Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SWIFT COPY.xls

Overview

General Information

Sample name:SWIFT COPY.xls
Analysis ID:1636401
MD5:b731eb838e4e8d534ea62b2ebf15dcda
SHA1:2c2d81fef7800be7c3ddbbac94cd8fb7faf09bd7
SHA256:08cfe7d6a9b65191e9e1b21080083572b724a1dd985b11377586c6d0562d6e73
Tags:xlsuser-abuse_ch
Infos:

Detection

Score:68
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for submitted file
Excel sheet contains many unusual embedded objects
Detected non-DNS traffic on DNS port
Document contains embedded VBA macros
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Excel Network Connections
Sigma detected: Suspicious Office Outbound Connections
Suricata IDS alerts with low severity for network traffic

Classification

  • System is w10x64
  • EXCEL.EXE (PID: 6256 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding MD5: 4A871771235598812032C822E6F68F19)
    • splwow64.exe (PID: 524 cmdline: C:\Windows\splwow64.exe 12288 MD5: 77DE7761B037061C7C112FD3C5B91E73)
  • EXCEL.EXE (PID: 2444 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\user\Desktop\SWIFT COPY.xls" MD5: 4A871771235598812032C822E6F68F19)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Network ConnectionAuthor: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0", Tim Shelton: Data: DestinationIp: 52.123.129.14, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE, Initiated: true, ProcessId: 6256, Protocol: tcp, SourceIp: 192.168.2.7, SourceIsIpv6: false, SourcePort: 49685
Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.7, DestinationIsIpv6: false, DestinationPort: 49685, EventID: 3, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE, Initiated: true, ProcessId: 6256, Protocol: tcp, SourceIp: 52.123.129.14, SourceIsIpv6: false, SourcePort: 443
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-03-12T18:43:52.212939+010020283713Unknown Traffic192.168.2.74968552.123.129.14443TCP
2025-03-12T18:44:58.682940+010020283713Unknown Traffic192.168.2.75752913.107.246.67443TCP
2025-03-12T18:45:19.351981+010020283713Unknown Traffic192.168.2.75753652.123.128.14443TCP
2025-03-12T18:45:23.417101+010020283713Unknown Traffic192.168.2.75753813.107.246.67443TCP
2025-03-12T18:45:23.517860+010020283713Unknown Traffic192.168.2.75753913.107.246.67443TCP
2025-03-12T18:45:23.538266+010020283713Unknown Traffic192.168.2.75754013.107.246.67443TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SWIFT COPY.xlsAvira: detected
Source: C:\Users\user\AppData\Local\Temp\~DF5BBCEEB498D033BD.TMPAvira: detection malicious, Label: W97M/AVI.Agent.njxdf
Source: SWIFT COPY.xlsVirustotal: Detection: 26%Perma Link
Source: SWIFT COPY.xlsReversingLabs: Detection: 34%
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile opened: C:\Program Files (x86)\Microsoft Office\root\vfs\SystemX86\MSVCR100.dllJump to behavior
Source: global trafficDNS query: name: st3.pro
Source: global trafficTCP traffic: 192.168.2.7:49685 -> 52.123.129.14:443
Source: global trafficTCP traffic: 192.168.2.7:49685 -> 52.123.129.14:443
Source: global trafficTCP traffic: 192.168.2.7:49685 -> 52.123.129.14:443
Source: global trafficTCP traffic: 192.168.2.7:49685 -> 52.123.129.14:443
Source: global trafficTCP traffic: 192.168.2.7:49685 -> 52.123.129.14:443
Source: global trafficTCP traffic: 192.168.2.7:49689 -> 52.123.129.14:443
Source: global trafficTCP traffic: 192.168.2.7:49689 -> 52.123.129.14:443
Source: global trafficTCP traffic: 192.168.2.7:49689 -> 52.123.129.14:443
Source: global trafficTCP traffic: 192.168.2.7:49685 -> 52.123.129.14:443
Source: global trafficTCP traffic: 192.168.2.7:49689 -> 52.123.129.14:443
Source: global trafficTCP traffic: 192.168.2.7:49689 -> 52.123.129.14:443
Source: global trafficTCP traffic: 192.168.2.7:49708 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.7:49708 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.7:49708 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.7:49708 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.7:49708 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.7:49710 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.7:49710 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.7:49710 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.7:49710 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.7:49710 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.7:49712 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.7:49712 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.7:49712 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.7:49712 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.7:57529 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57529 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57529 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57529 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57529 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57531 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57531 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57531 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57531 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57531 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57533 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57533 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57534 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57534 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57535 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57535 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57533 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57534 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57535 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57536 -> 52.123.128.14:443
