Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Fw_ VN MSG 4_42_16 AM DURATION_0f0b5f5e889448e7c935c0db95b1d2a6.msg

Overview

General Information

Sample name:Fw_ VN MSG 4_42_16 AM DURATION_0f0b5f5e889448e7c935c0db95b1d2a6.msg
Analysis ID:1636217
MD5:6705df89554d8595af60a9a39ff6ba54
SHA1:8fbcd160dacd1db49077080b8b7a2c427aabb87b
SHA256:acf597809d220384bdfdda5aef3f69bcfe5f75b83884b50b5435d566de4fa8a6
Infos:

Detection

HTMLPhisher, Invisible JS, Tycoon2FA
Score:100
Range:0 - 100
Confidence:100%

Signatures

AI detected phishing page
Yara detected AntiDebug via timestamp check
Yara detected HtmlPhish10
Yara detected Invisible JS
Yara detected Obfuscation Via HangulCharacter
Yara detected Tycoon 2FA PaaS
AI detected suspicious Javascript
AI detected suspicious elements in Email content
Creates a window with clipboard capturing capabilities
Detected non-DNS traffic on DNS port
HTML body contains password input but no form action
HTML page contains hidden javascript code
HTML title does not match URL
Invalid T&C link found
None HTTPS page querying sensitive user data (password, username or email)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Office Autorun Keys Modification
Sigma detected: Outlook Security Settings Updated - Registry
Sigma detected: Suspicious Office Outbound Connections
Stores large binary data to the registry
Suricata IDS alerts with low severity for network traffic
Uses Javascript AES encryption / decryption (likely to hide suspicious Javascript code)

Classification

  • System is w10x64_ra
  • OUTLOOK.EXE (PID: 6244 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /f "C:\Users\user\Desktop\Fw_ VN MSG 4_42_16 AM DURATION_0f0b5f5e889448e7c935c0db95b1d2a6.msg" MD5: 91A5292942864110ED734005B7E005C0)
    • ai.exe (PID: 6436 cmdline: "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "327CF232-478F-424D-9E3C-188F31BBD36C" "F394A1B7-BDFB-41EA-B46E-44B5B5C058F7" "6244" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD)
  • OUTLOOK.EXE (PID: 6992 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /f "C:\Users\user\Desktop\VN MSG 44216 AM DURATION_0f0b5f5e889448e7c935c0db95b1d2a6.msg" MD5: 91A5292942864110ED734005B7E005C0)
    • ai.exe (PID: 3036 cmdline: "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "44C8A6AD-77B9-4C21-B5EA-E22A58E8F6D1" "C8C20967-5F0F-4E8A-A73E-B6843BCF99E7" "6992" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD)
    • chrome.exe (PID: 6788 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\1MQYPS24\Play_VM-NowLaura.barduscoAudiowav011.html MD5: E81F54E6C1129887AEA47E7D092680BF)
      • chrome.exe (PID: 6488 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2040,i,16703488024071392245,12420170264974409771,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2128 /prefetch:3 MD5: E81F54E6C1129887AEA47E7D092680BF)
  • cleanup
SourceRuleDescriptionAuthorStrings
0.2.pages.csvJoeSecurity_Tycoon2FA_1Yara detected Tycoon 2FA PaaSJoe Security
    0.2.pages.csvJoeSecurity_HangulCharacterYara detected Obfuscation Via HangulCharacterJoe Security
      0.1.pages.csvJoeSecurity_Tycoon2FA_1Yara detected Tycoon 2FA PaaSJoe Security
        0.1.pages.csvJoeSecurity_HangulCharacterYara detected Obfuscation Via HangulCharacterJoe Security
          0.2.pages.csvJoeSecurity_InvisibleJSYara detected Invisible JSJoe Security
            Click to see the 34 entries
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 6244, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Addins\OneNote.OutlookAddin\1
            Source: Registry Key setAuthor: frack113: Data: Details: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\1MQYPS24\, EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 6992, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Security\OutlookSecureTempFolder
            Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.16, DestinationIsIpv6: false, DestinationPort: 64066, EventID: 3, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, Initiated: true, ProcessId: 6244, Protocol: tcp, SourceIp: 52.123.129.14, SourceIsIpv6: false, SourcePort: 443
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-03-12T14:42:43.954450+010020283713Unknown Traffic192.168.2.166407613.107.246.76443TCP
            2025-03-12T14:42:55.939197+010020283713Unknown Traffic192.168.2.166408013.107.246.76443TCP
            2025-03-12T14:42:55.976795+010020283713Unknown Traffic192.168.2.166408113.107.246.76443TCP

            Click to jump to signature section

            Show All Signature Results

            Phishing

            barindex
            Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/1MQYPS24/Play_VM-NowLaura.barduscoAudiowav011.html#Alaura.bardusco@beantech.itJoe Sandbox AI: Score: 10 Reasons: HTML file with login form DOM: 0.8.pages.csv
            Source: Yara matchFile source: 0.7.pages.csv, type: HTML
            Source: Yara matchFile source: 0.8.pages.csv, type: HTML
            Source: Yara matchFile source: 0.2.pages.csv, type: HTML
            Source: Yara matchFile source: 0.1.pages.csv, type: HTML
            Source: Yara matchFile source: 0.2.d.script.csv, type: HTML
            Source: Yara matchFile source: 0.14.d.script.csv, type: HTML
            Source: Yara matchFile source: 0.3.pages.csv, type: HTML
            Source: Yara matchFile source: 0.4.pages.csv, type: HTML
            Source: Yara matchFile source: 0.5.pages.csv, type: HTML
            Source: Yara matchFile source: 0.2.pages.csv, type: HTML
            Source: Yara matchFile source: 0.1.pages.csv, type: HTML
            Source: Yara matchFile source: 0.2.d.script.csv, type: HTML
            Source: Yara matchFile source: 0.14.d.script.csv, type: HTML
            Source: Yara matchFile source: 0.3.pages.csv, type: HTML
            Source: Yara matchFile source: 0.4.pages.csv, type: HTML
            Source: Yara matchFile source: 0.5.pages.csv, type: HTML
            Source: Yara matchFile source: 0.30..script.csv, type: HTML
            Source: Yara matchFile source: 0.27.d.script.csv, type: HTML
            Source: Yara matchFile source: 0.2.pages.csv, type: HTML
            Source: Yara matchFile source: 0.1.pages.csv, type: HTML
            Source: Yara matchFile source: 0.8..script.csv, type: HTML
            Source: Yara matchFile source: 0.16..script.csv, type: HTML
            Source: Yara matchFile source: 0.15.d.script.csv, type: HTML
            Source: Yara matchFile source: 0.3.d.script.csv, type: HTML
            Source: Yara matchFile source: 0.11.d.script.csv, type: HTML
            Source: Yara matchFile source: 0.3.pages.csv, type: HTML
            Source: Yara matchFile source: 0.21..script.csv, type: HTML
            Source: Yara matchFile source: 0.19.d.script.csv, type: HTML
            Source: Yara matchFile source: 0.22..script.csv, type: HTML
            Source: Yara matchFile source: 0.4.pages.csv, type: HTML
            Source: Yara matchFile source: 0.5.pages.csv, type: HTML
            Source: Yara matchFile source: 0.7.pages.csv, type: HTML
            Source: Yara matchFile source: 0.8.pages.csv, type: HTML
            Source: 0.1.d.script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: anonymous function... This script demonstrates several high-risk behaviors, including dynamic code execution, data exfiltration, and the use of obfuscated URLs. It creates an iframe with a sandboxed environment that allows for a wide range of potentially malicious actions, such as navigation, modals, scripts, and form submissions. The script also attempts to replace the entire document content, which is a strong indicator of malicious intent. Overall, this script poses a significant security risk and should be treated with caution.
