Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
NEW_TENDER_LIST.xlsx

Overview

General Information

Sample name:NEW_TENDER_LIST.xlsx
Analysis ID:1639287
MD5:7db469cc5823860442187d786f95c113
SHA1:8083f4db44a7b1b56291c9b8848f8e2cf06cbf44
SHA256:a27409aaa6dda828d7c3ed52a82aadccf3067763c06b6835e1b1d952b59f5d6c
Tags:xlsxuser-abuse_ch
Infos:
Errors
  • Corrupt sample or wrongly selected analyzer.

Detection

Score:56
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Document misses a certain OLE stream usually present in this Microsoft Office document type
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Excel Network Connections
Sigma detected: Suspicious Office Outbound Connections

Classification

  • System is w11x64_office
  • EXCEL.EXE (PID: 7800 cmdline: "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding MD5: F9F7B6C42211B06E7AC3E4B60AA8FB77)
    • splwow64.exe (PID: 2564 cmdline: C:\Windows\splwow64.exe 12288 MD5: AF4A7EBF6114EE9E6FBCC910EC3C96E6)
  • cleanup
No configs have been found
No yara matches
Source: Network ConnectionAuthor: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0", Tim Shelton: Data: DestinationIp: 13.107.253.72, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE, Initiated: true, ProcessId: 7800, Protocol: tcp, SourceIp: 192.168.2.26, SourceIsIpv6: false, SourcePort: 57457
Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.26, DestinationIsIpv6: false, DestinationPort: 57457, EventID: 3, Image: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE, Initiated: true, ProcessId: 7800, Protocol: tcp, SourceIp: 13.107.253.72, SourceIsIpv6: false, SourcePort: 443
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: NEW_TENDER_LIST.xlsxAvira: detected
Source: NEW_TENDER_LIST.xlsxVirustotal: Detection: 57%Perma Link
Source: NEW_TENDER_LIST.xlsxReversingLabs: Detection: 61%
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEDirectory created: C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xmlJump to behavior
Source: unknownHTTPS traffic detected: 13.107.253.72:443 -> 192.168.2.26:57457 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.253.72:443 -> 192.168.2.26:57458 version: TLS 1.2
Source: global trafficDNS query: name: browser.events.data.msn.cn
Source: global trafficDNS query: name: otelrules.svc.static.microsoft
Source: global trafficTCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.26:57457
Source: global trafficTCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.26:57458
Source: global trafficTCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.26:57457
Source: global trafficTCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.26:57458
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.26:57457
Source: global trafficTCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.26:57457
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.26:57457
Source: global trafficTCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.26:57457
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.26:57457
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.26:57457
Source: global trafficTCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.26:57457
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.26:57457
Source: global trafficTCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.26:57457
Source: global trafficTCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.26:57457
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.26:57458
Source: global trafficTCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.26:57458
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.26:57458
Source: global trafficTCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.26:57458
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.26:57458
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.26:57458
Source: global trafficTCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.26:57458
Source: global trafficTCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.26:57458
Source: Joe Sandbox ViewIP Address: 13.107.253.72 13.107.253.72
Source: Joe Sandbox ViewJA3 fingerprint: 258a5a1e95b8a911872bae9081526644
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /rules/rule120201v19s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.18129; Pro)Host: otelrules.svc.static.microsoft
Source: global trafficHTTP traffic detected: GET /rules/rule170146v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.18129; Pro)Host: otelrules.svc.static.microsoft
Source: global trafficDNS traffic detected: DNS query: browser.events.data.msn.cn
Source: global trafficDNS traffic detected: DNS query: otelrules.svc.static.microsoft
Source: unknownNetwork traffic detected: HTTP traffic on port 57458 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 57457 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57457
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57458
Source: unknownHTTPS traffic detected: 13.107.253.72:443 -> 192.168.2.26:57457 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.253.72:443 -> 192.168.2.26:57458 version: TLS 1.2
