites\", \"V\" : 2, \"S\" : 1, \"P\" : 0, \"T\" : \"2025-03-12T09:36:59.2264620Z\", \"C\" : \"33\", \"Q\" : 0.0, \"M\" : 0, \"F\" : 5 }, { \"ID\" : 1, \"N\" : \"Microsoft.Office.Word.UAEOnSafeModeEnabled\", \"V\" : true, \"S\" : 1, \"P\" : 0, \"T\" : \"2025-03-12T09:36:59.2264620Z\", \"C\" : \"\", \"Q\" : 18.0, \"M\" : 0, \"F\" : 5, \"G\" : \"Opt\" }, { \"ID\" : 1, \
                                    Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):20971520
                                    Entropy (8bit):0.0
                                    Encrypted:false
                                    SSDEEP:3::
                                    MD5:8F4E33F3DC3E414FF94E5FB6905CBA8C
                                    SHA1:9674344C90C2F0646F0B78026E127C9B86E3AD77
                                    SHA-256:CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC
                                    SHA-512:7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB
                                    Malicious:false
                                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                    File Type:ASCII text, with very long lines (28927), with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):264978
                                    Entropy (8bit):5.154860746421049
                                    Encrypted:false
                                    SSDEEP:1536:eyzAIRmwlfTmFiGI1Mfl3xco92UPjIkpFT7TBwsK2/ngOstuQp3ENFCyBBujt/4T:p8I0FiNMf1xl2ILFHBw/Nw
                                    MD5:D860A7424212DB1A104A5FB2D0D9ED93
                                    SHA1:87891ECEDD1F8B89DEF671502285E80E8A17818B
                                    SHA-256:FC108D945A07CFBE59918FF22435A2A1B98248101AE98F1D9B2801DED67A1FF5
                                    SHA-512:EBDA8B8BA32A7AC7811C4C4FE78CD8EE020B15B1082CC745B3FE4E2296D5B072BDBFC48DD4EF29B65C19371D18D90259C7DF86BB9DDB52EE0AA4AB12DBB134F9
                                    Malicious:false
                                    Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation..03/12/2025 09:38:23.954.EXCEL (0x1144).0xF80.Microsoft Excel.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Experimentation.FeatureQueryBatched","Flags":33777005812056321,"InternalSequenceNumber":18,"Time":"2025-03-12T09:38:23.954Z","Data.Sequence":0,"Data.Count":128,"Data.Features":"[ { \"ID\" : 1, \"N\" : \"Microsoft.Office.Telemetry.TrackCPSWrites\", \"V\" : false, \"S\" : 1, \"P\" : 0, \"T\" : \"2025-03-12T09:38:23.4075221Z\", \"C\" : \"33\", \"Q\" : 0.0, \"M\" : 0, \"F\" : 5 }, { \"ID\" : 1, \"N\" : \"Microsoft.Office.Telemetry.CPSMaxWrites\", \"V\" : 2, \"S\" : 1, \"P\" : 0, \"T\" : \"2025-03-12T09:38:23.4075221Z\", \"C\" : \"33\", \"Q\" : 0.0, \"M\" : 0, \"F\" : 5 }, { \"ID\" : 1, \"N\" : \"Microsoft.Office.Word.UAEOnSafeModeEnabled\", \"V\" : true, \"S\" : 1, \"P\" : 0, \"T\" : \"2025-03-12T09:38:23.4075221Z\", \"C\" : \"\", \"Q\" : 6.0, \"M\" : 0, \"F\" : 5, \"G\" : \"Opt\" }, { \"ID\" : 1, \"N
                                    Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):512
                                    Entropy (8bit):0.0
                                    Encrypted:false
                                    SSDEEP:3::
                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                    Malicious:false
                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                    File Type:Composite Document File V2 Document, Cannot read section info
                                    Category:dropped
                                    Size (bytes):1536
                                    Entropy (8bit):1.2710134452235702
                                    Encrypted:false
                                    SSDEEP:6:rl912N0xs+CFfKX+lG8ElCl5XCB9Xh9X:rl3lKFCXanMClJCb7
                                    MD5:923644ED814C2F9524340E800358CB56
                                    SHA1:4D57049E62B65EA87B7E5550E729BC9FD5371675
                                    SHA-256:6D6997B0092A89E29DFCAD76A13425AE1BFFB97E0D10948E2EBE0DE69F9BB68C
                                    SHA-512:52713016DA42BEEC60EA7D89EB354E997AB51EC89A18D07E44D34997567FAE09F8EF8B804593C0DDFDC6EF737F1F0AEDD4D25CD7134B9A677F237D267ABB9620
                                    Malicious:false
                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):16384
                                    Entropy (8bit):0.06007693391688613
                                    Encrypted:false
                                    SSDEEP:3:xRy//lvEXKRjgEAJnOb0lvlllrAm8wtYXFqLSLcEX/:wlnAJMellhAm8wtU2WcE
                                    MD5:1918207FF423F809365029941FF9D32F
                                    SHA1:CE5CEF48FDF1F67CBB30317A93C250C290EFF8C6
                                    SHA-256:56D76D4386B6234BCAE9BB895BA87EEDA21103D2468B0E77CE80CA524CE167F8
                                    SHA-512:44A1C064A3C1A6029DCC8652B34DD74B783ED3657B4EA209243A02749D96521C192011FBDDE556D8FB4E5E4A0DFC9193D41334632C8FE5D08FB847E6D8D27202
                                    Malicious:false
                                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                    File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Wed Mar 12 09:38:19 2025, Security: 1
                                    Category:dropped
                                    Size (bytes):34304
                                    Entropy (8bit):7.498741387800905
                                    Encrypted:false
                                    SSDEEP:768:STQCrfywFJ/q4pPZt2gNSWMXMFrCG0vJE9jP2LvVaq3rMdJ:AQCr6wj3ugNpwMF2GqE5Pcn3rc
                                    MD5:04DB0BAFF0B2ED4A199AFC6C31346315
                                    SHA1:AA5238E97CB02CB7255A8ACFCC51C9352E37E69B
                                    SHA-256:F993E518086C101FE7E6EE07E6A3E3D8286923A946D9514F899926CAA5A946E9
                                    SHA-512:81FFB814AAEA45DC3482FC293D4FF1F58C5A723D7B5755BECAE44AE7DD98DF5CEF3BA2BC45DBA51441C3CD2659002966645ED40C579E776C1E5BB140177B8F67
                                    Malicious:false
                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................@...............A................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...............................................................................................................................................................................................................................................