Source: global trafficTCP traffic: 192.168.2.7:57536 -> 52.123.128.14:443
Source: global trafficTCP traffic: 192.168.2.7:57536 -> 52.123.128.14:443
Source: global trafficTCP traffic: 192.168.2.7:57533 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57533 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57538 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57538 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57538 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57534 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57534 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57539 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57539 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57539 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57535 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57535 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57540 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57540 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57540 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57536 -> 52.123.128.14:443
Source: global trafficTCP traffic: 192.168.2.7:57536 -> 52.123.128.14:443
Source: global trafficTCP traffic: 192.168.2.7:57542 -> 52.123.128.14:443
Source: global trafficTCP traffic: 192.168.2.7:57542 -> 52.123.128.14:443
Source: global trafficTCP traffic: 192.168.2.7:57542 -> 52.123.128.14:443
Source: global trafficTCP traffic: 192.168.2.7:57538 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57538 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57539 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57539 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57540 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57540 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57542 -> 52.123.128.14:443
Source: global trafficTCP traffic: 192.168.2.7:57542 -> 52.123.128.14:443
Source: global trafficTCP traffic: 192.168.2.7:49685 -> 52.123.129.14:443
Source: global trafficTCP traffic: 52.123.129.14:443 -> 192.168.2.7:49685
Source: global trafficTCP traffic: 192.168.2.7:49685 -> 52.123.129.14:443
Source: global trafficTCP traffic: 192.168.2.7:49685 -> 52.123.129.14:443
Source: global trafficTCP traffic: 52.123.129.14:443 -> 192.168.2.7:49685
Source: global trafficTCP traffic: 52.123.129.14:443 -> 192.168.2.7:49685
Source: global trafficTCP traffic: 192.168.2.7:49685 -> 52.123.129.14:443
Source: global trafficTCP traffic: 192.168.2.7:49685 -> 52.123.129.14:443
Source: global trafficTCP traffic: 192.168.2.7:49689 -> 52.123.129.14:443
Source: global trafficTCP traffic: 52.123.129.14:443 -> 192.168.2.7:49689
Source: global trafficTCP traffic: 192.168.2.7:49689 -> 52.123.129.14:443
Source: global trafficTCP traffic: 192.168.2.7:49689 -> 52.123.129.14:443
Source: global trafficTCP traffic: 52.123.129.14:443 -> 192.168.2.7:49689
Source: global trafficTCP traffic: 192.168.2.7:49685 -> 52.123.129.14:443
Source: global trafficTCP traffic: 52.123.129.14:443 -> 192.168.2.7:49685
Source: global trafficTCP traffic: 52.123.129.14:443 -> 192.168.2.7:49689
Source: global trafficTCP traffic: 192.168.2.7:49689 -> 52.123.129.14:443
Source: global trafficTCP traffic: 192.168.2.7:49689 -> 52.123.129.14:443
Source: global trafficTCP traffic: 52.123.129.14:443 -> 192.168.2.7:49689
Source: global trafficTCP traffic: 192.168.2.7:49708 -> 5.161.200.29:443
Source: global trafficTCP traffic: 5.161.200.29:443 -> 192.168.2.7:49708
Source: global trafficTCP traffic: 192.168.2.7:49708 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.7:49708 -> 5.161.200.29:443
Source: global trafficTCP traffic: 5.161.200.29:443 -> 192.168.2.7:49708
Source: global trafficTCP traffic: 5.161.200.29:443 -> 192.168.2.7:49708
Source: global trafficTCP traffic: 192.168.2.7:49708 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.7:49708 -> 5.161.200.29:443
Source: global trafficTCP traffic: 5.161.200.29:443 -> 192.168.2.7:49708
Source: global trafficTCP traffic: 192.168.2.7:49710 -> 5.161.200.29:443
Source: global trafficTCP traffic: 5.161.200.29:443 -> 192.168.2.7:49710
Source: global trafficTCP traffic: 192.168.2.7:49710 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.7:49710 -> 5.161.200.29:443
Source: global trafficTCP traffic: 5.161.200.29:443 -> 192.168.2.7:49710