Source: NEW_TENDER_LIST.xlsxOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: classification engineClassification label: mal56.winXLSX@3/7@2/1
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xmlJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Users\user\Desktop\~$NEW_TENDER_LIST.xlsxJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\{4376A321-5BDF-48C8-A9A0-E15A0BE5C3BA} - OProcSessId.datJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: NEW_TENDER_LIST.xlsxVirustotal: Detection: 57%
Source: NEW_TENDER_LIST.xlsxReversingLabs: Detection: 61%
Source: unknownProcess created: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\CommonJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEDirectory created: C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xmlJump to behavior
Source: NEW_TENDER_LIST.xlsxStatic file information: File size 1668096 > 1048576
Source: NEW_TENDER_LIST.xlsxInitial sample: OLE indicators vbamacros = False
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeWindow / User API: threadDelayed 842Jump to behavior
Source: C:\Windows\splwow64.exeLast function: Thread delayed
Source: C:\Windows\splwow64.exeLast function: Thread delayed
Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information queried: ProcessInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
Exploitation for Client Execution
Path Interception1
Process Injection
3
Masquerading
OS Credential Dumping1
Process Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
File and Directory Discovery
Distributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
NEW_TENDER_LIST.xlsx57%VirustotalBrowse
NEW_TENDER_LIST.xlsx61%ReversingLabsDocument-Office.Exploit.CVE-2017-11882
NEW_TENDER_LIST.xlsx100%AviraEXP/CVE-2017-11882.Gen
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
s-part-0044.t-0009.fb-t-msedge.net
13.107.253.72
truefalse
    high
    onedscolprdwus12.westus.cloudapp.azure.com
    20.189.173.13
    truefalse
      high
      s-0005.dual-s-msedge.net
      52.123.128.14
      truefalse
        high
        browser.events.data.msn.cn
        unknown
        unknownfalse
          high
          otelrules.svc.static.microsoft
          unknown
          unknownfalse
            high
            NameMaliciousAntivirus DetectionReputation
            https://otelrules.svc.static.microsoft/rules/rule170146v0s19.xmlfalse
              high
              https://otelrules.svc.static.microsoft/rules/rule120201v19s19.xmlfalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                13.107.253.72
                s-part-0044.t-0009.fb-t-msedge.netUnited States
                8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                Joe Sandbox version:42.0.0 Malachite
                Analysis ID:1639287
                Start date and time:2025-03-15 09:06:15 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 5m 14s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:defaultwindowsofficecookbook.jbs
                Analysis system description:Windows 11 23H2 with Office Professional Plus 2021, Chrome 131, Firefox 133, Adobe Reader DC 24, Java 8 Update 431, 7zip 24.09
                Run name:Potential for more IOCs and behavior
                Number of analysed new started processes analysed:18
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:NEW_TENDER_LIST.xlsx
                Detection:MAL
                Classification:mal56.winXLSX@3/7@2/1
                EGA Information:Failed
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .xlsx
                • Found Word or Excel or PowerPoint or XPS Viewer
                • Attach to Office via COM
                • Scroll down
                • Close Viewer
                • Corrupt sample or wrongly selected analyzer.
                • Exclude process from analysis (whitelisted): dllhost.exe, sppsvc.exe, SIHClient.exe, appidcertstorecheck.exe, conhost.exe, svchost.exe
                • Excluded IPs from analysis (whitelisted): 52.109.32.97, 52.109.76.243, 20.42.73.31, 52.123.128.14, 40.126.31.1, 20.109.210.53, 20.150.78.196
                • Excluded domains from analysis (whitelisted): ecs.office.com, slscr.update.microsoft.com, prod.configsvc1.live.com.akadns.net, ctldl.windowsupdate.com, prod.roaming1.live.com.akadns.net, eur.roaming1.live.com.akadns.net, onedscolprdeus21.eastus.cloudapp.azure.com, neu-azsc-000.roaming.officeapps.live.com, mobile.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, roaming.officeapps.live.com, weathermapdata.blob.core.windows.net, dual-s-0005-office.config.skype.com, login.live.com, config.officeapps.live.com, osiprod-neu-buff-azsc-000.northeurope.cloudapp.azure.com, officeclient.microsoft.com, ecs.office.trafficmanager.net, ukw-azsc-config.officeapps.live.com, europe.configsvc1.live.com.akadns.net, mobile.events.data.trafficmanager.net
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtCreateKey calls found.
                • Report size getting too big, too many NtQueryAttributesFile calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                TimeTypeDescription