                                    Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):26
                                    Entropy (8bit):3.95006375643621
                                    Encrypted:false
                                    SSDEEP:3:ggPYV:rPYV
                                    MD5:187F488E27DB4AF347237FE461A079AD
                                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                    Malicious:false
                                    Preview:[ZoneTransfer]....ZoneId=0
                                    Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                    File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Wed Mar 12 09:38:19 2025, Security: 1
                                    Category:dropped
                                    Size (bytes):34304
                                    Entropy (8bit):7.498741387800905
                                    Encrypted:false
                                    SSDEEP:768:STQCrfywFJ/q4pPZt2gNSWMXMFrCG0vJE9jP2LvVaq3rMdJ:AQCr6wj3ugNpwMF2GqE5Pcn3rc
                                    MD5:04DB0BAFF0B2ED4A199AFC6C31346315
                                    SHA1:AA5238E97CB02CB7255A8ACFCC51C9352E37E69B
                                    SHA-256:F993E518086C101FE7E6EE07E6A3E3D8286923A946D9514F899926CAA5A946E9
                                    SHA-512:81FFB814AAEA45DC3482FC293D4FF1F58C5A723D7B5755BECAE44AE7DD98DF5CEF3BA2BC45DBA51441C3CD2659002966645ED40C579E776C1E5BB140177B8F67
                                    Malicious:false
                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................@...............A................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...............................................................................................................................................................................................................................................
                                    Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):165
                                    Entropy (8bit):1.4134958568691696
                                    Encrypted:false
                                    SSDEEP:3:D//nEwmM:DXEwmM
                                    MD5:8B6F49EF043D1AF562C216108A13E0F2
                                    SHA1:0106337F6D46E83B30CA7C1563C3FC3AF4209AF3
                                    SHA-256:C80D5433620A06CF252C9489F9A46BA091A5DAA239AAC3A98DB918627DEFF314
                                    SHA-512:241592FDA43D686AF92D22B2B451C51E70B742A5C33FA94307613155906396A53501E05719DD568C3D3C8088B95B83D7E98393B3692EB4B01907FE8BD927E896
                                    Malicious:true
                                    Preview:.user ..M.a.o.g.a. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                    File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Tue Mar 11 07:40:55 2025, Security: 1
                                    Entropy (8bit):7.988066904387626
                                    TrID:
                                    • Microsoft Excel sheet (30009/1) 78.94%
                                    • Generic OLE2 / Multistream Compound File (8008/1) 21.06%
                                    File name:Purchase Inquiry.xla.xlsx
                                    File size:1'268'736 bytes
                                    MD5:cb34fe6cca91b8e75a9696cf1885a88f
                                    SHA1:2abddcefd9a44d6fe7b002deee04eb8c324bbf1b
                                    SHA256:5158d0d207d89aec3aa2fb28a107269d9bed3f9b0f7f595c0e3668c92c25eb9e
                                    SHA512:deeb3d19e2fd4d5466278e71d185fc4412c2a61768db5eed36614a672581d6f724c3c7b03d5f94e704893602b77c7b2e0793eff6c6735532a7cffee1ae09e8f2
                                    SSDEEP:24576:WJ1EM2sTVgyawU1CGO7oaomhapQs7ANo+9npaJ0/6CYOqgT:WJ95xaP/O7oarhMB7Yz9paJ0/
                                    TLSH:F2452328AFC41B0BC4DFA97C4C16D661847ACDDABE56E157239C7394383367AA38721C
                                    File Content Preview:........................>...................................b...........................................................................................f......................................................................................................
