Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
EXTERNAL #U00c3rtztliche Bescheinigung .msg

Overview

General Information

Sample name:EXTERNAL #U00c3rtztliche Bescheinigung .msg
renamed because original name is a hash value
Original sample name:EXTERNAL rtztliche Bescheinigung .msg
Analysis ID:1711313
Has dependencies:false
MD5:b15418abbfe269139e3a692642e623ab
SHA1:d8f88f3a22497e9d2fffb87676cb5aeba80034bc
SHA256:340abc8d5febd8860161b8983fbdc0b703e18b0806f13f421bb46cf3ec552a66
Infos:

Detection

Score:1
Range:0 - 100
Confidence:80%

Signatures

Queries the volume information (name, serial number etc) of a device
Stores large binary data to the registry

Classification

  • System is w10x64
  • OUTLOOK.EXE (PID: 2344 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /f "C:\Users\user\Desktop\EXTERNAL #U00c3rtztliche Bescheinigung .msg" MD5: 91A5292942864110ED734005B7E005C0)
    • ai.exe (PID: 7992 cmdline: "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "926CE856-E1C1-47B1-9E98-3551C85BAB64" "DE228304-50B1-460F-9BEE-BF6DD87C78F9" "2344" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD)
  • cleanup
# Email Security Analysis

## 1. Initial Analysis of Email Structure

**Sender Information:**
- Display name: Marc Nattermann
- Email address: marc1993nattermann@hotmail.de
- Domain: hotmail.de (Microsoft consumer email service)

**Recipient Information:**
- Email address: sschneider@moog.com 
- Domain: moog.com (corporate domain)

**Subject Line:**
- "[EXTERNAL] rtztliche Bescheinigung" (appears to be "rztliche Bescheinigung" - medical certificate in German)

**Email Structure:**
- Simple HTML formatting
- Contains an image attachment
- Message is in German

## 2. Content Analysis

**Message Content:**
- German text: "Vielen Dank, Schnen Urlaub LG Marc Nattermann"
- Translation: "Thank you, nice holiday. Best regards, Marc Nattermann"

The content is extremely brief with no business context or explanation about the "medical certificate" mentioned in the subject line. The brevity and lack of context is unusual for a business communication involving medical documentation.

## 3. Attachment and QR Code Analysis

**Attachment Details:**
- Filename: 20250606_102141.jpg
- Type: JPG image
- Size: Email package is 2.5MB

**Image Content (from description):**
- A blank white background with text "Vielen Dank, Schnen Urlaub LG Marc Nattermann"
- No QR codes, logos, or other elements
- The image only contains the same text as the email body
- No actual medical certificate content despite the subject line

## 4. Key Suspicious Indicators

1. **Subject-content mismatch**: Subject mentions a medical certificate, but neither the email body nor the attachment contains one
2. **Attachment anomaly**: Medical certificates are typically PDF or document files, not JPG images
3. **Lack of context**: No explanation for why this "medical certificate" is being sent
4. **Content duplication**: The image simply contains the same text as the email body
5. **Subject line encoding/spelling issue**: "rtztliche" instead of "rztliche"

## 5. Attack Type Analysis (MITRE ATT&CK)

If malicious, this could align with:
- **Initial Access (TA0001)** via **Phishing: Spearphishing Attachment (T1566.001)**
- Potential for **User Execution (T1204)** if the attachment contains hidden malicious code

## 6. False Positive Analysis

Possible legitimate explanations:
- Could be a thank-you note after receiving medical leave approval
- The sender might have attached the wrong image
- The "medical certificate" might be referenced in previous communications
- The image could be a screenshot of a medical certificate, though the description doesn't support this
- Encoding issues might explain some formatting anomalies

## 7. Overall Assessment

**Sender display name and domain:** Marc Nattermann using a personal Hotmail account
**Previous communication history:** None provided
**Subject line:** "[EXTERNAL] rtztliche Bescheinigung" (Medical Certificate)
**HTML/text content:** Brief thank you message in German
**Attachment metadata:** JPG image (20250606_102141.jpg)
**Image content:** Simple text message matching email body

This email exhibits several suspicious characteristics that warrant caution. The primary concern is the disconnect between the subject line claiming to contain a medical certificate and the actual content, which is just a thank you message. The attachment being a JPG file rather than a document format typical for medical certificates adds to the suspicion.