                04:08:23API Interceptor866x Sleep call for process: splwow64.exe modified
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                13.107.253.72SecuriteInfo.com.Other.Malware-gen.17831.10614.xlsxGet hashmaliciousUnknownBrowse
                  Quotation.xlsGet hashmaliciousUnknownBrowse
                    https://safelinks.mygo1.com/ls/click?upn=u001.1mDt7ytPYCJSVG-2BhF04StW2tROdwwKr6jRaBFQun7DQsPCpIDdXBBFCv8a7W8LK7Rl6rwBC0tgURk55SBHyIzH8o575VHCM17sxou55q5sU-2BB8ESFPqFu-2FbpVoTlNake-2FQOhgnc23GE2x5-2BOAS2qCBGctpZ2IMzpWiWBU435uwa5-2FmA2HTxNem3-2Bt0ionxJjkqo4GGNcUs5-2BGYyYk-2FC6syojaGqt-2FBR8V6d6AroZskWO-2Btp2xcBwLL3o-2FZl7OSQxQ18gwEx-2BCrEr2XCC-2BjFJ7-2BDOC15dowjH72795CZZSHA-3Da76R_h5tndX3XP82u2CVP7HmVo430WGiFRFD0yG4tHzfM60QIQKknMz-2Bv4cvubxA4sUh-2F1aJ6qoya6273blXHvxERqm-2FEO-2BkfpUsxJp1Gre7i4RpcU3-2BZM-2Bz6eR0jjyehedttUWDFeqz7YehgBaJvqe4tJbDwyMaBzpAl1ycrHcR0yCJQvaIQ4aeF-2BQ-2B79-2B-2FlIK6fkzG-2B9ka9kfr1u2tUL7UElQ6I6ve-2BmqguhJR37zflsfTCQ6XW-2B9olHHI-2F-2FliITE0nSfPOkW6-2FWiGzwdjHPW9q36TssasiqezSGGoZpPD2wXb44aCqqvSglmXXnDeasuIi4iEVz8lUI9WDaOvlSsORhE9XfmCNPK7IqW58SgKJzo1pyrc2FIEkiket3ZcM2YtrGet hashmaliciousUnknownBrowse
                      http://lookerstudio%2e%67%6f%6f%67%6c%65%2e%63%6f%6d/s/tVpHSqKmotAGet hashmaliciousHTMLPhisherBrowse
                        Copy of 1- GCP Vendor Information Smart Form Stepan.xlsmGet hashmaliciousUnknownBrowse
                          Copy of 1- GCP Vendor Information Smart Form Stepan.xlsmGet hashmaliciousUnknownBrowse
                            peYnzEuoAo.exeGet hashmaliciousHancitorBrowse
                              dok PZ 2025-03-11_142242 fin_Orygina#U0142.xlsGet hashmaliciousUnknownBrowse
                                NB NT19901102W.xlsGet hashmaliciousUnknownBrowse
                                  Document.xlsGet hashmaliciousUnknownBrowse
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    s-0005.dual-s-msedge.netProof of Payment and Statement.xlsGet hashmaliciousUnknownBrowse
                                    • 52.123.129.14
                                    PO-ARJ-2025-15ACA.xla.xlsxGet hashmaliciousUnknownBrowse
                                    • 52.123.129.14
                                    Account statement Payment release.xlsGet hashmaliciousUnknownBrowse
                                    • 52.123.129.14
                                    DHL 733988905ZHH.xla.xlsxGet hashmaliciousUnknownBrowse
                                    • 52.123.128.14
                                    (Ref PO24777.xlsGet hashmaliciousUnknownBrowse
                                    • 52.123.129.14
                                    PO-ARJ-2025-15ACA.xla.xlsxGet hashmaliciousUnknownBrowse
                                    • 52.123.129.14
                                    DHL 733988905ZHH.xla.xlsxGet hashmaliciousUnknownBrowse
                                    • 52.123.129.14
                                    (Ref PO24777.xlsGet hashmaliciousUnknownBrowse
                                    • 52.123.128.14
                                    SecuriteInfo.com.Other.Malware-gen.8493.9635.xlsxGet hashmaliciousUnknownBrowse
                                    • 52.123.128.14
                                    onedscolprdwus12.westus.cloudapp.azure.comPurchase Inquiry.xla.xlsxGet hashmaliciousUnknownBrowse
                                    • 20.189.173.13
                                    SecuriteInfo.com.Other.Malware-gen.27127.12049.msiGet hashmaliciousUnknownBrowse
                                    • 20.189.173.13
                                    PiTolfRfLG.exeGet hashmaliciousAmadey, Credential Flusher, GCleaner, LummaC Stealer, PureLog Stealer, Stealc, VidarBrowse
                                    • 20.189.173.13
                                    s-part-0044.t-0009.fb-t-msedge.netSecuriteInfo.com.Other.Malware-gen.17831.10614.xlsxGet hashmaliciousUnknownBrowse
                                    • 13.107.253.72
                                    https://staemcommunuttly.com/gift/activation=Dor5Fhnm1wGet hashmaliciousUnknownBrowse
                                    • 13.107.253.72
                                    ATT50896.svgGet hashmaliciousHTMLPhisherBrowse
                                    • 13.107.253.72
                                    Quotation.xlsGet hashmaliciousUnknownBrowse
                                    • 13.107.253.72
                                    http://modeltest.newworkventures.org/Get hashmaliciousHTMLPhisherBrowse
                                    • 13.107.253.72
                                    https://modeltest.newworkventures.org/signin-oidcGet hashmaliciousHTMLPhisherBrowse
                                    • 13.107.253.72
                                    http://soportedecuenta.github.io/Get hashmaliciousUnknownBrowse
                                    • 13.107.253.72