            Source: 0.3.d.script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: anonymous function... This script demonstrates several high-risk behaviors, including detecting browser automation tools, blocking keyboard shortcuts and right-click context menus, and redirecting the user to an external website after a delay. These behaviors are highly suspicious and indicate potential malicious intent, such as preventing the user from interacting with the page or redirecting them to a phishing or malware site.
            Source: 0.2.d.script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: anonymous function... This script demonstrates high-risk behaviors, including dynamic code execution through the use of `eval()` and potential data exfiltration. The obfuscated code and use of proxy objects further increase the risk. This script should be considered highly suspicious and potentially malicious.
            Source: 0.0..script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: file:///C:/Users/user/AppData/Local/Microsoft/Wind... This script demonstrates several high-risk behaviors, including dynamic code execution, data exfiltration, and the use of obfuscated code. The script appears to be collecting user data and executing remote code, which poses a significant security risk. Additionally, the use of a hash parameter in the URL suggests potential phishing or redirection attempts. Overall, this script exhibits a high level of malicious intent and should be treated with caution.
            Source: 0.4..script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: https://cf.zwuufruv.ru/TtxtK/... This script demonstrates several high-risk behaviors, including dynamic code execution, data exfiltration, and obfuscated code/URLs. The use of `atob` and `decodeURIComponent` to decode and execute remote code is a clear indicator of malicious intent. Additionally, the script appears to be sending data to an unknown domain, which raises further concerns about potential data exfiltration. Overall, this script exhibits a high level of risk and should be treated with caution.
            Source: EmailJoe Sandbox AI: Detected potential phishing email: Suspicious subject line with random alphanumeric string (DURATION_0f0b5f5e889448e7c935c0db95b1d2a6). Subject line format suggests automated/suspicious message (VN MSG with timestamp). Empty or suspicious attachment naming pattern (Outlook-0btjrxkj)
            Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/1MQYPS24/Play_VM-NowLaura.barduscoAudiowav011.html#Alaura.bardusco@beantech.itHTTP Parser: <input type="password" .../> found but no <form action="...
            Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/1MQYPS24/Play_VM-NowLaura.barduscoAudiowav011.html#Alaura.bardusco@beantech.itHTTP Parser: Base64 decoded: <!DOCTYPE html><html lang="en"><head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <title>Office 365 Documentation</title> <style> body { font-family: Arial, sans-serif...
            Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/1MQYPS24/Play_VM-NowLaura.barduscoAudiowav011.html#Alaura.bardusco@beantech.itHTTP Parser: Title: Voice Mail does not match URL
            Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/1MQYPS24/Play_VM-NowLaura.barduscoAudiowav011.html#Alaura.bardusco@beantech.itHTTP Parser: Invalid link: Terms of use
            Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/1MQYPS24/Play_VM-NowLaura.barduscoAudiowav011.html#Alaura.bardusco@beantech.itHTTP Parser: Invalid link: Privacy & cookies
            Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/1MQYPS24/Play_VM-NowLaura.barduscoAudiowav011.html#Alaura.bardusco@beantech.itHTTP Parser: Invalid link: Terms of use
            Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/1MQYPS24/Play_VM-NowLaura.barduscoAudiowav011.html#Alaura.bardusco@beantech.itHTTP Parser: Invalid link: Privacy & cookies
            Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/1MQYPS24/Play_VM-NowLaura.barduscoAudiowav011.html#Alaura.bardusco@beantech.itHTTP Parser: Has password / email / username input fields
            Source: https://cf.zwuufruv.ru/TtxtK/HTTP Parser: function qdvxpxzlad(){unsoegxzmj = atob("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...
            Source: anonymous functionHTTP Parser: var otherweburl = "";var websitenames = ["godaddy", "okta"];var bes = ["apple.com","netflix.com"];var pes = ["https:\/\/t.me\/","https:\/\/t.com\/","t.me\/","https:\/\/t.me.com\/","t.me.com\/","t.me@","https:\/\/t.me@","https:\/\/t.me","https:\/\/t.com","t.me","https:\/\/t.me.com","t.me.com","t.me\/@","https:\/\/t.me\/@","https:\/\/t.me@\/","t.me@\/","https:\/\/www.telegram.me\/","https:\/\/www.telegram.me"];var capnum = 1;var appnum = 1;var pvn = 0;var view = "";var pagelinkval = "gktoyh";var emailcheck = "laura.bardusco@beantech.it";var webname = "rtrim(/web8/, '/')";var urlo = "/tdahzsl8iwnq05y77fxvnpbomhzylhujazgajuke7a96vktrvyp32";var gdf = "/ghc6v7egtgbubsxoygbn3xp595v5fuvq8xpo2j0ggux27ix69ab115";var odf = "/ijf3gzhb3mrqwyqvnuygebhw5hgmhgyz4lrtawwtfihndaxcd650";var twa = 0;var currentreq = null;var requestsent = false;var pagedata = "";var redirecturl = "";var useragent = navigator.useragent;var browsername;var userip;var usercountry;var errorcodeexecuted ...