## 8. IOCs (Indicator of Compromise)

- Sender email: marc1993nattermann@hotmail.de
- Subject: "[EXTERNAL] rtztliche Bescheinigung"
- Attachment: 20250606_102141.jpg

## Conclusion

**Verdict:** Suspicious

**Risk Score:** 5/10

**TTPs Identified:**
- Potential phishing through misleading attachment
- Social usering using medical documentation as a lure

**Reasoning Summary:**
The email claims to contain a medical certificate but instead contains a simple image with text. This mismatch between claimed content and actual content is concerning. However, without evidence of malicious code in the attachment or clear phishing attempts such as credential harvesting links, we cannot conclusively determine malicious intent. The communication could potentially be legitimate but unusual or poorly executed.

No configs have been found
No yara matches
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 2344, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Addins\OneNote.OutlookAddin\1
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: classification engineClassification label: clean1.winMSG@3/4@0/0
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\Documents\Outlook Files\~Outlook Data File - NoEmail.pst.tmpJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20250610T1320130536-2344.etlJump to behavior
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /f "C:\Users\user\Desktop\EXTERNAL #U00c3rtztliche Bescheinigung .msg"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "926CE856-E1C1-47B1-9E98-3551C85BAB64" "DE228304-50B1-460F-9BEE-BF6DD87C78F9" "2344" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "926CE856-E1C1-47B1-9E98-3551C85BAB64" "DE228304-50B1-460F-9BEE-BF6DD87C78F9" "2344" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: c2r64.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: userenv.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{F959DBBB-3867-41F2-8E5F-3B8BEFAA81B3}\InprocServer32Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEWindow found: window name: SysTabControl32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\CommonJump to behavior
Source: EXTERNAL #U00c3rtztliche Bescheinigung .msgStatic file information: File size 2636288 > 1048576
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{2B379600-B42B-4FE9-A59C-A312FB934935} DeviceTicketJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information queried: ProcessInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeQueries volume information: C:\Program Files (x86)\Microsoft Office\root\Office16\AI\WordCombinedFloatieLreOnline.onnx VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
Process Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Modify Registry
LSASS Memory12
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1711313 Sample: EXTERNAL #U00c3rtztliche Be... Startdate: 10/06/2025 Architecture: WINDOWS Score: 1 5 OUTLOOK.EXE 51 80 2->5         started        process3 7 ai.exe 5->7         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
s-0005.dual-s-msedge.net
52.123.129.14
truefalse
    high
    No contacted IP infos
    Joe Sandbox version:42.0.0 Malachite
    Analysis ID:1711313
    Start date and time:2025-06-10 19:19:00 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 45s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:9
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:EXTERNAL #U00c3rtztliche Bescheinigung .msg
    renamed because original name is a hash value
    Original Sample Name:EXTERNAL rtztliche Bescheinigung .msg
    Detection:CLEAN
    Classification:clean1.winMSG@3/4@0/0
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .msg
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 52.109.6.53, 40.79.189.58, 52.123.129.14
    • Excluded domains from analysis (whitelisted): ecs.office.com, slscr.update.microsoft.com, prod.configsvc1.live.com.akadns.net, mobile.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, dual-s-0005-office.config.skype.com, config.officeapps.live.com, us.configsvc1.live.com.akadns.net, eus2-azsc-config.officeapps.live.com, officeclient.microsoft.com, ecs.office.trafficmanager.net, onedscolprdjpe02.japaneast.cloudapp.azure.com, mobile.events.data.trafficmanager.net