Source: global trafficTCP traffic: 5.161.200.29:443 -> 192.168.2.7:49710
Source: global trafficTCP traffic: 192.168.2.7:49710 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.7:49710 -> 5.161.200.29:443
Source: global trafficTCP traffic: 5.161.200.29:443 -> 192.168.2.7:49710
Source: global trafficTCP traffic: 192.168.2.7:49712 -> 5.161.200.29:443
Source: global trafficTCP traffic: 5.161.200.29:443 -> 192.168.2.7:49712
Source: global trafficTCP traffic: 192.168.2.7:49712 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.7:49712 -> 5.161.200.29:443
Source: global trafficTCP traffic: 5.161.200.29:443 -> 192.168.2.7:49712
Source: global trafficTCP traffic: 192.168.2.7:49712 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.7:57528 -> 1.1.1.1:53
Source: global trafficTCP traffic: 1.1.1.1:53 -> 192.168.2.7:57528
Source: global trafficTCP traffic: 192.168.2.7:57528 -> 1.1.1.1:53
Source: global trafficTCP traffic: 1.1.1.1:53 -> 192.168.2.7:57528
Source: global trafficTCP traffic: 192.168.2.7:57528 -> 1.1.1.1:53
Source: global trafficTCP traffic: 1.1.1.1:53 -> 192.168.2.7:57528
Source: global trafficTCP traffic: 192.168.2.7:57528 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.7:57529 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.7:57529
Source: global trafficTCP traffic: 192.168.2.7:57529 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57529 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.7:57529
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.7:57529
Source: global trafficTCP traffic: 192.168.2.7:57529 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57529 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.7:57529
Source: global trafficTCP traffic: 192.168.2.7:57531 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.7:57531
Source: global trafficTCP traffic: 192.168.2.7:57531 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57531 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.7:57531
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.7:57531
Source: global trafficTCP traffic: 192.168.2.7:57531 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57531 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.7:57531
Source: global trafficTCP traffic: 192.168.2.7:57533 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.7:57533
Source: global trafficTCP traffic: 192.168.2.7:57533 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57534 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.7:57534
Source: global trafficTCP traffic: 192.168.2.7:57534 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57535 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.7:57535
Source: global trafficTCP traffic: 192.168.2.7:57535 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57533 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.7:57533
Source: global trafficTCP traffic: 192.168.2.7:57534 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.7:57534
Source: global trafficTCP traffic: 192.168.2.7:57535 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.7:57535
Source: global trafficTCP traffic: 192.168.2.7:57536 -> 52.123.128.14:443
Source: global trafficTCP traffic: 52.123.128.14:443 -> 192.168.2.7:57536
Source: global trafficTCP traffic: 192.168.2.7:57536 -> 52.123.128.14:443
Source: global trafficTCP traffic: 192.168.2.7:57536 -> 52.123.128.14:443
Source: global trafficTCP traffic: 52.123.128.14:443 -> 192.168.2.7:57536
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.7:57533
Source: global trafficTCP traffic: 192.168.2.7:57533 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57533 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.7:57533
Source: global trafficTCP traffic: 192.168.2.7:57538 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.7:57538
Source: global trafficTCP traffic: 192.168.2.7:57538 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57538 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.7:57538
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.7:57534
Source: global trafficTCP traffic: 192.168.2.7:57534 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57534 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.7:57534
Source: global trafficTCP traffic: 192.168.2.7:57539 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.7:57539
Source: global trafficTCP traffic: 192.168.2.7:57539 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57539 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.7:57539
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.7:57535
Source: global trafficTCP traffic: 192.168.2.7:57535 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57535 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.7:57535
Source: global trafficTCP traffic: 192.168.2.7:57540 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.7:57540
Source: global trafficTCP traffic: 192.168.2.7:57540 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57540 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.7:57540