                                    Icon Hash:35e58a8c0c8a85b9
                                    Document Type:OLE
                                    Number of OLE Files:1
                                    Has Summary Info:
                                    Application Name:Microsoft Excel
                                    Encrypted Document:True
                                    Contains Word Document Stream:False
                                    Contains Workbook/Book Stream:True
                                    Contains PowerPoint Document Stream:False
                                    Contains Visio Document Stream:False
                                    Contains ObjectPool Stream:False
                                    Flash Objects Count:0
                                    Contains VBA Macros:False
                                    Code Page:1252
                                    Author:
                                    Last Saved By:
                                    Create Time:2006-09-16T00:00:00Z
                                    Last Saved Time:2025-03-11T07:40:12Z
                                    Creating Application:Microsoft Excel
                                    Security:0
                                    Document Code Page:1252
                                    Thumbnail Scaling Desired:false
                                    Contains Dirty Links:false
                                    Shared Document:false
                                    Changed Hyperlinks:false
                                    Application Version:12.0000
                                    General
                                    Stream Path:\x1CompObj
                                    CLSID:
                                    File Type:data
                                    Stream Size:114
                                    Entropy:4.25248375192737
                                    Base64 Encoded:True
                                    Data ASCII:. . . . . . . . . . . . . . . . . . . F & . . . M i c r o s o f t O f f i c e E x c e l 2 0 0 3 W o r k s h e e t . . . . . B i f f 8 . . . . . E x c e l . S h e e t . 8 . 9 q . . . . . . . . . . . .
                                    Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 26 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 32 30 30 33 20 57 6f 72 6b 73 68 65 65 74 00 06 00 00 00 42 69 66 66 38 00 0e 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                    General
                                    Stream Path:\x5DocumentSummaryInformation
                                    CLSID:
                                    File Type:data
                                    Stream Size:244
                                    Entropy:2.889430592781307
                                    Base64 Encoded:False
                                    Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , 0 . . . . . . . . . . . . . . H . . . . . . . P . . . . . . . X . . . . . . . ` . . . . . . . h . . . . . . . p . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S h e e t 1 . . . . . S h e e t 2 . . . . . S h e e t 3 . . . . . . . . . . . . . . . . . W o r k s h e e t s . . . . . . . . .
                                    Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 c4 00 00 00 08 00 00 00 01 00 00 00 48 00 00 00 17 00 00 00 50 00 00 00 0b 00 00 00 58 00 00 00 10 00 00 00 60 00 00 00 13 00 00 00 68 00 00 00 16 00 00 00 70 00 00 00 0d 00 00 00 78 00 00 00 0c 00 00 00 a1 00 00 00 02 00 00 00 e4 04 00 00
                                    General
                                    Stream Path:\x5SummaryInformation
                                    CLSID:
                                    File Type:data
                                    Stream Size:200
                                    Entropy:3.3020681057018666
                                    Base64 Encoded:False
                                    Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . + ' 0 . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . T . . . . . . . ` . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . | . # . @ . . . . X . . . . . . . . .
                                    Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 98 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 54 00 00 00 12 00 00 00 60 00 00 00 0c 00 00 00 78 00 00 00 0d 00 00 00 84 00 00 00 13 00 00 00 90 00 00 00 02 00 00 00 e4 04 00 00 1e 00 00 00 04 00 00 00
                                    General
                                    Stream Path:MBD00A93361/\x1CompObj
                                    CLSID:
                                    File Type:data
                                    Stream Size:99
                                    Entropy:3.631242196770981
                                    Base64 Encoded:False
                                    Data ASCII:. . . . . . . . . . . . . . . . . . . . . . ! . . . M i c r o s o f t O f f i c e E x c e l W o r k s h e e t . . . . . E x c e l M L 1 2 . . . . . 9 q . . . . . . . . . . . .
                                    Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 21 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 57 6f 72 6b 73 68 65 65 74 00 0a 00 00 00 45 78 63 65 6c 4d 4c 31 32 00 00 00 00 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                    General