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtQueryAttributesFile calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    No simulations
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    s-0005.dual-s-msedge.net458 -(1).emlGet hashmaliciousUnknownBrowse
    • 52.123.128.14
    Message.emlGet hashmaliciousTycoon2FABrowse
    • 52.123.128.14
    MailScavator-Setup.zipGet hashmaliciousUnknownBrowse
    • 52.123.128.14
    https://onedrive.live.com/:w:/g/personal/3BE955C473DE0CAE/EdUc5nvDsLlNsAPAEKIZ7vMBdpLccgpo4c2GcOQxNQ-I4wGet hashmaliciousHTMLPhisherBrowse
    • 52.123.129.14
    https://onedrive.live.com/:w:/g/personal/3BE955C473DE0CAE/EdUc5nvDsLlNsAPAEKIZ7vMBdpLccgpo4c2GcOQxNQ-I4wGet hashmaliciousHTMLPhisherBrowse
    • 52.123.128.14
    https://onedrive.live.com/:w:/g/personal/3BE955C473DE0CAE/EdUc5nvDsLlNsAPAEKIZ7vMBdpLccgpo4c2GcOQxNQ-I4wGet hashmaliciousHTMLPhisherBrowse
    • 52.123.128.14
    Ordine cliente ORC-712.xlsGet hashmaliciousUnknownBrowse
    • 52.123.129.14
    Ordine cliente ORC-712.xlsGet hashmaliciousUnknownBrowse
    • 52.123.128.14
    tiretime.docGet hashmaliciousUnknownBrowse
    • 52.123.129.14
    Ordine cliente ORC-712.xlsGet hashmaliciousUnknownBrowse
    • 52.123.129.14
    No context
    No context
    No context
    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
    File Type:data
    Category:dropped
    Size (bytes):98304
    Entropy (8bit):4.4861289598968614
    Encrypted:false
    SSDEEP:1536:zp4Z2+MJ6Xh1/ZP0j3RQ5nuS/kB+0i4c6SCulJlP4azQza55/Nj/3SOIEwK9MLZ9:t4yK2LZ3NXks
    MD5:CB7ADAF44D8EB97AA31C88C1F80EBFFD
    SHA1:78BA7226CB937B6B896A6BFEB10B0FB3F4D43100
    SHA-256:44BCA767581F9F2AFAD57970C4666D87CDDA212ABCA45EFA4C67BF44A850A56F
    SHA-512:37E82B3B46B84A7F847E7C8961CEE9AB9A6F860388167C902F33ECB5738CAF4CF302959443458DF3CC95A19B5306BB8E7302C5BCECA755F1B7C75773A5611168
    Malicious:false
    Reputation:low
    Preview:............................................................................f...(...(...8-0.+...................eJ..............Zb..2...................................,...@.t.z.r.e.s...d.l.l.,.-.1.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.1.1.1...............................................................U...........8-0.+...........v.2._.O.U.T.L.O.O.K.:.9.2.8.:.9.c.3.2.7.5.6.5.9.4.9.d.4.4.9.1.8.6.5.c.1.a.d.0.c.7.7.1.2.b.7.8...C.:.\.U.s.e.r.s.\.e.n.g.i.n.e.e.r.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.O.u.t.l.o.o.k. .L.o.g.g.i.n.g.\.O.U.T.L.O.O.K._.1.6._.0._.1.6.8.2.7._.2.0.1.3.0.-.2.0.2.5.0.6.1.0.T.1.3.2.0.1.3.0.5.3.6.-.2.3.4.4...e.t.l.........P.P.(...(.....2.+...................................................................................................................................................................................................................................................................................................
    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
    File Type:data
    Category:dropped
    Size (bytes):163840
    Entropy (8bit):0.4780595670965211
    Encrypted:false
    SSDEEP:192:yVomByu58k9eUNgwsAxF6HF4jvF1q4OIqNMNgiXHWQOoqAbAFAqwNh/:qoG58k32wxxMHG51q4OI6iXHOoqMu
    MD5:2A98569814BCE5BAD18720C05BF20D6E
    SHA1:AA77A7BC3248EC85EBC87FCD5D2AA0CD0C1637A0
    SHA-256:D510A0C9FD55E928AEA0E7A6C1F9D5EF9A6BB6EB64F8C8AD056A7A250AB80EFE
    SHA-512:F5E5F86D5E36437EE887186B250EC0F6E95F8CBBA15D0F79119D5151CFE8325E7E37BF6119C75084EA0DE737D613F607CA718FE0C7903F4CEE64789617995947
    Malicious:false
    Reputation:low
    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
    File Type:Microsoft Outlook email folder (>=2003)
    Category:dropped
    Size (bytes):271360
    Entropy (8bit):1.3121868650835704
    Encrypted:false
    SSDEEP:768:pQQcIKTz9avpBH25ZM5JQDRY9h/L4OGgMbniiBfB8BUTIZ:bU9bSqlY9hvMOgfBeNZ
    MD5:454C9DF6F4DA52A88D02FF7DF029CF0A
    SHA1:BB0A3347162C054DB82E4573973E303E34743E4F
    SHA-256:54287096AEF7973348B1F50850D187E1D3F7E613BA94910F9303D89E328FD2F7
    SHA-512:1203FF6D42956759EE76ABAB72A6F6E9481C0DB55A13D8E910DF313FBDA299839D300AB99374CE4263C2AFADACB3FD47CE7B7854BE2C4F93EEA5A1D14CD82696