Source: global trafficTCP traffic: 52.123.128.14:443 -> 192.168.2.7:57536
Source: global trafficTCP traffic: 192.168.2.7:57536 -> 52.123.128.14:443
Source: global trafficTCP traffic: 192.168.2.7:57536 -> 52.123.128.14:443
Source: global trafficTCP traffic: 52.123.128.14:443 -> 192.168.2.7:57536
Source: global trafficTCP traffic: 192.168.2.7:57542 -> 52.123.128.14:443
Source: global trafficTCP traffic: 52.123.128.14:443 -> 192.168.2.7:57542
Source: global trafficTCP traffic: 192.168.2.7:57542 -> 52.123.128.14:443
Source: global trafficTCP traffic: 192.168.2.7:57542 -> 52.123.128.14:443
Source: global trafficTCP traffic: 52.123.128.14:443 -> 192.168.2.7:57542
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.7:57538
Source: global trafficTCP traffic: 192.168.2.7:57538 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57538 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.7:57538
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.7:57539
Source: global trafficTCP traffic: 192.168.2.7:57539 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57539 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.7:57539
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.7:57540
Source: global trafficTCP traffic: 192.168.2.7:57540 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.7:57540 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.7:57540
Source: global trafficTCP traffic: 52.123.128.14:443 -> 192.168.2.7:57542
Source: global trafficTCP traffic: 192.168.2.7:57542 -> 52.123.128.14:443
Source: global trafficTCP traffic: 192.168.2.7:57542 -> 52.123.128.14:443
Source: global trafficTCP traffic: 52.123.128.14:443 -> 192.168.2.7:57542
Source: excel.exeMemory has grown: Private usage: 2MB later: 96MB
Source: global trafficTCP traffic: 192.168.2.7:57528 -> 1.1.1.1:53
Source: Joe Sandbox ViewIP Address: 13.107.246.67 13.107.246.67
Source: Joe Sandbox ViewIP Address: 52.123.129.14 52.123.129.14
Source: Joe Sandbox ViewIP Address: 5.161.200.29 5.161.200.29
Source: Joe Sandbox ViewIP Address: 52.123.128.14 52.123.128.14
Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:57540 -> 13.107.246.67:443
Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:49685 -> 52.123.129.14:443
Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:57539 -> 13.107.246.67:443
Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:57538 -> 13.107.246.67:443
Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:57529 -> 13.107.246.67:443
Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.7:57536 -> 52.123.128.14:443
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: st3.pro
Source: SWIFT COPY.xls, ~DF5BBCEEB498D033BD.TMP.14.drString found in binary or memory: https://st3.pro/K04HU0R?&enigma=dirty&metallurgist=small&motorcycle
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49689
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49685
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 57531 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57529
Source: unknownNetwork traffic detected: HTTP traffic on port 57533 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 57536 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57531
Source: unknownNetwork traffic detected: HTTP traffic on port 57534 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 57538 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57538
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57539
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57533
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57534
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57535
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57536
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57540
Source: unknownNetwork traffic detected: HTTP traffic on port 49685 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57542
Source: unknownNetwork traffic detected: HTTP traffic on port 57535 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49689 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 57539 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownNetwork traffic detected: HTTP traffic on port 57529 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 57542 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 57540 -> 443

System Summary

barindex
Source: SWIFT COPY.xlsOLE: Microsoft Excel 2007+
Source: ~DF5BBCEEB498D033BD.TMP.14.drOLE: Microsoft Excel 2007+
Source: SWIFT COPY.xlsOLE indicator, VBA macros: true
Source: ~DF5BBCEEB498D033BD.TMP.14.drOLE indicator, VBA macros: true
Source: classification engineClassification label: mal68.winXLS@4/4@1/4
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Program Files (x86)\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xmlJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Users\user~1\AppData\Local\Temp\{02C1041A-81C0-4888-8015-9C5B794D632E} - OProcSessId.datJump to behavior
Source: SWIFT COPY.xlsOLE indicator, Workbook stream: true