                                    Stream Path:MBD00A93361/Package
                                    CLSID:
                                    File Type:Microsoft Excel 2007+
                                    Stream Size:1218763
                                    Entropy:7.9961576263815575
                                    Base64 Encoded:True
                                    Data ASCII:P K . . . . . . . . . . ! . P % ` . . . X . . . . . . [ C o n t e n t _ T y p e s ] . x m l . ( . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                    Data Raw:50 4b 03 04 14 00 06 00 08 00 00 00 21 00 50 25 9e 60 c9 01 00 00 58 08 00 00 13 00 d1 01 5b 43 6f 6e 74 65 6e 74 5f 54 79 70 65 73 5d 2e 78 6d 6c 20 a2 cd 01 28 a0 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                    General
                                    Stream Path:MBD00A93362/\x1Ole
                                    CLSID:
                                    File Type:data
                                    Stream Size:914
                                    Entropy:5.720955189029818
                                    Base64 Encoded:False
                                    Data ASCII:. . . . ! x 1 i = X 1 . . . . . . . . . . . . . . . y . . . K . . . . h . t . t . p . s . : . / . / . s . t . 3 . . . p . r . o . / . h . N . j . K . T . U . f . ? . & . c . h . i . t . - . c . h . a . t . = . s . e . l . e . c . t . i . v . e . & . m . i . s . s . i . l . e . = . c . u . r . i . o . u . s . & . p . a . m . p . h . l . e . t . = . v . i . v . a . c . i . o . u . s . & . o . r . d . e . r . . . k ? @ 1 ? o . > _ . c . k J . I q w . . 5 . ^ . : . a 4 . ? 6 . . , . U A ` . b . L p . ' . { O g
                                    Data Raw:01 00 00 02 21 78 31 69 3d 99 58 31 00 00 00 00 00 00 00 00 00 00 00 00 bc 01 00 00 e0 c9 ea 79 f9 ba ce 11 8c 82 00 aa 00 4b a9 0b b8 01 00 00 68 00 74 00 74 00 70 00 73 00 3a 00 2f 00 2f 00 73 00 74 00 33 00 2e 00 70 00 72 00 6f 00 2f 00 68 00 4e 00 6a 00 4b 00 54 00 55 00 66 00 3f 00 26 00 63 00 68 00 69 00 74 00 2d 00 63 00 68 00 61 00 74 00 3d 00 73 00 65 00 6c 00 65 00 63 00
                                    General
                                    Stream Path:Workbook
                                    CLSID:
                                    File Type:Applesoft BASIC program data, first line number 16
                                    Stream Size:34370
                                    Entropy:7.960692231662655
                                    Base64 Encoded:True
                                    Data ASCII:. . . . . . . . . . . . . . . . . / . 6 . . . . . . . M L J C < . . ! . . } e l . . w Q 2 p 2 . 5 y } V . Z . . . . . . . . . . . . p . . . \\ . p . w d C C Q . g % . G . 7 . . . ' , . m n G N . . A . . . " w = O . " ( . & " v . . & ; y = w R , - B . . . b 6 a . . . { . . . = . . . . , l . . . \\ . F . . . . 7 J m . . . . . . . . H x . . . . . . . . | . . . . . . . | = . . . . . > . | H { . g * x @ . . . 9 . . . N " . . . A Y . . . . . . . . . . 1 . . . . . S I 5 . Q A n W l . . m S 1 . . . { Y . P 9 . A .
                                    Data Raw:09 08 10 00 00 06 05 00 ab 1f cd 07 c1 00 01 00 06 04 00 00 2f 00 36 00 01 00 01 00 01 00 e2 d2 cd 4d dc 4c 4a 43 d7 3c 12 04 21 03 16 7d 65 c2 6c 04 89 c7 11 77 8c a7 51 32 70 32 e0 a2 ce d3 96 35 e2 79 88 7d 90 56 b1 2e e0 5a 0e 12 87 00 00 00 e1 00 02 00 b0 04 c1 00 02 00 70 8b e2 00 00 00 5c 00 70 00 dd 77 a8 b4 de c1 f6 cf 64 43 43 51 94 b3 1e f8 ce 67 c3 e1 25 05 47 a4 e5 e7
                                    TimestampSource PortDest PortSource IPDest IP
                                    Mar 12, 2025 10:37:06.501024008 CET5219953192.168.2.241.1.1.1
                                    Mar 12, 2025 10:37:06.505866051 CET53521991.1.1.1192.168.2.24
                                    Mar 12, 2025 10:37:06.505974054 CET5219953192.168.2.241.1.1.1
                                    Mar 12, 2025 10:37:06.506020069 CET5219953192.168.2.241.1.1.1
                                    Mar 12, 2025 10:37:06.510797024 CET53521991.1.1.1192.168.2.24
                                    Mar 12, 2025 10:37:06.958791971 CET53521991.1.1.1192.168.2.24
                                    Mar 12, 2025 10:37:06.958956957 CET5219953192.168.2.241.1.1.1
                                    Mar 12, 2025 10:37:06.963907003 CET53521991.1.1.1192.168.2.24
                                    Mar 12, 2025 10:37:06.963973045 CET5219953192.168.2.241.1.1.1
                                    Mar 12, 2025 10:37:52.086551905 CET5943953192.168.2.241.1.1.1
                                    Mar 12, 2025 10:37:52.091270924 CET53594391.1.1.1192.168.2.24
                                    Mar 12, 2025 10:37:52.091346025 CET5943953192.168.2.241.1.1.1
                                    Mar 12, 2025 10:37:52.091388941 CET5943953192.168.2.241.1.1.1
                                    Mar 12, 2025 10:37:52.096103907 CET53594391.1.1.1192.168.2.24
                                    Mar 12, 2025 10:37:52.563316107 CET53594391.1.1.1192.168.2.24
                                    Mar 12, 2025 10:37:52.608691931 CET5943953192.168.2.241.1.1.1
                                    Mar 12, 2025 10:37:52.667047024 CET5943953192.168.2.241.1.1.1
                                    Mar 12, 2025 10:37:52.667768002 CET59440443192.168.2.245.161.200.29