    Malicious:false
    Reputation:low
    Preview:!BDN...SM......\...a*..........>.......T................@...........@...@...................................@...........................................................................$.......D......@Q..............:...............=...................................................................................................................................................................................................................................................................................................!...Fa......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
    File Type:data
    Category:dropped
    Size (bytes):131072
    Entropy (8bit):1.0111811767479657
    Encrypted:false
    SSDEEP:384:C8k3XjTIXJYsDew+jqHtydTDLnJ7g5nuFZHsWvtlYJFKFcYpRrYnvbCXsH2tSWvi:mTIZp2iE/G6i9K
    MD5:4E31CE9CDE27F1B1884385CD478BF24D
    SHA1:11A526F51350AF33CCFD6EB4F8876EC1ECCD5E68
    SHA-256:5B13EA835EA88995726915F8FB1596444360CCAE99C019CE9D1E97C4101FB924
    SHA-512:FF89CB1AB8557CBBFA55A9F917EB36349BFC5C75B90A3548198DD22E482F89828DA79C77355F3BA686E74CEF9529FC45C61CAC7C0680DD63685FC633D32C8A81
    Malicious:false
    Reputation:low
    Preview:/..C...S.......(...:.>.+.....................#.!BDN...SM......\...a*..........>.......T................@...........@...@...................................@...........................................................................$.......D......@Q..............:...............=...................................................................................................................................................................................................................................................................................................!...Fa..:.>.+........B............#.........................................................................................................................................................................................................................................................................................................................................................................................................
    File type:CDFV2 Microsoft Outlook Message
    Entropy (8bit):7.81060518065
    TrID:
    • Outlook Message (71009/1) 58.92%
    • Outlook Form Template (41509/1) 34.44%
    • Generic OLE2 / Multistream Compound File (8008/1) 6.64%
    File name:EXTERNAL #U00c3rtztliche Bescheinigung .msg
    File size:2'636'288 bytes
    MD5:b15418abbfe269139e3a692642e623ab
    SHA1:d8f88f3a22497e9d2fffb87676cb5aeba80034bc
    SHA256:340abc8d5febd8860161b8983fbdc0b703e18b0806f13f421bb46cf3ec552a66
    SHA512:bd5a0d96dd94549cb07e09b56776edb72ddd0ccdf2435facfc6133874ba11518a645ecdb114ecd5aed5fe7238d4887e3028e118d4e083d351533e64497a2be50
    SSDEEP:49152:RMiJZHfZwtIgq9jzKkoLW8igt0tVWKOKuRN62xr9Xm1dJj4z/NeIL:2eRfOtKj+kh8igt0yBv62FlmtcRe
    TLSH:14C52321B9D24B06F27A8F3185E394EB9032AE457E14DD4B2155331F25B39B0EDA1B3E
    File Content Preview:........................>...................)..................................................................................................................................................................................................................
    File Name:EXTERNAL #U00c3rtztliche Bescheinigung .msg
    Subject:[EXTERNAL] rtztliche Bescheinigung
    From:Marc Nattermann <marc1993nattermann@hotmail.de>
    To:"sschneider@moog.com" <sschneider@moog.com>
    Cc:
    BCC:
    Date:Fri, 06 Jun 2025 10:35:16 +0200
    Communications:
    • Vielen Dank, Schnen Urlaub LG Marc Nattermann
    Attachments:
    Key Value
    Receivedfrom PRAP251MB0513.EURP251.PROD.OUTLOOK.COM
    15.2.1748.10 via Mailbox Transport; Fri, 6 Jun 2025 0437:52 -0400
    15.2.1748.10; Fri, 6 Jun 2025 0437:50 -0400
    15.2.1748.10 via Frontend Transport; Fri, 6 Jun 2025 0437:50 -0400
    for <sschneider@moog.com>; Fri, 6 Jun 2025 0437:48 -0400
    Authentication-Resultsmoog.com;
    for <sschneider@moog.com>; Fri, 06 Jun 2025 0435:25 -0400 (EDT)
    ARC-Seali=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;