                                    https://safelinks.mygo1.com/ls/click?upn=u001.1mDt7ytPYCJSVG-2BhF04StW2tROdwwKr6jRaBFQun7DQsPCpIDdXBBFCv8a7W8LK7Rl6rwBC0tgURk55SBHyIzH8o575VHCM17sxou55q5sU-2BB8ESFPqFu-2FbpVoTlNake-2FQOhgnc23GE2x5-2BOAS2qCBGctpZ2IMzpWiWBU435uwa5-2FmA2HTxNem3-2Bt0ionxJjkqo4GGNcUs5-2BGYyYk-2FC6syojaGqt-2FBR8V6d6AroZskWO-2Btp2xcBwLL3o-2FZl7OSQxQ18gwEx-2BCrEr2XCC-2BjFJ7-2BDOC15dowjH72795CZZSHA-3Da76R_h5tndX3XP82u2CVP7HmVo430WGiFRFD0yG4tHzfM60QIQKknMz-2Bv4cvubxA4sUh-2F1aJ6qoya6273blXHvxERqm-2FEO-2BkfpUsxJp1Gre7i4RpcU3-2BZM-2Bz6eR0jjyehedttUWDFeqz7YehgBaJvqe4tJbDwyMaBzpAl1ycrHcR0yCJQvaIQ4aeF-2BQ-2B79-2B-2FlIK6fkzG-2B9ka9kfr1u2tUL7UElQ6I6ve-2BmqguhJR37zflsfTCQ6XW-2B9olHHI-2F-2FliITE0nSfPOkW6-2FWiGzwdjHPW9q36TssasiqezSGGoZpPD2wXb44aCqqvSglmXXnDeasuIi4iEVz8lUI9WDaOvlSsORhE9XfmCNPK7IqW58SgKJzo1pyrc2FIEkiket3ZcM2YtrGet hashmaliciousUnknownBrowse
                                    • 13.107.253.72
                                    http://lookerstudio%2e%67%6f%6f%67%6c%65%2e%63%6f%6d/s/tVpHSqKmotAGet hashmaliciousHTMLPhisherBrowse
                                    • 13.107.253.72
                                    Copy of 1- GCP Vendor Information Smart Form Stepan.xlsmGet hashmaliciousUnknownBrowse
                                    • 13.107.253.72
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    MICROSOFT-CORP-MSN-AS-BLOCKUSOur Order.xlsGet hashmaliciousUnknownBrowse
                                    • 20.189.173.10
                                    APC2_240708172813545null_847608629.xlsGet hashmaliciousUnknownBrowse
                                    • 52.123.128.14
                                    FORMULARZ ODPRAWY CELNEJ DHL.xlsGet hashmaliciousUnknownBrowse
                                    • 52.182.143.215
                                    PO-ARJ-2025-15ACA.xla.xlsxGet hashmaliciousUnknownBrowse
                                    • 13.107.246.60
                                    Account statement Payment release.xlsGet hashmaliciousUnknownBrowse
                                    • 13.107.253.67
                                    DHL 733988905ZHH.xla.xlsxGet hashmaliciousUnknownBrowse
                                    • 13.107.246.60
                                    (Ref PO24777.xlsGet hashmaliciousUnknownBrowse
                                    • 13.107.246.60
                                    PO-ARJ-2025-15ACA.xla.xlsxGet hashmaliciousUnknownBrowse
                                    • 13.107.246.60
                                    P0-0994-12.xlsGet hashmaliciousUnknownBrowse
                                    • 13.107.246.60
                                    DHL 733988905ZHH.xla.xlsxGet hashmaliciousUnknownBrowse
                                    • 13.107.246.60
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    258a5a1e95b8a911872bae9081526644PO-ARJ-2025-15ACA.xla.xlsxGet hashmaliciousUnknownBrowse
                                    • 13.107.253.72
                                    DHL 733988905ZHH.xla.xlsxGet hashmaliciousUnknownBrowse
                                    • 13.107.253.72
                                    (Ref PO24777.xlsGet hashmaliciousUnknownBrowse
                                    • 13.107.253.72
                                    P0-0994-12.xlsGet hashmaliciousUnknownBrowse
                                    • 13.107.253.72
                                    SecuriteInfo.com.Other.Malware-gen.8493.9635.xlsxGet hashmaliciousUnknownBrowse
                                    • 13.107.253.72
                                    SecuriteInfo.com.Other.Malware-gen.17831.10614.xlsxGet hashmaliciousUnknownBrowse
                                    • 13.107.253.72
                                    2025-027RC2-ORDEN AVOCOMEX.xlsGet hashmaliciousUnknownBrowse
                                    • 13.107.253.72
                                    _________03M4138.docx.bin.docGet hashmaliciousUnknownBrowse
                                    • 13.107.253.72
                                    Quotation.xlsGet hashmaliciousUnknownBrowse
                                    • 13.107.253.72
                                    Copy of 1- GCP Vendor Information Smart Form Stepan.xlsmGet hashmaliciousUnknownBrowse
                                    • 13.107.253.72
                                    No context
                                    Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):118
                                    Entropy (8bit):3.5700810731231707
                                    Encrypted:false
                                    SSDEEP:3:QaklTlAlXMLLmHlIlFLlmIK/5lTn84vlJlhlXlDHlA6l3l6Als:QFulcLk04/5p8GVz6QRq
                                    MD5:573220372DA4ED487441611079B623CD
                                    SHA1:8F9D967AC6EF34640F1F0845214FBC6994C0CB80
                                    SHA-256:BE84B842025E4241BFE0C9F7B8F86A322E4396D893EF87EA1E29C74F47B6A22D
                                    SHA-512:F19FA3583668C3AF92A9CEF7010BD6ECEC7285F9C8665F2E9528DBA606F105D9AF9B1DB0CF6E7F77EF2E395943DC0D5CB37149E773319078688979E4024F9DD7
                                    Malicious:false
                                    Reputation:high, very likely benign file
                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.H.e.a.r.t.b.e.a.t.C.a.c.h.e./.>.