            Source: EmailClassification: Credential Stealer
            Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/1MQYPS24/Play_VM-NowLaura.barduscoAudiowav011.html#Alaura.bardusco@beantech.itHTTP Parser: <input type="password" .../> found
            Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/1MQYPS24/Play_VM-NowLaura.barduscoAudiowav011.html#Alaura.bardusco@beantech.itHTTP Parser: No favicon
            Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/1MQYPS24/Play_VM-NowLaura.barduscoAudiowav011.html#Alaura.bardusco@beantech.itHTTP Parser: No favicon
            Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/1MQYPS24/Play_VM-NowLaura.barduscoAudiowav011.html#Alaura.bardusco@beantech.itHTTP Parser: No favicon
            Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/1MQYPS24/Play_VM-NowLaura.barduscoAudiowav011.html#Alaura.bardusco@beantech.itHTTP Parser: No <meta name="author".. found
            Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/1MQYPS24/Play_VM-NowLaura.barduscoAudiowav011.html#Alaura.bardusco@beantech.itHTTP Parser: No <meta name="author".. found
            Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/1MQYPS24/Play_VM-NowLaura.barduscoAudiowav011.html#Alaura.bardusco@beantech.itHTTP Parser: No <meta name="copyright".. found
            Source: file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/1MQYPS24/Play_VM-NowLaura.barduscoAudiowav011.html#Alaura.bardusco@beantech.itHTTP Parser: No <meta name="copyright".. found
            Source: unknownHTTPS traffic detected: 13.107.246.76:443 -> 192.168.2.16:64076 version: TLS 1.2
            Source: global trafficTCP traffic: 192.168.2.16:64065 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.16:64065 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.16:64065 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.16:64065 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.16:64065 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.16:64065 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.16:64065 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.16:64065 -> 1.1.1.1:53
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.16:64066 -> 52.123.129.14:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.16:64076 -> 13.107.246.76:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.16:64080 -> 13.107.246.76:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.16:64081 -> 13.107.246.76:443
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
            Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
            Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.195
            Source: unknownTCP traffic detected without corresponding DNS query: 199.232.214.172
            Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.195
            Source: unknownTCP traffic detected without corresponding DNS query: 199.232.214.172
            Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
            Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
            Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /rules/outlook.exe-Production-v19.bundle HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Outlook 16.0.16827; Pro)Host: otelrules.svc.static.microsoft
            Source: global trafficHTTP traffic detected: GET /rules/rule120603v8s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Outlook 16.0.16827; Pro)Host: otelrules.svc.static.microsoft
            Source: global trafficHTTP traffic detected: GET /rules/rule120607v1s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Outlook 16.0.16827; Pro)Host: otelrules.svc.static.microsoft
            Source: global trafficHTTP traffic detected: GET /turnstile/v0/api.js?onload=onloadTurnstileCallback HTTP/1.1Host: challenges.cloudflare.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptSec-Fetch-Storage-Access: activeReferer: https://cf.zwuufruv.ru/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /jquery-3.6.0.min.js HTTP/1.1Host: code.jquery.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptSec-Fetch-Storage-Access: activeReferer: https://cf.zwuufruv.ru/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /ajax/libs/crypto-js/4.1.1/crypto-js.min.js HTTP/1.1Host: cdnjs.cloudflare.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptSec-Fetch-Storage-Access: activeReferer: https://cf.zwuufruv.ru/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /turnstile/v0/g/f3b948d8acb8/api.js HTTP/1.1Host: challenges.cloudflare.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptSec-Fetch-Storage-Access: activeReferer: https://cf.zwuufruv.ru/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /ajax/libs/font-awesome/6.1.1/css/all.min.css HTTP/1.1Host: cdnjs.cloudflare.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: text/css,*/*;q=0.1Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: styleSec-Fetch-Storage-Access: activeReferer: https://cf.zwuufruv.ru/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /fent/randexp.js/releases/download/v0.4.3/randexp.min.js HTTP/1.1Host: github.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptSec-Fetch-Storage-Access: activeReferer: https://cf.zwuufruv.ru/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /w3css/4/w3.css HTTP/1.1Host: www.w3schools.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: text/css,*/*;q=0.1Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: styleSec-Fetch-Storage-Access: activeReferer: https://cf.zwuufruv.ru/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /github-production-release-asset-2e65be/2925284/11f3acf8-4ccb-11e6-8ce4-c179c0a212de?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20250312%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20250312T134339Z&X-Amz-Expires=300&X-Amz-Signature=47773c2a9d429106858b2da9578883eea32f5977d76a2b5e99dceff8f05cdd25&X-Amz-SignedHeaders=host&response-content-disposition=attachment%3B%20filename%3Drandexp.min.js&response-content-type=application%2Foctet-stream HTTP/1.1Host: objects.githubusercontent.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptSec-Fetch-Storage-Access: activeReferer: https://cf.zwuufruv.ru/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /ajax/libs/font-awesome/6.1.1/webfonts/fa-solid-900.woff2 HTTP/1.1Host: cdnjs.cloudflare.comConnection: keep-aliveOrigin: https://cf.zwuufruv.rusec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: fontReferer: https://cdnjs.cloudflare.com/ajax/libs/font-awesome/6.1.1/css/all.min.cssAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /ajax/libs/font-awesome/6.1.1/webfonts/fa-brands-400.woff2 HTTP/1.1Host: cdnjs.cloudflare.comConnection: keep-aliveOrigin: https://cf.zwuufruv.rusec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: fontReferer: https://cdnjs.cloudflare.com/ajax/libs/font-awesome/6.1.1/css/all.min.cssAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficDNS traffic detected: DNS query: otelrules.svc.static.microsoft
            Source: global trafficDNS traffic detected: DNS query: cf.zwuufruv.ru
            Source: global trafficDNS traffic detected: DNS query: www.google.com
            Source: global trafficDNS traffic detected: DNS query: code.jquery.com
            Source: global trafficDNS traffic detected: DNS query: challenges.cloudflare.com
            Source: global trafficDNS traffic detected: DNS query: cdnjs.cloudflare.com
            Source: global trafficDNS traffic detected: DNS query: lhsdg.tjezyf.ru
            Source: global trafficDNS traffic detected: DNS query: www.etsy.com
            Source: global trafficDNS traffic detected: DNS query: a.nel.cloudflare.com
            Source: global trafficDNS traffic detected: DNS query: fn8x.biijvi.ru
            Source: global trafficDNS traffic detected: DNS query: github.com
            Source: global trafficDNS traffic detected: DNS query: www.w3schools.com
            Source: global trafficDNS traffic detected: DNS query: ok4static.oktacdn.com
            Source: global trafficDNS traffic detected: DNS query: objects.githubusercontent.com
            Source: global trafficDNS traffic detected: DNS query: get.geojs.io
            Source: global trafficDNS traffic detected: DNS query: de5whbmbi5lifd37bmor3gvfb0yvt0snp0sy8lixtrf4k0o77i2.mybuycentr.ru
            Source: unknownHTTP traffic detected: POST /report/v4?s=8C1CHd6bBbnY%2BB6FQAZJ23mhoOyNrKYJCWnUg2BwumckZxjnBiD1wwfjG63aYDchiVWsUo4Rnq5vYF9QWB8RMqIap2fKLoRKSPfZ8k%2BaFwhC7P2WKjh1CKvOHI4I HTTP/1.1Host: a.nel.cloudflare.comConnection: keep-aliveContent-Length: 403Content-Type: application/reports+jsonOrigin: https://cf.zwuufruv.ruUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: unknownNetwork traffic detected: HTTP traffic on port 64102 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 64129 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64066
            Source: unknownNetwork traffic detected: HTTP traffic on port 64097 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 64115 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 64119 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 64109 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 64122 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 64080 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 64094 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 64101 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 64105 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 64130 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64110
            Source: unknownNetwork traffic detected: HTTP traffic on port 64126 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49679 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64076
            Source: unknownNetwork traffic detected: HTTP traffic on port 64098 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 64090 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64109