    ARC-Message-Signaturei=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
    h=FromDate:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
    ARC-Authentication-Resultsi=1; mx.microsoft.com 1; spf=none; dmarc=none;
    DKIM-Signaturev=1; a=rsa-sha256; c=relaxed/relaxed; d=HOTMAIL.DE;
    by DB9P251MB0308.EURP251.PROD.OUTLOOK.COM (260310a6:10:2ca::5) with
    2025 0835:16 +0000
    ([fe80:1639:6098:e43f:b31d%4]) with mapi id 15.20.8813.020; Fri, 6 Jun 2025
    0835:16 +0000
    FromMarc Nattermann <marc1993nattermann@hotmail.de>
    To"sschneider@moog.com" <sschneider@moog.com>
    Thread-Topic=?iso-8859-1?Q?=C3rtztliche_Bescheinigung_?=
    Thread-IndexAQHb1r3DFP/CaYnyQkiJvw8QdmrMdQ==
    DateFri, 6 Jun 2025 08:35:16 +0000
    Message-ID<PRAP251MB051372E21E7707EEA341CC7BA46EA@PRAP251MB0513.EURP251.PROD.OUTLOOK.COM>
    Accept-Languagede-DE, en-US
    Content-Languagede-DE
    X-MS-Has-Attachyes
    X-MS-TNEF-Correlatorx-ms-reactions: allow
    x-ms-exchange-messagesentrepresentingtype1
    x-ms-publictraffictypeEmail
    x-ms-traffictypediagnosticPRAP251MB0513:EE_|DB9P251MB0308:EE_
    x-ms-office365-filtering-correlation-id0b69161f-d3a0-43ec-9fba-08dda4d51034
    x-ms-exchange-slblob-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
    x-microsoft-antispamBCL:0;ARA:14566002|14030799003|461199028|6092099012|19110799006|15080799009|7092599006|8060799009|8062599006|3412199025|13095399003|440099028|102099032;
    x-microsoft-antispam-message-info=?iso-8859-1?Q?1soPJzxitg/U7VWuu5rhbqA6v3BADIUAmCjzIvjlVgWLdYWbcJ/fBwF55c?=
    x-ms-exchange-antispam-messagedata-chunkcount1
    x-ms-exchange-antispam-messagedata-0=?iso-8859-1?Q?akfSNfDhBg6fP2R6CPJmI/hXPs8D2xMFn+F0a7YDRyJo++g8HZJ0/2RgD/?=
    Content-Typemultipart/mixed;
    MIME-Version1.0
    X-MS-Exchange-CrossTenant-AuthAsInternal
    X-MS-Exchange-CrossTenant-AuthSourcePRAP251MB0513.EURP251.PROD.OUTLOOK.COM
    X-MS-Exchange-CrossTenant-RMS-PersistedConsumerOrg00000000-0000-0000-0000-000000000000
    X-MS-Exchange-CrossTenant-Network-Message-Id0b69161f-d3a0-43ec-9fba-08dda4d51034
    X-MS-Exchange-CrossTenant-originalarrivaltime06 Jun 2025 08:35:16.2788
    X-MS-Exchange-CrossTenant-fromentityheaderHosted
    X-MS-Exchange-CrossTenant-id84df9e7f-e9f6-40af-b435-aaaaaaaaaaaa
    X-MS-Exchange-CrossTenant-rms-persistedconsumerorg00000000-0000-0000-0000-000000000000
    X-MS-Exchange-Transport-CrossTenantHeadersStampedDB9P251MB0308
    X-Authority-Analysisv=2.4 cv=CNcqXQrD c=1 sm=1 tr=0 ts=6842a8dd cx=c_pps a=D2OqjJP3l1TtdM8aNOhWxg==:117 a=xqWC_Br6kY4A:10 a=6IFa9wvqVegA:10 a=Mrz3sjv-sVQA:10 a=x7bEGLp0ZPQA:10 a=Hc63M5QuceoA:10 a=vhvNClfDl-sA:10 a=36iWEnDGfxAgJZrWHE4A:9 a=wPNLvfGTeEIA:10
    a=WKic2-FRKu6qs4FGrkUA9 a=_W_S_7VecoQA:10 a=9ldi6u3FIqauiwRbRAQA:9 a=KQqxNPgzF0kA:10 a=VEiTNn8F7TgA:10 a=kF0tzIniFmvx25JUiXD1:22
    X-Proofpoint-ORIG-GUIDPr5TRm3a9IMgr3aE5RF0JgdI25p1hU0Q
    X-CLX-ShadesMLX
    X-CLX-Response1TFkXGBoRCkx6Fx0aEQpZRBdmZEJiGxp8QW8TRhEKWFgXZXxoG0sbTVh7ZXM RCnhOF3p6bEtrAVpGYGlFEQp5TBdnQhhnUk54TBlzfREKQ0gXBxsZHBEKQ1kXBxsfGBEKQ0kXGg QaGhoRCllNF2dmchEKX1kXGB4eEQpfTRdnZnIRCllJFwcTcRsGBxsddwYYGhoGEhxCGwYaBhsdB
    X-Proofpoint-GUIDmZOtG1HpztwmInIURT0pPIf7Jalqwdrv
    X-Proofpoint-Spam-Details-EncAW1haW4tMjUwNjA2MDA3OSBTYWx0ZWRfX3EGqDPOUqK0e b37GV/BuhO9Ifirm4KZ9jrh/QwTqCOpaIabA8hsel75rgknLTvgnJaG6E9hTZuxrKoxy+vbBXHT eqHwvfdYQgBBiA5v+hL2jRHB0Ax99UKQlyOIrSDzQLVcY+vz/45E69XzKKhuoBu8H9yKWZzT/X4
    Subject=?UTF-8?Q?[EXTERNAL]_=C3=83rtztliche_Bescheinigung_?=
    X-Moog-TypeOnprem
    X-Proofpoint-SPF-Resultpass
    X-Proofpoint-SPF-Recordv=spf1 include:spf2.outlook.com ~all
    X-Proofpoint-Virus-Versionvendor=baseguard
    engine=ICAP2.0.293,Aquarius:18.0.1099,Hydra:6.0.736,FMLib:17.12.80.40
    X-Proofpoint-Spam-Detailsrule=inbound_spam_notspam policy=inbound_spam score=0 bulkscore=0
    Return-Pathmarc1993nattermann@hotmail.de
    X-MS-Exchange-Organization-Network-Message-Idb26a0879-8cf1-4dab-1b3c-08dda4d56c56
    X-MS-Exchange-Organization-AuthSourceUSEA1SVEXCH04.corp.mooginc.com
    X-MS-Exchange-Organization-AuthAsAnonymous
    X-MS-Exchange-Transport-EndToEndLatency00:00:01.8310708
    dateFri, 06 Jun 2025 10:35:16 +0200