                                    Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):20971520
                                    Entropy (8bit):8.112143835430977E-5
                                    Encrypted:false
                                    SSDEEP:3:Tuekk9NJtHFfs1XsExe/t:qeVJ8
                                    MD5:AFDEAC461EEC32D754D8E6017E845D21
                                    SHA1:5D0874C19B70638A0737696AEEE55BFCC80D7ED8
                                    SHA-256:3A96B02F6A09F6A6FAC2A44A5842FF9AEB17EB4D633E48ABF6ADDF6FB447C7E2
                                    SHA-512:CAB6B8F9FFDBD80210F42219BAC8F1124D6C0B6995C5128995F7F48CED8EF0F2159EA06A2CD09B1FDCD409719F94A7DB437C708D3B1FDA01FDC80141A4595FC7
                                    Malicious:false
                                    Reputation:moderate, very likely benign file
                                    Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):20971520
                                    Entropy (8bit):0.0
                                    Encrypted:false
                                    SSDEEP:3::
                                    MD5:8F4E33F3DC3E414FF94E5FB6905CBA8C
                                    SHA1:9674344C90C2F0646F0B78026E127C9B86E3AD77
                                    SHA-256:CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC
                                    SHA-512:7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB
                                    Malicious:false
                                    Reputation:high, very likely benign file
                                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                    File Type:ASCII text, with very long lines (28682), with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):20971520
                                    Entropy (8bit):0.16990720985605412
                                    Encrypted:false
                                    SSDEEP:1536:BWj+APunfiu9RrtT4lpjPI1A3jIhwxT5biTiSPDeM0kyMW/4z96p8bxdOG0NsTt8:kKA36bT4jI1AR4XbuTBgalGX7
                                    MD5:584AA8C8AAF84DFD43E376F8CE753CEC
                                    SHA1:C6C81514CF3761FE517B94D5C4CD54EFF02020F8
                                    SHA-256:47FB0CA657DC849690A7D86595CB5567C9DEC7926009D213B2730E5A53C645C0
                                    SHA-512:0CE9E49EA99774B137308C70B73D1631C730B1FE4B22FC84CBE51A161EDDFAAD0C618E56CD4F9D6794CA946DF22202263A157BC46CA0EC66C9CF81A4A001475D
                                    Malicious:false
                                    Reputation:low
                                    Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation..03/15/2025 08:07:21.443.EXCEL (0x1E78).0x1EE4.Microsoft Excel.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Experimentation.FeatureQueryBatched","Flags":33777005812056321,"InternalSequenceNumber":17,"Time":"2025-03-15T08:07:21.443Z","Data.Sequence":0,"Data.Count":128,"Data.Features":"[ { \"ID\" : 1, \"N\" : \"Microsoft.Office.Telemetry.TrackCPSWrites\", \"V\" : false, \"S\" : 1, \"P\" : 0, \"T\" : \"2025-03-15T08:07:20.9277984Z\", \"C\" : \"33\", \"Q\" : 0.0, \"M\" : 0, \"F\" : 5 }, { \"ID\" : 1, \"N\" : \"Microsoft.Office.Telemetry.CPSMaxWrites\", \"V\" : 2, \"S\" : 1, \"P\" : 0, \"T\" : \"2025-03-15T08:07:20.9277984Z\", \"C\" : \"33\", \"Q\" : 0.0, \"M\" : 0, \"F\" : 5 }, { \"ID\" : 1, \"N\" : \"Microsoft.Office.Word.UAEOnSafeModeEnabled\", \"V\" : true, \"S\" : 1, \"P\" : 0, \"T\" : \"2025-03-15T08:07:20.9277984Z\", \"C\" : \"\", \"Q\" : 7.0, \"M\" : 0, \"F\" : 5, \"G\" : \"Opt\" }, { \"ID\" : 1, \"
                                    Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):20971520
                                    Entropy (8bit):0.0
                                    Encrypted:false
                                    SSDEEP:3::
                                    MD5:8F4E33F3DC3E414FF94E5FB6905CBA8C
                                    SHA1:9674344C90C2F0646F0B78026E127C9B86E3AD77
                                    SHA-256:CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC
                                    SHA-512:7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB
                                    Malicious:false
                                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):512
                                    Entropy (8bit):0.0
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                    Malicious:false
                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):165
                                    Entropy (8bit):1.4377382811115937
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:47A294922BE037C38D73C866A3F7F5E0
                                    SHA1:E165F663BF052660CF1858D065388CC128E631D2
                                    SHA-256:34033A21A8D54B0627C089E5C6A6C3AD6CE045DF86ACDED6A31D9613B879C265
                                    SHA-512:F46ABEEF0E3ED4B80B2C996E44E6E103FE22D12F5BF461708AE401C1C5F8CAC3718068C2D7FF0A1995A0866E473AB1DF6A20A4BD12211B9BAA99EB4535CFE83A
                                    Malicious:true
                                    Preview:.user ..G.a.n.j.i. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                    File type:Composite Document File V2 Document, Cannot read section info
                                    Entropy (8bit):7.408730234287312
                                    TrID:
                                    • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
                                    File name:NEW_TENDER_LIST.xlsx
                                    File size:1'668'096 bytes
                                    MD5:7db469cc5823860442187d786f95c113
                                    SHA1:8083f4db44a7b1b56291c9b8848f8e2cf06cbf44
                                    SHA256:a27409aaa6dda828d7c3ed52a82aadccf3067763c06b6835e1b1d952b59f5d6c
                                    SHA512:cf32ecb2ff48666525c2f75da3f3435135a4d6f037fbb1f101fdafd3d3de7963ccc7842ac72d31436880d7070b8c78bdd291d4a4bd9748592100c195c3758201
                                    SSDEEP:24576:eB/QuOIWIvTZkmiuIeOVv0n0Qzql72JguPoenV7cvXceEB4UPeBGK:S/RPK5VcDseWcPu
                                    TLSH:50753308EEC24F47C31C27399192AD091A5ABD4CAB15DC37674A3092653F7B686CB93C
                                    File Content Preview:........................>......................................................................................................................................................................................................................................