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64108
            Source: unknownNetwork traffic detected: HTTP traffic on port 64112 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 64116 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64101
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64100
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64103
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64102
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64105
            Source: unknownNetwork traffic detected: HTTP traffic on port 64066 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64081
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64086
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64121
            Source: unknownNetwork traffic detected: HTTP traffic on port 64108 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64120
            Source: unknownNetwork traffic detected: HTTP traffic on port 64099 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 64110 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 64076 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64080
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64119
            Source: unknownNetwork traffic detected: HTTP traffic on port 64113 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 64117 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64112
            Source: unknownNetwork traffic detected: HTTP traffic on port 64086 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64114
            Source: unknownNetwork traffic detected: HTTP traffic on port 64120 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64113
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64116
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64115
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64118
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64117
            Source: unknownNetwork traffic detected: HTTP traffic on port 64103 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 64128 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64094
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64097
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64130
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64096
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64099
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64098
            Source: unknownNetwork traffic detected: HTTP traffic on port 64124 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 64096 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64090
            Source: unknownNetwork traffic detected: HTTP traffic on port 64081 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 64118 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 64114 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 64121 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64122
            Source: unknownNetwork traffic detected: HTTP traffic on port 64100 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64124
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64126
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64129
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64128
            Source: unknownHTTPS traffic detected: 13.107.246.76:443 -> 192.168.2.16:64076 version: TLS 1.2
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEWindow created: window name: CLIPBRDWNDCLASS
            Source: classification engineClassification label: mal100.phis.evad.winMSG@26/8@41/170
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\Documents\Outlook Files\~Outlook Data File - NoEmail.pst.tmp
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20250312T0942240820-6244.etl
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile read: C:\Users\desktop.ini
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA
            Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /f "C:\Users\user\Desktop\Fw_ VN MSG 4_42_16 AM DURATION_0f0b5f5e889448e7c935c0db95b1d2a6.msg"
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "327CF232-478F-424D-9E3C-188F31BBD36C" "F394A1B7-BDFB-41EA-B46E-44B5B5C058F7" "6244" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
            Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /f "C:\Users\user\Desktop\VN MSG 44216 AM DURATION_0f0b5f5e889448e7c935c0db95b1d2a6.msg"
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "44C8A6AD-77B9-4C21-B5EA-E22A58E8F6D1" "C8C20967-5F0F-4E8A-A73E-B6843BCF99E7" "6992" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "327CF232-478F-424D-9E3C-188F31BBD36C" "F394A1B7-BDFB-41EA-B46E-44B5B5C058F7" "6244" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\1MQYPS24\Play_VM-NowLaura.barduscoAudiowav011.html
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2040,i,16703488024071392245,12420170264974409771,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2128 /prefetch:3
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "44C8A6AD-77B9-4C21-B5EA-E22A58E8F6D1" "C8C20967-5F0F-4E8A-A73E-B6843BCF99E7" "6992" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\1MQYPS24\Play_VM-NowLaura.barduscoAudiowav011.html
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2040,i,16703488024071392245,12420170264974409771,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2128 /prefetch:3
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: apphelp.dll
            Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: c2r64.dll
            Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: userenv.dll
            Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: msasn1.dll
            Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: kernel.appcore.dll
            Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptsp.dll
            Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: rsaenh.dll
            Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptbase.dll
            Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: gpapi.dll
            Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: c2r64.dll
            Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: userenv.dll
            Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: msasn1.dll
            Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: kernel.appcore.dll
            Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptsp.dll
            Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: rsaenh.dll
            Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptbase.dll
            Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: gpapi.dll
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{F959DBBB-3867-41F2-8E5F-3B8BEFAA81B3}\InprocServer32
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEWindow found: window name: SysTabControl32
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile opened: C:\Windows\SysWOW64\MsftEdit.dll
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEWindow detected: Number of UI elements: 16
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Common
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{2B379600-B42B-4FE9-A59C-A312FB934935} DeviceTicket
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: 0.15.d.script.csv, type: HTML
            Source: Yara matchFile source: 0.3.d.script.csv, type: HTML
            Source: Yara matchFile source: 0.21..script.csv, type: HTML
            Source: Yara matchFile source: 0.22..script.csv, type: HTML
            Source: Yara matchFile source: 0.7.pages.csv, type: HTML
            Source: Yara matchFile source: 0.8.pages.csv, type: HTML
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile Volume queried: C:\Windows\SysWOW64 FullSizeInformation
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile Volume queried: C:\Windows\SysWOW64 FullSizeInformation
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information queried: ProcessInformation
            Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeQueries volume information: C:\Program Files (x86)\Microsoft Office\root\Office16\AI\WordCombinedFloatieLreOnline.onnx VolumeInformation
            Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeQueries volume information: C:\Program Files (x86)\Microsoft Office\root\Office16\AI\WordCombinedFloatieLreOnline.onnx VolumeInformation
            Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity Information1
            Scripting
            Valid AccountsWindows Management Instrumentation21
            Browser Extensions
            1
            Process Injection
            1
            Masquerading
            OS Credential Dumping1
            Process Discovery
            Remote Services1
            Clipboard Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/Job1
            Scripting
            1
            DLL Side-Loading
            1
            Modify Registry
            LSASS Memory1
            File and Directory Discovery
            Remote Desktop ProtocolData from Removable Media1
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAt1
            DLL Side-Loading
            Logon Script (Windows)1
            Process Injection
            Security Account Manager14
            System Information Discovery
            SMB/Windows Admin SharesData from Network Shared Drive3
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Deobfuscate/Decode Files or Information
            NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture4
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            DLL Side-Loading
            LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://otelrules.svc.static.microsoft/rules/outlook.exe-Production-v19.bundle0%Avira URL Cloudsafe
            file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/1MQYPS24/Play_VM-NowLaura.barduscoAudiowav011.html#Alaura.bardusco@beantech.it0%Avira URL Cloudsafe