    Icon Hash:c4e1928eacb280a2
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Jun 10, 2025 19:20:18.813963890 CEST1.1.1.1192.168.2.60x5c3dNo error (0)ecs-office.s-0005.dual-s-msedge.nets-0005.dual-s-msedge.netCNAME (Canonical name)IN (0x0001)false
    Jun 10, 2025 19:20:18.813963890 CEST1.1.1.1192.168.2.60x5c3dNo error (0)s-0005.dual-s-msedge.net52.123.129.14A (IP address)IN (0x0001)false
    Jun 10, 2025 19:20:18.813963890 CEST1.1.1.1192.168.2.60x5c3dNo error (0)s-0005.dual-s-msedge.net52.123.128.14A (IP address)IN (0x0001)false

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:1
    Start time:13:20:10
    Start date:10/06/2025
    Path:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
    Wow64 process (32bit):true
    Commandline:"C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /f "C:\Users\user\Desktop\EXTERNAL #U00c3rtztliche Bescheinigung .msg"
    Imagebase:0x4e0000
    File size:34'446'744 bytes
    MD5 hash:91A5292942864110ED734005B7E005C0
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    Target ID:4
    Start time:13:20:17
    Start date:10/06/2025
    Path:C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe
    Wow64 process (32bit):false
    Commandline:"C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "926CE856-E1C1-47B1-9E98-3551C85BAB64" "DE228304-50B1-460F-9BEE-BF6DD87C78F9" "2344" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
    Imagebase:0x7ff633480000
    File size:710'048 bytes
    MD5 hash:EC652BEDD90E089D9406AFED89A8A8BD
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    No disassembly