                                    Mar 12, 2025 10:37:52.667818069 CET443594405.161.200.29192.168.2.24
                                    Mar 12, 2025 10:37:52.667926073 CET59440443192.168.2.245.161.200.29
                                    Mar 12, 2025 10:37:52.668910027 CET59440443192.168.2.245.161.200.29
                                    Mar 12, 2025 10:37:52.668925047 CET443594405.161.200.29192.168.2.24
                                    Mar 12, 2025 10:37:52.672029972 CET53594391.1.1.1192.168.2.24
                                    Mar 12, 2025 10:37:52.672106981 CET5943953192.168.2.241.1.1.1
                                    Mar 12, 2025 10:37:55.700918913 CET443594405.161.200.29192.168.2.24
                                    Mar 12, 2025 10:37:55.701147079 CET59440443192.168.2.245.161.200.29
                                    Mar 12, 2025 10:37:55.701379061 CET59440443192.168.2.245.161.200.29
                                    Mar 12, 2025 10:37:55.701492071 CET443594405.161.200.29192.168.2.24
                                    Mar 12, 2025 10:37:55.701548100 CET59440443192.168.2.245.161.200.29
                                    Mar 12, 2025 10:37:55.701936960 CET59441443192.168.2.245.161.200.29
                                    Mar 12, 2025 10:37:55.701973915 CET443594415.161.200.29192.168.2.24
                                    Mar 12, 2025 10:37:55.702054977 CET59441443192.168.2.245.161.200.29
                                    Mar 12, 2025 10:37:55.702343941 CET59441443192.168.2.245.161.200.29
                                    Mar 12, 2025 10:37:55.702354908 CET443594415.161.200.29192.168.2.24
                                    Mar 12, 2025 10:37:58.736074924 CET443594415.161.200.29192.168.2.24
                                    Mar 12, 2025 10:37:58.736324072 CET59441443192.168.2.245.161.200.29
                                    Mar 12, 2025 10:37:58.736557961 CET59441443192.168.2.245.161.200.29
                                    Mar 12, 2025 10:37:58.736680984 CET443594415.161.200.29192.168.2.24
                                    Mar 12, 2025 10:37:58.736738920 CET59441443192.168.2.245.161.200.29
                                    Mar 12, 2025 10:38:07.260529995 CET5737453192.168.2.241.1.1.1
                                    Mar 12, 2025 10:38:07.266632080 CET53573741.1.1.1192.168.2.24
                                    Mar 12, 2025 10:38:07.266742945 CET5737453192.168.2.241.1.1.1
                                    Mar 12, 2025 10:38:07.272139072 CET5737453192.168.2.241.1.1.1
                                    Mar 12, 2025 10:38:07.278386116 CET53573741.1.1.1192.168.2.24
                                    Mar 12, 2025 10:38:07.733071089 CET53573741.1.1.1192.168.2.24
                                    Mar 12, 2025 10:38:07.733258963 CET5737453192.168.2.241.1.1.1
                                    Mar 12, 2025 10:38:07.733956099 CET57375443192.168.2.2413.107.246.40
                                    Mar 12, 2025 10:38:07.733995914 CET4435737513.107.246.40192.168.2.24
                                    Mar 12, 2025 10:38:07.734071016 CET57376443192.168.2.2413.107.246.40
                                    Mar 12, 2025 10:38:07.734078884 CET4435737613.107.246.40192.168.2.24
                                    Mar 12, 2025 10:38:07.734117031 CET57375443192.168.2.2413.107.246.40
                                    Mar 12, 2025 10:38:07.734117031 CET57376443192.168.2.2413.107.246.40
                                    Mar 12, 2025 10:38:07.734697104 CET57376443192.168.2.2413.107.246.40
                                    Mar 12, 2025 10:38:07.734708071 CET4435737613.107.246.40192.168.2.24
                                    Mar 12, 2025 10:38:07.734944105 CET57375443192.168.2.2413.107.246.40
                                    Mar 12, 2025 10:38:07.734961033 CET4435737513.107.246.40192.168.2.24
                                    Mar 12, 2025 10:38:07.738475084 CET53573741.1.1.1192.168.2.24
                                    Mar 12, 2025 10:38:07.738579035 CET5737453192.168.2.241.1.1.1
                                    Mar 12, 2025 10:38:08.780576944 CET6395053192.168.2.241.1.1.1
                                    Mar 12, 2025 10:38:08.785218954 CET53639501.1.1.1192.168.2.24
                                    Mar 12, 2025 10:38:08.787669897 CET6395053192.168.2.241.1.1.1
                                    Mar 12, 2025 10:38:08.795350075 CET53639501.1.1.1192.168.2.24
                                    Mar 12, 2025 10:38:09.230997086 CET6395053192.168.2.241.1.1.1
                                    Mar 12, 2025 10:38:09.235996008 CET53639501.1.1.1192.168.2.24
                                    Mar 12, 2025 10:38:09.236066103 CET6395053192.168.2.241.1.1.1
                                    Mar 12, 2025 10:38:09.640527010 CET4435737613.107.246.40192.168.2.24
                                    Mar 12, 2025 10:38:09.640587091 CET57376443192.168.2.2413.107.246.40
                                    Mar 12, 2025 10:38:09.645638943 CET57376443192.168.2.2413.107.246.40
                                    Mar 12, 2025 10:38:09.645663977 CET4435737613.107.246.40192.168.2.24
                                    Mar 12, 2025 10:38:09.646179914 CET4435737613.107.246.40192.168.2.24
                                    Mar 12, 2025 10:38:09.654433966 CET57376443192.168.2.2413.107.246.40