            https://a.nel.cloudflare.com/report/v4?s=8C1CHd6bBbnY%2BB6FQAZJ23mhoOyNrKYJCWnUg2BwumckZxjnBiD1wwfjG63aYDchiVWsUo4Rnq5vYF9QWB8RMqIap2fKLoRKSPfZ8k%2BaFwhC7P2WKjh1CKvOHI4I0%Avira URL Cloudsafe
            https://www.w3schools.com/w3css/4/w3.css0%Avira URL Cloudsafe
            https://cdnjs.cloudflare.com/ajax/libs/font-awesome/6.1.1/webfonts/fa-solid-900.woff20%Avira URL Cloudsafe
            https://cdnjs.cloudflare.com/ajax/libs/font-awesome/6.1.1/webfonts/fa-brands-400.woff20%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            a.nel.cloudflare.com
            35.190.80.1
            truefalse
              high
              github.com
              140.82.121.3
              truefalse
                high
                fn8x.biijvi.ru
                104.21.20.57
                truefalse
                  unknown
                  code.jquery.com
                  151.101.66.137
                  truefalse
                    high
                    de5whbmbi5lifd37bmor3gvfb0yvt0snp0sy8lixtrf4k0o77i2.mybuycentr.ru
                    172.67.192.68
                    truefalse
                      unknown
                      cdnjs.cloudflare.com
                      104.17.25.14
                      truefalse
                        high
                        challenges.cloudflare.com
                        104.18.94.41
                        truefalse
                          high
                          lhsdg.tjezyf.ru
                          104.21.3.223
                          truefalse
                            unknown
                            etsy.map.fastly.net
                            151.101.1.224
                            truefalse
                              high
                              get.geojs.io
                              104.26.1.100
                              truefalse
                                high
                                www.google.com
                                142.250.186.132
                                truefalse
                                  high
                                  s-0005.dual-s-msedge.net
                                  52.123.129.14
                                  truefalse
                                    high
                                    d19d360lklgih4.cloudfront.net
                                    13.33.187.96
                                    truefalse
                                      high
                                      s-part-0048.t-0009.t-msedge.net
                                      13.107.246.76
                                      truefalse
                                        high
                                        cf.zwuufruv.ru
                                        104.21.80.191
                                        truetrue
                                          unknown
                                          objects.githubusercontent.com
                                          185.199.110.133
                                          truefalse
                                            high
                                            a1400.dscb.akamai.net
                                            95.101.54.243
                                            truefalse
                                              high
                                              www.etsy.com
                                              unknown
                                              unknownfalse
                                                high
                                                otelrules.svc.static.microsoft
                                                unknown
                                                unknownfalse
                                                  high
                                                  ok4static.oktacdn.com
                                                  unknown
                                                  unknownfalse
                                                    high
                                                    www.w3schools.com
                                                    unknown
                                                    unknowntrue
                                                      unknown
                                                      NameMaliciousAntivirus DetectionReputation
                                                      https://code.jquery.com/jquery-3.6.0.min.jsfalse
                                                        high
                                                        https://cdnjs.cloudflare.com/ajax/libs/crypto-js/4.1.1/crypto-js.min.jsfalse
                                                          high
                                                          https://cdnjs.cloudflare.com/ajax/libs/font-awesome/6.1.1/webfonts/fa-brands-400.woff2false
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          https://cdnjs.cloudflare.com/ajax/libs/font-awesome/6.1.1/css/all.min.cssfalse
                                                            high
                                                            file:///C:/Users/user/AppData/Local/Microsoft/Windows/INetCache/Content.Outlook/1MQYPS24/Play_VM-NowLaura.barduscoAudiowav011.html#Alaura.bardusco@beantech.ittrue
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://otelrules.svc.static.microsoft/rules/rule120607v1s19.xmlfalse
                                                              high
                                                              https://otelrules.svc.static.microsoft/rules/rule120603v8s19.xmlfalse
                                                                high
                                                                https://challenges.cloudflare.com/turnstile/v0/g/f3b948d8acb8/api.jsfalse
                                                                  high
                                                                  https://www.w3schools.com/w3css/4/w3.cssfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://a.nel.cloudflare.com/report/v4?s=8C1CHd6bBbnY%2BB6FQAZJ23mhoOyNrKYJCWnUg2BwumckZxjnBiD1wwfjG63aYDchiVWsUo4Rnq5vYF9QWB8RMqIap2fKLoRKSPfZ8k%2BaFwhC7P2WKjh1CKvOHI4Ifalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://otelrules.svc.static.microsoft/rules/outlook.exe-Production-v19.bundlefalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://challenges.cloudflare.com/turnstile/v0/api.js?onload=onloadTurnstileCallbackfalse
                                                                    high
                                                                    https://cdnjs.cloudflare.com/ajax/libs/font-awesome/6.1.1/webfonts/fa-solid-900.woff2false
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    • No. of IPs < 25%
                                                                    • 25% < No. of IPs < 50%
                                                                    • 50% < No. of IPs < 75%
                                                                    • 75% < No. of IPs
                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                    104.21.80.191
                                                                    cf.zwuufruv.ruUnited States
                                                                    13335CLOUDFLARENETUStrue
                                                                    51.132.193.104
                                                                    unknownUnited Kingdom
                                                                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                                    142.250.186.170
                                                                    unknownUnited States
                                                                    15169GOOGLEUSfalse
                                                                    104.21.20.57
                                                                    fn8x.biijvi.ruUnited States
                                                                    13335CLOUDFLARENETUSfalse
                                                                    104.18.94.41
                                                                    challenges.cloudflare.comUnited States
                                                                    13335CLOUDFLARENETUSfalse
                                                                    104.26.1.100
                                                                    get.geojs.ioUnited States
                                                                    13335CLOUDFLARENETUSfalse
                                                                    52.182.143.214
                                                                    unknownUnited States
                                                                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                                    52.123.129.14
                                                                    s-0005.dual-s-msedge.netUnited States
                                                                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                                    151.101.66.137
                                                                    code.jquery.comUnited States
                                                                    54113FASTLYUSfalse
                                                                    142.250.186.132
                                                                    www.google.comUnited States
                                                                    15169GOOGLEUSfalse
                                                                    142.250.186.110