Source: ~DF5BBCEEB498D033BD.TMP.14.drOLE indicator, Workbook stream: true
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: SWIFT COPY.xlsVirustotal: Detection: 26%
Source: SWIFT COPY.xlsReversingLabs: Detection: 34%
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\user\Desktop\SWIFT COPY.xls"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\CommonJump to behavior
Source: SWIFT COPY.xlsStatic file information: File size 1261568 > 1048576
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile opened: C:\Program Files (x86)\Microsoft Office\root\vfs\SystemX86\MSVCR100.dllJump to behavior
Source: SWIFT COPY.xlsInitial sample: OLE indicators encrypted = True
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: SWIFT COPY.xlsStream path 'Workbook' entropy: 7.96388874982 (max. 8.0)
Source: ~DF5BBCEEB498D033BD.TMP.14.drStream path 'Workbook' entropy: 7.96388874982 (max. 8.0)
Source: C:\Windows\splwow64.exeWindow / User API: threadDelayed 684Jump to behavior
Source: C:\Windows\splwow64.exeLast function: Thread delayed
Source: C:\Windows\splwow64.exeLast function: Thread delayed
Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information queried: ProcessInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts3
Exploitation for Client Execution
1
Scripting
1
Process Injection
1
Masquerading
OS Credential Dumping1
Process Discovery
Remote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Extra Window Memory Injection
1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Extra Window Memory Injection
LSA Secrets1
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SWIFT COPY.xls26%VirustotalBrowse
SWIFT COPY.xls34%ReversingLabsDocument-Excel.Exploit.CVE-2017-0199
SWIFT COPY.xls100%AviraW97M/AVI.Agent.njxdf
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\~DF5BBCEEB498D033BD.TMP100%AviraW97M/AVI.Agent.njxdf
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://st3.pro/K04HU0R?&enigma=dirty&metallurgist=small&motorcycle0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
st3.pro
5.161.200.29
truefalse
    high
    s-0005.dual-s-msedge.net
    52.123.129.14
    truefalse
      high
      s-part-0039.t-0009.t-msedge.net
      13.107.246.67
      truefalse
        high
        NameSourceMaliciousAntivirus DetectionReputation
        https://st3.pro/K04HU0R?&enigma=dirty&metallurgist=small&motorcycleSWIFT COPY.xls, ~DF5BBCEEB498D033BD.TMP.14.drfalse
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        13.107.246.67
        s-part-0039.t-0009.t-msedge.netUnited States
        8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
        52.123.129.14
        s-0005.dual-s-msedge.netUnited States
        8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
        5.161.200.29
        st3.proGermany
        24940HETZNER-ASDEfalse
        52.123.128.14
        unknownUnited States
        8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
        Joe Sandbox version:42.0.0 Malachite
        Analysis ID:1636401
        Start date and time:2025-03-12 18:42:27 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 5m 1s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:defaultwindowsofficecookbook.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Run name:Without Instrumentation
        Number of analysed new started processes analysed:18
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:SWIFT COPY.xls
        Detection:MAL
        Classification:mal68.winXLS@4/4@1/4
        EGA Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .xls
        • Found Word or Excel or PowerPoint or XPS Viewer
        • Attach to Office via COM
        • Active ActiveX Object
        • Active ActiveX Object
        • Scroll down
        • Close Viewer
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 52.109.89.18, 52.109.76.243, 20.42.73.25, 52.109.28.46, 104.208.16.95
        • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.afd.azureedge.net, onedscolprdcus20.centralus.cloudapp.azure.com, weu-azsc-config.officeapps.live.com, eur.roaming1.live.com.akadns.net, neu-azsc-000.roaming.officeapps.live.com, roaming.officeapps.live.com, dual-s-0005-office.config.skype.com, login.live.com, onedscolprdeus06.eastus.cloudapp.azure.com, officeclient.microsoft.com, c.pki.goog, ecs.office.com, self-events-data.trafficmanager.net, fs.microsoft.com, otelrules.azureedge.net, prod.configsvc1.live.com.akadns.net, self.events.data.microsoft.com, ctldl.windowsupdate.com, prod.roaming1.live.com.akadns.net, fe3cr.delivery.mp.microsoft.com, config.officeapps.live.com, osiprod-neu-buff-azsc-000.northeurope.cloudapp.azure.com, azureedge-t-prod.trafficmanager.net, ecs.office.trafficmanager.net, europe.configsvc1.live.com.akadns.net, uks-azsc-config.officeapps.live.com
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtCreateKey calls found.
        • Report size getting too big, too many NtQueryAttributesFile calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        • Report size getting too big, too many NtReadVirtualMemory calls found.