                                    Mar 12, 2025 10:38:09.700329065 CET4435737613.107.246.40192.168.2.24
                                    Mar 12, 2025 10:38:09.734613895 CET4435737513.107.246.40192.168.2.24
                                    Mar 12, 2025 10:38:09.734716892 CET57375443192.168.2.2413.107.246.40
                                    Mar 12, 2025 10:38:09.737042904 CET57375443192.168.2.2413.107.246.40
                                    Mar 12, 2025 10:38:09.737052917 CET4435737513.107.246.40192.168.2.24
                                    Mar 12, 2025 10:38:09.737324953 CET4435737513.107.246.40192.168.2.24
                                    Mar 12, 2025 10:38:09.738148928 CET57375443192.168.2.2413.107.246.40
                                    Mar 12, 2025 10:38:09.784332991 CET4435737513.107.246.40192.168.2.24
                                    Mar 12, 2025 10:38:10.094199896 CET4435737613.107.246.40192.168.2.24
                                    Mar 12, 2025 10:38:10.094280958 CET4435737613.107.246.40192.168.2.24
                                    Mar 12, 2025 10:38:10.094501972 CET57376443192.168.2.2413.107.246.40
                                    Mar 12, 2025 10:38:10.095206976 CET57376443192.168.2.2413.107.246.40
                                    Mar 12, 2025 10:38:10.095206976 CET57376443192.168.2.2413.107.246.40
                                    Mar 12, 2025 10:38:10.095227957 CET4435737613.107.246.40192.168.2.24
                                    Mar 12, 2025 10:38:10.095240116 CET4435737613.107.246.40192.168.2.24
                                    Mar 12, 2025 10:38:10.207231998 CET4435737513.107.246.40192.168.2.24
                                    Mar 12, 2025 10:38:10.207258940 CET4435737513.107.246.40192.168.2.24
                                    Mar 12, 2025 10:38:10.207326889 CET4435737513.107.246.40192.168.2.24
                                    Mar 12, 2025 10:38:10.207354069 CET57375443192.168.2.2413.107.246.40
                                    Mar 12, 2025 10:38:10.207418919 CET57375443192.168.2.2413.107.246.40
                                    Mar 12, 2025 10:38:10.214087963 CET57375443192.168.2.2413.107.246.40
                                    Mar 12, 2025 10:38:10.214088917 CET57375443192.168.2.2413.107.246.40
                                    Mar 12, 2025 10:38:10.214121103 CET4435737513.107.246.40192.168.2.24
                                    Mar 12, 2025 10:38:10.214134932 CET4435737513.107.246.40192.168.2.24
                                    TimestampSource PortDest PortSource IPDest IP
                                    Mar 12, 2025 10:37:06.498912096 CET53542721.1.1.1192.168.2.24
                                    Mar 12, 2025 10:37:52.079663038 CET5575153192.168.2.241.1.1.1
                                    Mar 12, 2025 10:37:52.086148977 CET53557511.1.1.1192.168.2.24
                                    Mar 12, 2025 10:38:07.253231049 CET5575153192.168.2.241.1.1.1
                                    Mar 12, 2025 10:38:07.259876966 CET53557511.1.1.1192.168.2.24
                                    Mar 12, 2025 10:38:08.776526928 CET53557511.1.1.1192.168.2.24
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Mar 12, 2025 10:37:52.079663038 CET192.168.2.241.1.1.10x261fStandard query (0)st3.proA (IP address)IN (0x0001)false
                                    Mar 12, 2025 10:37:52.091388941 CET192.168.2.241.1.1.10x1Standard query (0)st3.proA (IP address)IN (0x0001)false
                                    Mar 12, 2025 10:38:07.253231049 CET192.168.2.241.1.1.10x63cdStandard query (0)otelrules.svc.static.microsoftA (IP address)IN (0x0001)false
                                    Mar 12, 2025 10:38:07.272139072 CET192.168.2.241.1.1.10x1Standard query (0)otelrules.svc.static.microsoftA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Mar 12, 2025 10:37:04.820569038 CET1.1.1.1192.168.2.240x7f0cNo error (0)ecs-office.s-0005.dual-s-msedge.netshed.s-0005.dual-s-dc-msedge.netCNAME (Canonical name)IN (0x0001)false
                                    Mar 12, 2025 10:37:04.820569038 CET1.1.1.1192.168.2.240x7f0cNo error (0)shed.s-0005.dual-s-dc-msedge.nets-0005.dual-s-dc-msedge.netCNAME (Canonical name)IN (0x0001)false
                                    Mar 12, 2025 10:37:04.820569038 CET1.1.1.1192.168.2.240x7f0cNo error (0)s-0005.dual-s-dc-msedge.net52.123.131.14A (IP address)IN (0x0001)false
                                    Mar 12, 2025 10:37:04.820569038 CET1.1.1.1192.168.2.240x7f0cNo error (0)s-0005.dual-s-dc-msedge.net52.123.130.14A (IP address)IN (0x0001)false
                                    Mar 12, 2025 10:37:06.962568045 CET1.1.1.1192.168.2.240x2633No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                    Mar 12, 2025 10:37:06.962568045 CET1.1.1.1192.168.2.240x2633No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                    Mar 12, 2025 10:37:52.563316107 CET1.1.1.1192.168.2.240x1No error (0)st3.pro5.161.200.29A (IP address)IN (0x0001)false
                                    Mar 12, 2025 10:38:06.859646082 CET1.1.1.1192.168.2.240x89e2No error (0)res-stls-prod.edgesuite.net.globalredir.akadns88.neta726.dscd.akamai.netCNAME (Canonical name)IN (0x0001)false
                                    Mar 12, 2025 10:38:06.859646082 CET1.1.1.1192.168.2.240x89e2No error (0)a726.dscd.akamai.net2.22.242.113A (IP address)IN (0x0001)false