                                                                    unknownUnited States
                                                                    15169GOOGLEUSfalse
                                                                    35.190.80.1
                                                                    a.nel.cloudflare.comUnited States
                                                                    15169GOOGLEUSfalse
                                                                    142.250.184.227
                                                                    unknownUnited States
                                                                    15169GOOGLEUSfalse
                                                                    185.199.110.133
                                                                    objects.githubusercontent.comNetherlands
                                                                    54113FASTLYUSfalse
                                                                    13.107.246.76
                                                                    s-part-0048.t-0009.t-msedge.netUnited States
                                                                    8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                                    172.67.191.206
                                                                    unknownUnited States
                                                                    13335CLOUDFLARENETUSfalse
                                                                    142.250.185.67
                                                                    unknownUnited States
                                                                    15169GOOGLEUSfalse
                                                                    1.1.1.1
                                                                    unknownAustralia
                                                                    13335CLOUDFLARENETUSfalse
                                                                    151.101.1.224
                                                                    etsy.map.fastly.netUnited States
                                                                    54113FASTLYUSfalse
                                                                    13.33.187.120
                                                                    unknownUnited States
                                                                    16509AMAZON-02USfalse
                                                                    104.21.3.223
                                                                    lhsdg.tjezyf.ruUnited States
                                                                    13335CLOUDFLARENETUSfalse
                                                                    142.250.185.110
                                                                    unknownUnited States
                                                                    15169GOOGLEUSfalse
                                                                    140.82.121.3
                                                                    github.comUnited States
                                                                    36459GITHUBUSfalse
                                                                    2.19.11.103
                                                                    unknownEuropean Union
                                                                    719ELISA-ASHelsinkiFinlandEUfalse
                                                                    172.67.153.160
                                                                    unknownUnited States
                                                                    13335CLOUDFLARENETUSfalse
                                                                    172.67.192.68
                                                                    de5whbmbi5lifd37bmor3gvfb0yvt0snp0sy8lixtrf4k0o77i2.mybuycentr.ruUnited States
                                                                    13335CLOUDFLARENETUSfalse
                                                                    52.109.28.46
                                                                    unknownUnited States
                                                                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                                    13.33.187.96
                                                                    d19d360lklgih4.cloudfront.netUnited States
                                                                    16509AMAZON-02USfalse
                                                                    64.233.184.84
                                                                    unknownUnited States
                                                                    15169GOOGLEUSfalse
                                                                    95.101.54.243
                                                                    a1400.dscb.akamai.netEuropean Union
                                                                    34164AKAMAI-LONGBfalse
                                                                    52.109.76.243
                                                                    unknownUnited States
                                                                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                                    52.109.76.144
                                                                    unknownUnited States
                                                                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                                    104.17.25.14
                                                                    cdnjs.cloudflare.comUnited States
                                                                    13335CLOUDFLARENETUSfalse
                                                                    104.26.0.100
                                                                    unknownUnited States
                                                                    13335CLOUDFLARENETUSfalse
                                                                    IP
                                                                    192.168.2.16
                                                                    Joe Sandbox version:42.0.0 Malachite
                                                                    Analysis ID:1636217
                                                                    Start date and time:2025-03-12 14:41:14 +01:00
                                                                    Joe Sandbox product:CloudBasic
                                                                    Overall analysis duration:
                                                                    Hypervisor based Inspection enabled:false
                                                                    Report type:full
                                                                    Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                    Number of analysed new started processes analysed:20
                                                                    Number of new started drivers analysed:0
                                                                    Number of existing processes analysed:0
                                                                    Number of existing drivers analysed:0
                                                                    Number of injected processes analysed:0
                                                                    Technologies:
                                                                    • EGA enabled
                                                                    Analysis Mode:stream
                                                                    Analysis stop reason:Timeout
                                                                    Sample name:Fw_ VN MSG 4_42_16 AM DURATION_0f0b5f5e889448e7c935c0db95b1d2a6.msg
                                                                    Detection:MAL
                                                                    Classification:mal100.phis.evad.winMSG@26/8@41/170
                                                                    Cookbook Comments:
                                                                    • Found application associated with file extension: .msg
                                                                    • Exclude process from analysis (whitelisted): svchost.exe
                                                                    • Excluded IPs from analysis (whitelisted): 52.109.28.46, 52.109.76.243, 2.19.11.103, 2.19.11.102
                                                                    • Excluded domains from analysis (whitelisted): ecs.office.com, omex.cdn.office.net, prod.configsvc1.live.com.akadns.net, prod.roaming1.live.com.akadns.net, eur.roaming1.live.com.akadns.net, neu-azsc-000.roaming.officeapps.live.com, roaming.officeapps.live.com, dual-s-0005-office.config.skype.com, config.officeapps.live.com, osiprod-neu-buff-azsc-000.northeurope.cloudapp.azure.com, officeclient.microsoft.com, ecs.office.trafficmanager.net, omex.cdn.office.net.akamaized.net, europe.configsvc1.live.com.akadns.net, uks-azsc-config.officeapps.live.com, a1864.dscd.akamai.net
                                                                    • Not all processes where analyzed, report is missing behavior information
                                                                    • Report size getting too big, too many NtOpenFile calls found.