        TimeTypeDescription
        13:44:34API Interceptor706x Sleep call for process: splwow64.exe modified
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        13.107.246.67Purchase Inquiry.xla.xlsxGet hashmaliciousUnknownBrowse
          https://site-xtxg5.powerappsportals.com/Get hashmaliciousHTMLPhisherBrowse
            expense-report.xlsxGet hashmaliciousKnowBe4Browse
              Purchase Inquiry.xla.xlsxGet hashmaliciousUnknownBrowse
                https://surveymars.com/q/78graAmKoGet hashmaliciousUnknownBrowse
                  COTA#U00c7#U00c3O.xlsGet hashmaliciousUnknownBrowse
                    Order_Mar25.xlsGet hashmaliciousUnknownBrowse
                      840.xlsGet hashmaliciousUnknownBrowse
                        Royal Mail Inland Claim Form V1.3.xlsmGet hashmaliciousUnknownBrowse
                          52.123.129.14Purchase Inquiry.xla.xlsxGet hashmaliciousUnknownBrowse
                            NB NT19901102W.xlsGet hashmaliciousUnknownBrowse
                              Fw_ VN MSG 4_42_16 AM DURATION_0f0b5f5e889448e7c935c0db95b1d2a6.msgGet hashmaliciousHTMLPhisher, Invisible JS, Tycoon2FABrowse
                                Brian Logie shared _Newfield Construction, Inc Shared a secured Documents_ with you.emlGet hashmaliciousUnknownBrowse
                                  Non-Disclosure Agreement Contract.docxGet hashmaliciousUnknownBrowse
                                    Acct# 427094 _ Plateautel Payment_ XEPOOFUCKD.emlGet hashmaliciousInvisible JS, Tycoon2FABrowse
                                      .xlsGet hashmaliciousUnknownBrowse
                                        Nouvelle_commande9353834.xlsGet hashmaliciousUnknownBrowse
                                          840.xlsGet hashmaliciousUnknownBrowse
                                            phish_alert_sp2_2.0.0.0.emlGet hashmaliciousUnknownBrowse
                                              5.161.200.29Purchase Inquiry.xla.xlsxGet hashmaliciousUnknownBrowse
                                                ORDEM DE COMPRA.xla.xlsxGet hashmaliciousUnknownBrowse
                                                  NB NT19901102W.xlsGet hashmaliciousUnknownBrowse
                                                    Purchase Inquiry.xla.xlsxGet hashmaliciousUnknownBrowse
                                                      ORDEM DE COMPRA.xla.xlsxGet hashmaliciousUnknownBrowse
                                                        NB NT19901102W.xlsGet hashmaliciousUnknownBrowse
                                                          Purchase Inquiry.xla.xlsxGet hashmaliciousUnknownBrowse
                                                            Purchase Inquiry.xla.xlsxGet hashmaliciousUnknownBrowse
                                                              52.123.128.14ORDEM DE COMPRA.xla.xlsxGet hashmaliciousUnknownBrowse
                                                                NB NT19901102W.xlsGet hashmaliciousUnknownBrowse
                                                                  phish_alert_sp2_2.0.0.0.emlGet hashmaliciousUnknownBrowse
                                                                    20250304_150220_TA6NsGnFKBQP6WuMJfIAtA3XK3ok9HgQ.emlGet hashmaliciousUnknownBrowse
                                                                      Non-Disclosure Agreement Contract.docxGet hashmaliciousUnknownBrowse
                                                                        Message.emlGet hashmaliciousUnknownBrowse
                                                                          Message_3478625.emlGet hashmaliciousUnknownBrowse
                                                                            #U5f38#U5a5c#U6cec#U5ed7#U60d7#U603d#U60ea#U661e.xlsGet hashmaliciousUnknownBrowse
                                                                              Nouvelle_commande9353834.xlsGet hashmaliciousUnknownBrowse
                                                                                Order_Mar25.xlsGet hashmaliciousUnknownBrowse
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  s-part-0039.t-0009.t-msedge.netPurchase Inquiry.xla.xlsxGet hashmaliciousUnknownBrowse
                                                                                  • 13.107.246.67
                                                                                  https://site-xtxg5.powerappsportals.com/Get hashmaliciousHTMLPhisherBrowse
                                                                                  • 13.107.246.67
                                                                                  expense-report.xlsxGet hashmaliciousKnowBe4Browse
                                                                                  • 13.107.246.67
                                                                                  Purchase Inquiry.xla.xlsxGet hashmaliciousUnknownBrowse
                                                                                  • 13.107.246.67
                                                                                  https://surveymars.com/q/78graAmKoGet hashmaliciousUnknownBrowse
                                                                                  • 13.107.246.67
                                                                                  f468369488.exeGet hashmaliciousUnknownBrowse
                                                                                  • 13.107.246.67
                                                                                  COTA#U00c7#U00c3O.xlsGet hashmaliciousUnknownBrowse
                                                                                  • 13.107.246.67
                                                                                  Order_Mar25.xlsGet hashmaliciousUnknownBrowse
                                                                                  • 13.107.246.67
                                                                                  Royal Mail Inland Claim Form V1.3.xlsmGet hashmaliciousUnknownBrowse
                                                                                  • 13.107.246.67
                                                                                  s-0005.dual-s-msedge.netPurchase Inquiry.xla.xlsxGet hashmaliciousUnknownBrowse
                                                                                  • 52.123.129.14
                                                                                  ORDEM DE COMPRA.xla.xlsxGet hashmaliciousUnknownBrowse
                                                                                  • 52.123.128.14
                                                                                  NB NT19901102W.xlsGet hashmaliciousUnknownBrowse
                                                                                  • 52.123.129.14