                                    Mar 12, 2025 10:38:06.859646082 CET1.1.1.1192.168.2.240x89e2No error (0)a726.dscd.akamai.net2.22.242.96A (IP address)IN (0x0001)false
                                    Mar 12, 2025 10:38:06.859646082 CET1.1.1.1192.168.2.240x89e2No error (0)a726.dscd.akamai.net2.22.242.91A (IP address)IN (0x0001)false
                                    Mar 12, 2025 10:38:06.859646082 CET1.1.1.1192.168.2.240x89e2No error (0)a726.dscd.akamai.net2.22.242.99A (IP address)IN (0x0001)false
                                    Mar 12, 2025 10:38:06.859646082 CET1.1.1.1192.168.2.240x89e2No error (0)a726.dscd.akamai.net2.22.242.10A (IP address)IN (0x0001)false
                                    Mar 12, 2025 10:38:06.859646082 CET1.1.1.1192.168.2.240x89e2No error (0)a726.dscd.akamai.net2.22.242.114A (IP address)IN (0x0001)false
                                    Mar 12, 2025 10:38:06.859646082 CET1.1.1.1192.168.2.240x89e2No error (0)a726.dscd.akamai.net2.22.242.104A (IP address)IN (0x0001)false
                                    Mar 12, 2025 10:38:06.859646082 CET1.1.1.1192.168.2.240x89e2No error (0)a726.dscd.akamai.net2.22.242.11A (IP address)IN (0x0001)false
                                    Mar 12, 2025 10:38:06.859646082 CET1.1.1.1192.168.2.240x89e2No error (0)a726.dscd.akamai.net2.22.242.9A (IP address)IN (0x0001)false
                                    Mar 12, 2025 10:38:07.733071089 CET1.1.1.1192.168.2.240x1No error (0)otelrules.svc.static.microsoftotelrules-bzhndjfje8dvh5fd.z01.azurefd.netCNAME (Canonical name)IN (0x0001)false
                                    Mar 12, 2025 10:38:07.733071089 CET1.1.1.1192.168.2.240x1No error (0)otelrules-bzhndjfje8dvh5fd.z01.azurefd.netstar-azurefd-prod.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                                    Mar 12, 2025 10:38:07.733071089 CET1.1.1.1192.168.2.240x1No error (0)star-azurefd-prod.trafficmanager.netshed.dual-low.s-part-0012.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                    Mar 12, 2025 10:38:07.733071089 CET1.1.1.1192.168.2.240x1No error (0)shed.dual-low.s-part-0012.t-0009.t-msedge.nets-part-0012.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                    Mar 12, 2025 10:38:07.733071089 CET1.1.1.1192.168.2.240x1No error (0)s-part-0012.t-0009.t-msedge.net13.107.246.40A (IP address)IN (0x0001)false
                                    Mar 12, 2025 10:38:08.059362888 CET1.1.1.1192.168.2.240xdee3No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                    Mar 12, 2025 10:38:08.059362888 CET1.1.1.1192.168.2.240xdee3No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                    Mar 12, 2025 10:38:23.291697979 CET1.1.1.1192.168.2.240x6f4bNo error (0)res-stls-prod.edgesuite.net.globalredir.akadns88.neta726.dscd.akamai.netCNAME (Canonical name)IN (0x0001)false
                                    Mar 12, 2025 10:38:23.291697979 CET1.1.1.1192.168.2.240x6f4bNo error (0)a726.dscd.akamai.net95.101.54.113A (IP address)IN (0x0001)false
                                    Mar 12, 2025 10:38:23.291697979 CET1.1.1.1192.168.2.240x6f4bNo error (0)a726.dscd.akamai.net2.16.202.114A (IP address)IN (0x0001)false
                                    Mar 12, 2025 10:38:23.291697979 CET1.1.1.1192.168.2.240x6f4bNo error (0)a726.dscd.akamai.net2.16.202.122A (IP address)IN (0x0001)false
                                    Mar 12, 2025 10:38:23.291697979 CET1.1.1.1192.168.2.240x6f4bNo error (0)a726.dscd.akamai.net95.101.54.208A (IP address)IN (0x0001)false
                                    • otelrules.svc.static.microsoft
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.245737613.107.246.404437244C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                    TimestampBytes transferredDirectionData
                                    2025-03-12 09:38:09 UTC214OUTGET /rules/rule170146v0s19.xml HTTP/1.1
                                    Connection: Keep-Alive
                                    Accept-Encoding: gzip
                                    User-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.18129; Pro)
                                    Host: otelrules.svc.static.microsoft
                                    2025-03-12 09:38:10 UTC498INHTTP/1.1 200 OK
                                    Date: Wed, 12 Mar 2025 09:38:09 GMT
                                    Content-Type: text/xml
                                    Content-Length: 461
                                    Connection: close
                                    Cache-Control: public, max-age=604800, immutable
                                    Last-Modified: Thu, 14 Nov 2024 16:14:57 GMT
                                    ETag: "0x8DD04C77BDE7614"
                                    x-ms-request-id: 22968759-101e-0065-7b1c-934088000000
                                    x-ms-version: 2018-03-28
                                    x-azure-ref: 20250312T093809Z-er19df8ddfb7kdjvhC1EWR5was0000000650000000003hp4
                                    x-fd-int-roxy-purgeid: 0
                                    X-Cache-Info: L2_T2
                                    X-Cache: TCP_REMOTE_HIT
                                    Accept-Ranges: bytes