                                    Icon Hash:35e58a8c0c8a85b9
                                    Document Type:OLE
                                    Number of OLE Files:1
                                    Has Summary Info:
                                    Application Name:None
                                    Encrypted Document:False
                                    Contains Word Document Stream:False
                                    Contains Workbook/Book Stream:False
                                    Contains PowerPoint Document Stream:False
                                    Contains Visio Document Stream:False
                                    Contains ObjectPool Stream:False
                                    Flash Objects Count:0
                                    Contains VBA Macros:False
                                    General
                                    Stream Path:\x1OlE10nAtiVE
                                    CLSID:
                                    File Type:data
                                    Stream Size:1652443
                                    Entropy:7.39425810603417
                                    Base64 Encoded:True
                                    Data ASCII:a $ . . . ; U . . L . . l 6 . B ( x x 6 S . R . Q - E . V D . . ~ N E l C . 5 f [ d . . , S D - ^ . S B . s _ | ' I . = 0 ^ $ u . q 4 D z . M G = y X G = r . L V . ] . a 2 . J P % ) ' \\ + . A B . ` n . u ( h / . D T { . . . ( J q R . . x b > Q f . Q H C . Q u . . _ - C ^ ~ k D c a ? x . c T o T 2 2 . . . . t . . | # 0 . a 7 . . n . H . . . . + . . 9 ^ . 5 7 h ` F ~ E ^ J v P * k > p 0 ^ N e . . E z J . d . L . % . M [ H $ - ) x } ] H b c U t x j . L . @ # Y x ( * p . H 5 X _ [ 8 B F [ f ] 9 { . i > . .
                                    Data Raw:61 24 8c 05 03 86 00 3b 55 93 01 08 c2 4c be 92 11 c1 93 81 c6 aa ab 84 6c 8b 36 8b 1e be 42 28 d3 78 81 ee 92 c0 8c 78 8b 36 53 ff d6 05 52 11 51 e3 2d 97 c4 45 e3 ff e0 0a 56 da 44 00 20 b6 ed de 0e 95 7e 4e e3 f6 c5 45 6c 43 d2 06 35 66 5b 64 18 c4 b5 2c a7 53 ba 44 d2 2d ef 5e 13 d8 53 42 e0 0a 73 5f 7c 27 96 49 0e 3d ed 30 be 5e ed 24 75 d8 0a 96 81 f0 71 d8 34 83 a7 44 84 9f
                                    General
                                    Stream Path:bazLP36fo8K
                                    CLSID:
                                    File Type:empty
                                    Stream Size:0
                                    Entropy:0.0
                                    Base64 Encoded:False
                                    Data ASCII:
                                    Data Raw:
                                    TimestampSource PortDest PortSource IPDest IP
                                    Mar 15, 2025 09:08:28.773694038 CET57457443192.168.2.2613.107.253.72
                                    Mar 15, 2025 09:08:28.773753881 CET4435745713.107.253.72192.168.2.26
                                    Mar 15, 2025 09:08:28.773849010 CET57457443192.168.2.2613.107.253.72
                                    Mar 15, 2025 09:08:28.777360916 CET57458443192.168.2.2613.107.253.72
                                    Mar 15, 2025 09:08:28.777405024 CET4435745813.107.253.72192.168.2.26
                                    Mar 15, 2025 09:08:28.777498007 CET57458443192.168.2.2613.107.253.72
                                    Mar 15, 2025 09:08:28.778304100 CET57457443192.168.2.2613.107.253.72
                                    Mar 15, 2025 09:08:28.778323889 CET4435745713.107.253.72192.168.2.26
                                    Mar 15, 2025 09:08:28.778431892 CET57458443192.168.2.2613.107.253.72
                                    Mar 15, 2025 09:08:28.778445005 CET4435745813.107.253.72192.168.2.26
                                    Mar 15, 2025 09:08:29.456819057 CET4435745713.107.253.72192.168.2.26
                                    Mar 15, 2025 09:08:29.456926107 CET57457443192.168.2.2613.107.253.72
                                    Mar 15, 2025 09:08:29.460357904 CET57457443192.168.2.2613.107.253.72
                                    Mar 15, 2025 09:08:29.460372925 CET4435745713.107.253.72192.168.2.26
                                    Mar 15, 2025 09:08:29.460654020 CET4435745713.107.253.72192.168.2.26
                                    Mar 15, 2025 09:08:29.481615067 CET57457443192.168.2.2613.107.253.72
                                    Mar 15, 2025 09:08:29.524326086 CET4435745713.107.253.72192.168.2.26
                                    Mar 15, 2025 09:08:29.617721081 CET4435745713.107.253.72192.168.2.26
                                    Mar 15, 2025 09:08:29.617753983 CET4435745713.107.253.72192.168.2.26
                                    Mar 15, 2025 09:08:29.618029118 CET57457443192.168.2.2613.107.253.72
                                    Mar 15, 2025 09:08:29.618048906 CET4435745713.107.253.72192.168.2.26
                                    Mar 15, 2025 09:08:29.618411064 CET4435745713.107.253.72192.168.2.26
                                    Mar 15, 2025 09:08:29.618458033 CET57457443192.168.2.2613.107.253.72
                                    Mar 15, 2025 09:08:29.618767977 CET57457443192.168.2.2613.107.253.72
                                    Mar 15, 2025 09:08:29.618782997 CET4435745713.107.253.72192.168.2.26
                                    Mar 15, 2025 09:08:29.618792057 CET57457443192.168.2.2613.107.253.72
                                    Mar 15, 2025 09:08:29.618798018 CET4435745713.107.253.72192.168.2.26
                                    Mar 15, 2025 09:08:29.680216074 CET4435745813.107.253.72192.168.2.26