                                                                    • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                    • Report size getting too big, too many NtSetValueKey calls found.
                                                                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                    • VT rate limit hit for: https://otelrules.svc.static.microsoft/rules/outlook.exe-Production-v19.bundle
                                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):81920
                                                                    Entropy (8bit):4.420362860706044
                                                                    Encrypted:false
                                                                    SSDEEP:
                                                                    MD5:C7A0A2DA9067CE9BB4E96AFF286EC107
                                                                    SHA1:FA821091007619F1B989D6D1D7ED2483950B7AFD
                                                                    SHA-256:AD98295228B4C9ABDDFC569E79F57E8160F32EC582C387A2729DA506DDF8313F
                                                                    SHA-512:F7BD0A86E34ED495467D603D3141AD888C74DD6AD7F9DF3AEA2CC09FB78A1B88BE34F29137D895B870D485A60BD1F5918DB5FD7444DB0C759CFC1BBDDE389347
                                                                    Malicious:false
                                                                    Reputation:unknown
                                                                    Preview:............................................................................`...h...d...N.r.T...................eJ..............Zb..2...................................,...@.t.z.r.e.s...d.l.l.,.-.1.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.1.1.1...........................................................0s..4...........N.r.T...........v.2._.O.U.T.L.O.O.K.:.1.8.6.4.:.1.9.d.f.d.f.0.f.7.5.d.a.4.b.e.4.a.d.4.7.8.c.4.c.8.0.1.6.d.5.e.3...C.:.\.U.s.e.r.s.\.c.a.l.i.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.O.u.t.l.o.o.k. .L.o.g.g.i.n.g.\.O.U.T.L.O.O.K._.1.6._.0._.1.6.8.2.7._.2.0.1.3.0.-.2.0.2.5.0.3.1.2.T.0.9.4.2.2.4.0.8.2.0.-.6.2.4.4...e.t.l.......P.P.h...d...N.r.T...........................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                                    File Type:data
                                                                    Category:modified
                                                                    Size (bytes):86016
                                                                    Entropy (8bit):4.407177272164844
                                                                    Encrypted:false
                                                                    SSDEEP:
                                                                    MD5:29997AB4996598178BDF57811ECE332C
                                                                    SHA1:F7FC2DBEB35C1ED1D5193D5AD7C064810CB5639B
                                                                    SHA-256:77AA0E1A90AA3B12A16ACB5D4B73DCC0276A0909BD0DF57E00BDFB18EAFEBC2F
                                                                    SHA-512:D962D7512BC1DB0A948F95C14AAFFDB2A3204D6311D66C1E28C5D9D5EF187137D0407C76FAF3A10E72280B2B426B1D80CD14DAE7AC06E6C9E0121971E164BD71
                                                                    Malicious:false
                                                                    Reputation:unknown
                                                                    Preview:............................................................................`...T...P...`-.T...................eJ..............Zb..2...................................,...@.t.z.r.e.s...d.l.l.,.-.1.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.1.1.1...........................................................0s..4...........`-.T...........v.2._.O.U.T.L.O.O.K.:.1.b.5.0.:.3.2.0.a.7.1.5.1.9.a.c.6.4.8.2.4.a.4.c.0.b.1.5.5.0.e.2.7.0.5.7.c...C.:.\.U.s.e.r.s.\.c.a.l.i.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.O.u.t.l.o.o.k. .L.o.g.g.i.n.g.\.O.U.T.L.O.O.K._.1.6._.0._.1.6.8.2.7._.2.0.1.3.0.-.2.0.2.5.0.3.1.2.T.0.9.4.2.4.0.0.4.7.2.-.6.9.9.2...e.t.l.......P.P.T...P...`-.T...........................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):163840
                                                                    Entropy (8bit):0.3287164866097216
                                                                    Encrypted:false
                                                                    SSDEEP:
                                                                    MD5:6E3C48BCC837F573643C4E91D7C5C72F
                                                                    SHA1:8314F1B523FB79E5C8CC25B56C0967171459EFB0
                                                                    SHA-256:F07D6E2F1C5DD72F8E0F927895232762A98DF2FE33B13CDFD2889E62D5932984
                                                                    SHA-512:3823B70755E71339BF306EAF435D77A674D582CCC510CA601D06CB05B5AA295FDA0558E0D13539BDE5250806B8FCAA58A7452BFB4EF476D6B64424A554D672B2
                                                                    Malicious:false
                                                                    Reputation:unknown
                                                                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):155648
                                                                    Entropy (8bit):0.3974916259243869
                                                                    Encrypted:false
                                                                    SSDEEP:
                                                                    MD5:D1F4C921B77C19CFC9EB0D45676D2886
                                                                    SHA1:87CDB5788FA339965AB76549CBFD194CA4579500
                                                                    SHA-256:3A3EAB2D6DE090057CEEF285E6E801FC59EE2E98A5ED2723976B4B3384AB9BA3
                                                                    SHA-512:8F7AAD9EC00D382BAB7431C6D89BD4AA022105D6F4AF653651169C84EC78EB0B2B0E1ACB43713EF9C93DD2F5BCA9FED670DA913A9093AA8DF8014EA2479F6E34
                                                                    Malicious:false
                                                                    Reputation:unknown
                                                                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):335872
                                                                    Entropy (8bit):1.0800376118456405
                                                                    Encrypted:false
                                                                    SSDEEP:
                                                                    MD5:0EA8F0159E8AD4BD98EE59E5B243EF7C
                                                                    SHA1:156DECEA54E984D104DE538033A3381CDCEB05DC
                                                                    SHA-256:D4E48BF4FE863605A3E5820420B6289EBDE0CADAB8FE71F094CA958547E6B48F
                                                                    SHA-512:38C031C90365244140C06768A56EB24A3220E22AA2F46869FFE2B4CCC20DBF6F8E1B53898644CE62525BBE443A7BF210C5E3FA86C960ADCFD5F81FC8434539A5
                                                                    Malicious:false
                                                                    Reputation:unknown
                                                                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                                    File Type:CDFV2 Microsoft Outlook Message
                                                                    Category:dropped
                                                                    Size (bytes):55296
                                                                    Entropy (8bit):5.122419213609807
                                                                    Encrypted:false
                                                                    SSDEEP:
                                                                    MD5:07AAF58DED3D943679B64C1AB2AA3D91
                                                                    SHA1:1442FB7073DB4D13836F085B546A9DB0C80AFC49
                                                                    SHA-256:DBE47E4329103A6638033EA0120E14BA145FC0B3FFA5DFA9934C72E7290DCC45
                                                                    SHA-512:B55F9E8EAF1AAC433F1AFCA3BAF7100C51DCE6059C1BEA9FCAF1BFF67FFF53BC7A894A3591B969EF4B487A006AA2F016729DCDBA682BE7943C22A55A92B99D84
                                                                    Malicious:false
                                                                    Reputation:unknown
                                                                    Preview:......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.........................................................................................@...T........'......_._.p.r.o.p.e.r.t.i.e.s._.v.e.r.s.i.o.n.1...0...................0...................................................6... ......._._.n.a.m.e.i.d._.v.e.r.s.i.o.n.1...0...........................(...........K.......................@...T...@...T..............._._.s.u.b.s.t.g.1...0._.0.E.0.4.0.0.1.F.........................*.......1...............................