                                    2025-03-12 09:38:10 UTC461INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 37 30 31 34 36 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 47 72 61 70 68 69 63 73 2e 45 78 70 6f 72 74 42 75 6c 6c 65 74 42 6c 69 70 43 45 78 63 65 70 74 69 6f 6e 22 20 41 54 54 3d 22 63 66 63 66 64 62 39 31 63 36 38 63 34 33 32 39 62 62 38 62 37 63 62 37 62 61 62 62 33 63 66 37 2d 65 30 38 32 63 32 66 32 2d 65 66 31 64 2d 34 32 37 61 2d 61 63 34 64 2d 62 30 62 37 30 30 61 66 65 37 61 37 2d 37 36 35 35 22 20 44 43 61 3d 22 50 53 55 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 54 53 20 54 3d 22 31 22 20 49 64 3d 22 34 38 39 66 34 22 20
                                    Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="170146" V="0" DC="SM" EN="Office.Graphics.ExportBulletBlipCException" ATT="cfcfdb91c68c4329bb8b7cb7babb3cf7-e082c2f2-ef1d-427a-ac4d-b0b700afe7a7-7655" DCa="PSU" xmlns=""> <S> <UTS T="1" Id="489f4"


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    1192.168.2.245737513.107.246.404437244C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                    TimestampBytes transferredDirectionData
                                    2025-03-12 09:38:09 UTC215OUTGET /rules/rule120201v19s19.xml HTTP/1.1
                                    Connection: Keep-Alive
                                    Accept-Encoding: gzip
                                    User-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.18129; Pro)
                                    Host: otelrules.svc.static.microsoft
                                    2025-03-12 09:38:10 UTC522INHTTP/1.1 200 OK
                                    Date: Wed, 12 Mar 2025 09:38:09 GMT
                                    Content-Type: text/xml
                                    Content-Length: 2781
                                    Connection: close
                                    Vary: Accept-Encoding
                                    Cache-Control: public, max-age=604800, immutable
                                    Last-Modified: Tue, 31 Dec 2024 22:07:50 GMT
                                    ETag: "0x8DD29E791389B5C"
                                    x-ms-request-id: fc70c3be-601e-0032-392a-93eebb000000
                                    x-ms-version: 2018-03-28
                                    x-azure-ref: 20250312T093809Z-er19df8ddfbndqwwhC1EWRw2vw00000009n0000000001wd5
                                    x-fd-int-roxy-purgeid: 0
                                    X-Cache-Info: L2_T2
                                    X-Cache: TCP_REMOTE_HIT
                                    Accept-Ranges: bytes
                                    2025-03-12 09:38:10 UTC2781INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 32 30 31 22 20 56 3d 22 31 39 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 53 79 73 74 65 6d 2e 53 79 73 74 65 6d 48 65 61 6c 74 68 55 73 61 67 65 2e 43 6c 69 63 6b 53 74 72 65 61 6d 22 20 41 54 54 3d 22 63 64 38 33 36 36 32 36 36 31 31 63 34 63 61 61 61 38 66 63 35 62 32 65 37 32 38 65 65 38 31 64 2d 33 62 36 64 36 63 34 35 2d 36 33 37 37 2d 34 62 66 35 2d 39 37 39 32 2d 64 62 66 38 65 31 38 38 31 30 38 38 2d 37 35 32 31 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 55 73 61 67 65 22 20 44 43 61 3d 22 50 53 55 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20
                                    Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120201" V="19" DC="SM" EN="Office.System.SystemHealthUsage.ClickStream" ATT="cd836626611c4caaa8fc5b2e728ee81d-3b6d6c45-6377-4bf5-9792-dbf8e1881088-7521" SP="CriticalUsage" DCa="PSU" xmlns=""> <RIS>


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:05:36:57
                                    Start date:12/03/2025
                                    Path:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
                                    Imagebase:0x7ff654c10000
                                    File size:70'082'712 bytes
                                    MD5 hash:F9F7B6C42211B06E7AC3E4B60AA8FB77
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate
                                    Has exited:false

                                    Target ID:14
                                    Start time:05:38:02
                                    Start date:12/03/2025
                                    Path:C:\Windows\splwow64.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\splwow64.exe 12288
                                    Imagebase:0x7ff60a170000
                                    File size:192'512 bytes
                                    MD5 hash:AF4A7EBF6114EE9E6FBCC910EC3C96E6
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate
                                    Has exited:false

                                    Target ID:19
                                    Start time:05:38:23
                                    Start date:12/03/2025
                                    Path:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\user\Desktop\Purchase Inquiry.xla.xlsx"
                                    Imagebase:0x7ff654c10000
                                    File size:70'082'712 bytes
                                    MD5 hash:F9F7B6C42211B06E7AC3E4B60AA8FB77
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate
                                    Has exited:true

                                    No disassembly