                                    Mar 15, 2025 09:08:29.680288076 CET57458443192.168.2.2613.107.253.72
                                    Mar 15, 2025 09:08:29.682336092 CET57458443192.168.2.2613.107.253.72
                                    Mar 15, 2025 09:08:29.682342052 CET4435745813.107.253.72192.168.2.26
                                    Mar 15, 2025 09:08:29.682617903 CET4435745813.107.253.72192.168.2.26
                                    Mar 15, 2025 09:08:29.683455944 CET57458443192.168.2.2613.107.253.72
                                    Mar 15, 2025 09:08:29.728318930 CET4435745813.107.253.72192.168.2.26
                                    Mar 15, 2025 09:08:29.796588898 CET4435745813.107.253.72192.168.2.26
                                    Mar 15, 2025 09:08:29.796650887 CET4435745813.107.253.72192.168.2.26
                                    Mar 15, 2025 09:08:29.796698093 CET57458443192.168.2.2613.107.253.72
                                    Mar 15, 2025 09:08:29.797200918 CET57458443192.168.2.2613.107.253.72
                                    Mar 15, 2025 09:08:29.797224045 CET4435745813.107.253.72192.168.2.26
                                    Mar 15, 2025 09:08:29.797236919 CET57458443192.168.2.2613.107.253.72
                                    Mar 15, 2025 09:08:29.797245026 CET4435745813.107.253.72192.168.2.26
                                    TimestampSource PortDest PortSource IPDest IP
                                    Mar 15, 2025 09:07:12.216197968 CET5312753192.168.2.261.1.1.1
                                    Mar 15, 2025 09:07:12.223490953 CET53531271.1.1.1192.168.2.26
                                    Mar 15, 2025 09:08:28.709373951 CET6277553192.168.2.261.1.1.1
                                    Mar 15, 2025 09:08:28.772020102 CET53627751.1.1.1192.168.2.26
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Mar 15, 2025 09:07:12.216197968 CET192.168.2.261.1.1.10xf0a4Standard query (0)browser.events.data.msn.cnA (IP address)IN (0x0001)false
                                    Mar 15, 2025 09:08:28.709373951 CET192.168.2.261.1.1.10xd10aStandard query (0)otelrules.svc.static.microsoftA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Mar 15, 2025 09:07:12.223490953 CET1.1.1.1192.168.2.260xf0a4No error (0)browser.events.data.msn.cnglobal.asimov.events.data.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                                    Mar 15, 2025 09:07:12.223490953 CET1.1.1.1192.168.2.260xf0a4No error (0)global.asimov.events.data.trafficmanager.netonedscolprdwus12.westus.cloudapp.azure.comCNAME (Canonical name)IN (0x0001)false
                                    Mar 15, 2025 09:07:12.223490953 CET1.1.1.1192.168.2.260xf0a4No error (0)onedscolprdwus12.westus.cloudapp.azure.com20.189.173.13A (IP address)IN (0x0001)false
                                    Mar 15, 2025 09:07:24.230741978 CET1.1.1.1192.168.2.260x8e6fNo error (0)ecs-office.s-0005.dual-s-msedge.nets-0005.dual-s-msedge.netCNAME (Canonical name)IN (0x0001)false
                                    Mar 15, 2025 09:07:24.230741978 CET1.1.1.1192.168.2.260x8e6fNo error (0)s-0005.dual-s-msedge.net52.123.128.14A (IP address)IN (0x0001)false
                                    Mar 15, 2025 09:07:24.230741978 CET1.1.1.1192.168.2.260x8e6fNo error (0)s-0005.dual-s-msedge.net52.123.129.14A (IP address)IN (0x0001)false
                                    Mar 15, 2025 09:08:28.772020102 CET1.1.1.1192.168.2.260xd10aNo error (0)otelrules.svc.static.microsoftotelrules-bzhndjfje8dvh5fd.z01.azurefd.netCNAME (Canonical name)IN (0x0001)false
                                    Mar 15, 2025 09:08:28.772020102 CET1.1.1.1192.168.2.260xd10aNo error (0)otelrules-bzhndjfje8dvh5fd.z01.azurefd.netstar-azurefd-prod.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                                    Mar 15, 2025 09:08:28.772020102 CET1.1.1.1192.168.2.260xd10aNo error (0)star-azurefd-prod.trafficmanager.netshed.dual-low.s-part-0032.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                    Mar 15, 2025 09:08:28.772020102 CET1.1.1.1192.168.2.260xd10aNo error (0)shed.dual-low.s-part-0032.t-0009.t-msedge.netazurefd-t-fb-prod.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                                    Mar 15, 2025 09:08:28.772020102 CET1.1.1.1192.168.2.260xd10aNo error (0)azurefd-t-fb-prod.trafficmanager.netdual.s-part-0044.t-0009.fb-t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                    Mar 15, 2025 09:08:28.772020102 CET1.1.1.1192.168.2.260xd10aNo error (0)dual.s-part-0044.t-0009.fb-t-msedge.nets-part-0044.t-0009.fb-t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                    Mar 15, 2025 09:08:28.772020102 CET1.1.1.1192.168.2.260xd10aNo error (0)s-part-0044.t-0009.fb-t-msedge.net13.107.253.72A (IP address)IN (0x0001)false
                                    • otelrules.svc.static.microsoft
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.265745713.107.253.724437800C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                    TimestampBytes transferredDirectionData
                                    2025-03-15 08:08:29 UTC215OUTGET /rules/rule120201v19s19.xml HTTP/1.1
                                    Connection: Keep-Alive
                                    Accept-Encoding: gzip
                                    User-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.18129; Pro)
                                    Host: otelrules.svc.static.microsoft
                                    2025-03-15 08:08:29 UTC515INHTTP/1.1 200 OK
                                    Date: Sat, 15 Mar 2025 08:08:29 GMT
                                    Content-Type: text/xml