                                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                                    File Type:Microsoft Outlook email folder (>=2003)
                                                                    Category:dropped
                                                                    Size (bytes):271360
                                                                    Entropy (8bit):1.349179799480813
                                                                    Encrypted:false
                                                                    SSDEEP:
                                                                    MD5:0868DCF18012BB04457D9D5CE00ED74A
                                                                    SHA1:2B0AD6850F9A06C11E7DC93E093FDE74E5EB03CF
                                                                    SHA-256:C09FC497EF391CFE1D1A00B708D45C84693DC6CB29E292FC8811D55DF0C38D19
                                                                    SHA-512:A10C241D2E70D8B86592E779509C23637A8CA4FEF5D5632F2B6D0215FAA285EB7832A7173852B4AF040A981416A9C6FF4A76F2813FFF9ED8F5ACB2C83968C320
                                                                    Malicious:true
                                                                    Reputation:unknown
                                                                    Preview:!BDN.%*SM......\......................V................@...........@...@...................................@...........................................................................$.......D.......G..............~...............|...........................................................................................................................................................................................................................................................................................p.........'2l.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):131072
                                                                    Entropy (8bit):1.5104103814113417
                                                                    Encrypted:false
                                                                    SSDEEP:
                                                                    MD5:2B259D0834999AA260A7262AEBEBDE56
                                                                    SHA1:4E67139FA03390350AC04C4068DA5924F48C4D94
                                                                    SHA-256:025B95B79E694EB99A75F8728502135F4DD6183E65EA659569C1B3F13D866E62
                                                                    SHA-512:EE3A4651ABE3F1D2C65DFBB5C22043396C83FFDCA430FDE271EFB7330E172A8612534EBDD00E305F2DEA2A10CB7E1FBA72A28655F0D544A9A60C9B2715659240
                                                                    Malicious:true
                                                                    Reputation:unknown
                                                                    Preview:....0...........d...g.B.T........D............#...>............|.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................d...D......p...0.../.......d...g.B.T........B............#.........................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    File type:CDFV2 Microsoft Outlook Message
                                                                    Entropy (8bit):4.6146294297825845
                                                                    TrID:
                                                                    • Outlook Message (71009/1) 58.92%
                                                                    • Outlook Form Template (41509/1) 34.44%
                                                                    • Generic OLE2 / Multistream Compound File (8008/1) 6.64%
                                                                    File name:Fw_ VN MSG 4_42_16 AM DURATION_0f0b5f5e889448e7c935c0db95b1d2a6.msg
                                                                    File size:143'872 bytes
                                                                    MD5:6705df89554d8595af60a9a39ff6ba54
                                                                    SHA1:8fbcd160dacd1db49077080b8b7a2c427aabb87b
                                                                    SHA256:acf597809d220384bdfdda5aef3f69bcfe5f75b83884b50b5435d566de4fa8a6
                                                                    SHA512:8d51a19e6190848fcb1e9a27cffad5d68fe7338206a4464e4a3437a27e70ddfa27a11fa0b03207767aa8ea923f6cc59390828d2b598b9069f671e7adf7e7d5a7
                                                                    SSDEEP:1536:eWSWmWZWbbVEnBpBPZWGWD2/ZeQcNZF/JoMaSPfAp9LI0wcmLdRfs+:ObVEnBPmeSgqS+
                                                                    TLSH:17E344103BFA4215F3B79F714FE2948B9536BC92BD11968F32A1334E0533A819D61B2B
                                                                    File Content Preview:........................>.......................................................|..............................................................................................................................................................................
                                                                    Subject:Fw: VN MSG 4:42:16 AM DURATION_0f0b5f5e889448e7c935c0db95b1d2a6
                                                                    From:Laura Bardusco <laura.bardusco@beantech.it>
                                                                    To:Security Operations Center | beanTech srl <soc@beantech.it>
                                                                    Cc:
                                                                    BCC:
                                                                    Date:Wed, 12 Mar 2025 10:57:37 +0100
                                                                    Communications:
                                                                      Attachments:
                                                                      • Outlook-0btjrxkj
                                                                      Key Value
                                                                      DateWed, 12 Mar 2025 10:57:37 +0100
                                                                      FromLaura Bardusco <laura.bardusco@beantech.it>
                                                                      ToSecurity Operations Center | beanTech srl <soc@beantech.it>
                                                                      CcBcc:
                                                                      Message-Id<GVXPR07MB99427AAB3DD427ED6D25C4BF81D02@GVXPR07MB9942.eurprd07.prod.outlook.com>
                                                                      Authentication-Results

                                                                      Icon Hash:c4e1928eacb280a2