                                    Content-Length: 2781
                                    Connection: close
                                    Vary: Accept-Encoding
                                    Cache-Control: public, max-age=604800, immutable
                                    Last-Modified: Tue, 31 Dec 2024 22:07:50 GMT
                                    ETag: "0x8DD29E791389B5C"
                                    x-ms-request-id: 23bbeb9e-101e-0046-6cd2-9491b0000000
                                    x-ms-version: 2018-03-28
                                    x-azure-ref: 20250315T080829Z-r1985965d79fbn4khC1MNZ72xn00000007eg0000000046ta
                                    x-fd-int-roxy-purgeid: 0
                                    X-Cache: TCP_HIT
                                    X-Cache-Info: L1_T2
                                    Accept-Ranges: bytes
                                    2025-03-15 08:08:29 UTC2781INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 32 30 31 22 20 56 3d 22 31 39 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 53 79 73 74 65 6d 2e 53 79 73 74 65 6d 48 65 61 6c 74 68 55 73 61 67 65 2e 43 6c 69 63 6b 53 74 72 65 61 6d 22 20 41 54 54 3d 22 63 64 38 33 36 36 32 36 36 31 31 63 34 63 61 61 61 38 66 63 35 62 32 65 37 32 38 65 65 38 31 64 2d 33 62 36 64 36 63 34 35 2d 36 33 37 37 2d 34 62 66 35 2d 39 37 39 32 2d 64 62 66 38 65 31 38 38 31 30 38 38 2d 37 35 32 31 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 55 73 61 67 65 22 20 44 43 61 3d 22 50 53 55 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20
                                    Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120201" V="19" DC="SM" EN="Office.System.SystemHealthUsage.ClickStream" ATT="cd836626611c4caaa8fc5b2e728ee81d-3b6d6c45-6377-4bf5-9792-dbf8e1881088-7521" SP="CriticalUsage" DCa="PSU" xmlns=""> <RIS>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    1192.168.2.265745813.107.253.724437800C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                    TimestampBytes transferredDirectionData
                                    2025-03-15 08:08:29 UTC214OUTGET /rules/rule170146v0s19.xml HTTP/1.1
                                    Connection: Keep-Alive
                                    Accept-Encoding: gzip
                                    User-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.18129; Pro)
                                    Host: otelrules.svc.static.microsoft
                                    2025-03-15 08:08:29 UTC498INHTTP/1.1 200 OK
                                    Date: Sat, 15 Mar 2025 08:08:29 GMT
                                    Content-Type: text/xml
                                    Content-Length: 461
                                    Connection: close
                                    Cache-Control: public, max-age=604800, immutable
                                    Last-Modified: Thu, 14 Nov 2024 16:14:57 GMT
                                    ETag: "0x8DD04C77BDE7614"
                                    x-ms-request-id: a37c6e3d-601e-0001-546c-95faeb000000
                                    x-ms-version: 2018-03-28
                                    x-azure-ref: 20250315T080829Z-r1bcb8df696jdqn9hC1MNZcw3g0000000850000000007kb1
                                    x-fd-int-roxy-purgeid: 0
                                    X-Cache-Info: L2_T2
                                    X-Cache: TCP_REMOTE_HIT
                                    Accept-Ranges: bytes
                                    2025-03-15 08:08:29 UTC461INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 37 30 31 34 36 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 47 72 61 70 68 69 63 73 2e 45 78 70 6f 72 74 42 75 6c 6c 65 74 42 6c 69 70 43 45 78 63 65 70 74 69 6f 6e 22 20 41 54 54 3d 22 63 66 63 66 64 62 39 31 63 36 38 63 34 33 32 39 62 62 38 62 37 63 62 37 62 61 62 62 33 63 66 37 2d 65 30 38 32 63 32 66 32 2d 65 66 31 64 2d 34 32 37 61 2d 61 63 34 64 2d 62 30 62 37 30 30 61 66 65 37 61 37 2d 37 36 35 35 22 20 44 43 61 3d 22 50 53 55 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 54 53 20 54 3d 22 31 22 20 49 64 3d 22 34 38 39 66 34 22 20
                                    Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="170146" V="0" DC="SM" EN="Office.Graphics.ExportBulletBlipCException" ATT="cfcfdb91c68c4329bb8b7cb7babb3cf7-e082c2f2-ef1d-427a-ac4d-b0b700afe7a7-7655" DCa="PSU" xmlns=""> <S> <UTS T="1" Id="489f4"


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:04:07:19
                                    Start date:15/03/2025
                                    Path:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
                                    Imagebase:0x7ff7cb870000
                                    File size:70'082'712 bytes
                                    MD5 hash:F9F7B6C42211B06E7AC3E4B60AA8FB77
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate
                                    Has exited:false

                                    Target ID:11
                                    Start time:04:08:23
                                    Start date:15/03/2025
                                    Path:C:\Windows\splwow64.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\splwow64.exe 12288
                                    Imagebase:0x7ff668600000
                                    File size:192'512 bytes
                                    MD5 hash:AF4A7EBF6114EE9E6FBCC910EC3C96E6
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate
                                    Has exited:false

                                    No disassembly