Windows
Analysis Report
EXTERNAL #U00c3rtztliche Bescheinigung .msg
Overview
General Information
Sample name: | EXTERNAL #U00c3rtztliche Bescheinigung .msgrenamed because original name is a hash value |
Original sample name: | EXTERNAL rtztliche Bescheinigung .msg |
Analysis ID: | 1711313 |
Has dependencies: | false |
MD5: | b15418abbfe269139e3a692642e623ab |
SHA1: | d8f88f3a22497e9d2fffb87676cb5aeba80034bc |
SHA256: | 340abc8d5febd8860161b8983fbdc0b703e18b0806f13f421bb46cf3ec552a66 |
Infos: | |
Detection
Score: | 1 |
Range: | 0 - 100 |
Confidence: | 80% |
Signatures
Classification
- System is w10x64
OUTLOOK.EXE (PID: 2344 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \Root\Offi ce16\OUTLO OK.EXE" /f "C:\Users \user\Desk top\EXTERN AL #U00c3r tztliche B escheinigu ng .msg" MD5: 91A5292942864110ED734005B7E005C0) ai.exe (PID: 7992 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \root\vfs\ ProgramFil esCommonX6 4\Microsof t Shared\O ffice16\ai .exe" "926 CE856-E1C1 -47B1-9E98 -3551C85BA B64" "DE22 8304-50B1- 460F-9BEE- BF6DD87C78 F9" "2344" "C:\Progr am Files ( x86)\Micro soft Offic e\Root\Off ice16\OUTL OOK.EXE" " WordCombin edFloatieL reOnline.o nnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD)
- cleanup
# Email Security Analysis
## 1. Initial Analysis of Email Structure
**Sender Information:**
- Display name: Marc Nattermann
- Email address: marc1993nattermann@hotmail.de
- Domain: hotmail.de (Microsoft consumer email service)
**Recipient Information:**
- Email address: sschneider@moog.com
- Domain: moog.com (corporate domain)
**Subject Line:**
- "[EXTERNAL] rtztliche Bescheinigung" (appears to be "rztliche Bescheinigung" - medical certificate in German)
**Email Structure:**
- Simple HTML formatting
- Contains an image attachment
- Message is in German
## 2. Content Analysis
**Message Content:**
- German text: "Vielen Dank, Schnen Urlaub LG Marc Nattermann"
- Translation: "Thank you, nice holiday. Best regards, Marc Nattermann"
The content is extremely brief with no business context or explanation about the "medical certificate" mentioned in the subject line. The brevity and lack of context is unusual for a business communication involving medical documentation.
## 3. Attachment and QR Code Analysis
**Attachment Details:**
- Filename: 20250606_102141.jpg
- Type: JPG image
- Size: Email package is 2.5MB
**Image Content (from description):**
- A blank white background with text "Vielen Dank, Schnen Urlaub LG Marc Nattermann"
- No QR codes, logos, or other elements
- The image only contains the same text as the email body
- No actual medical certificate content despite the subject line
## 4. Key Suspicious Indicators
1. **Subject-content mismatch**: Subject mentions a medical certificate, but neither the email body nor the attachment contains one
2. **Attachment anomaly**: Medical certificates are typically PDF or document files, not JPG images
3. **Lack of context**: No explanation for why this "medical certificate" is being sent
4. **Content duplication**: The image simply contains the same text as the email body
5. **Subject line encoding/spelling issue**: "rtztliche" instead of "rztliche"
## 5. Attack Type Analysis (MITRE ATT&CK)
If malicious, this could align with:
- **Initial Access (TA0001)** via **Phishing: Spearphishing Attachment (T1566.001)**
- Potential for **User Execution (T1204)** if the attachment contains hidden malicious code
## 6. False Positive Analysis
Possible legitimate explanations:
- Could be a thank-you note after receiving medical leave approval
- The sender might have attached the wrong image
- The "medical certificate" might be referenced in previous communications
- The image could be a screenshot of a medical certificate, though the description doesn't support this
- Encoding issues might explain some formatting anomalies
## 7. Overall Assessment
**Sender display name and domain:** Marc Nattermann using a personal Hotmail account
**Previous communication history:** None provided
**Subject line:** "[EXTERNAL] rtztliche Bescheinigung" (Medical Certificate)
**HTML/text content:** Brief thank you message in German
**Attachment metadata:** JPG image (20250606_102141.jpg)
**Image content:** Simple text message matching email body
This email exhibits several suspicious characteristics that warrant caution. The primary concern is the disconnect between the subject line claiming to contain a medical certificate and the actual content, which is just a thank you message. The attachment being a JPG file rather than a document format typical for medical certificates adds to the suspicion.
## 8. IOCs (Indicator of Compromise)
- Sender email: marc1993nattermann@hotmail.de
- Subject: "[EXTERNAL] rtztliche Bescheinigung"
- Attachment: 20250606_102141.jpg
## Conclusion
**Verdict:** Suspicious
**Risk Score:** 5/10
**TTPs Identified:**
- Potential phishing through misleading attachment
- Social usering using medical documentation as a lure
**Reasoning Summary:**
The email claims to contain a medical certificate but instead contains a simple image with text. This mismatch between claimed content and actual content is concerning. However, without evidence of malicious code in the attachment or clear phishing attempts such as credential harvesting links, we cannot conclusively determine malicious intent. The communication could potentially be legitimate but unusual or poorly executed.
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Window found: | Jump to behavior |
Source: | Window detected: |
Source: | Key opened: | Jump to behavior |
Source: | Static file information: |
Source: | Key value created or modified: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 1 Process Injection | 1 Masquerading | OS Credential Dumping | 1 Process Discovery | Remote Services | Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Modify Registry | LSASS Memory | 12 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Process Injection | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 DLL Side-Loading | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
s-0005.dual-s-msedge.net | 52.123.129.14 | true | false | high |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1711313 |
Start date and time: | 2025-06-10 19:19:00 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 45s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 9 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | EXTERNAL #U00c3rtztliche Bescheinigung .msgrenamed because original name is a hash value |
Original Sample Name: | EXTERNAL rtztliche Bescheinigung .msg |
Detection: | CLEAN |
Classification: | clean1.winMSG@3/4@0/0 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 52.109.6.53, 40.79.189.58, 52.123.129.14
- Excluded domains from analysis (whitelisted): ecs.office.com, slscr.update.microsoft.com, prod.configsvc1.live.com.akadns.net, mobile.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, dual-s-0005-office.config.skype.com, config.officeapps.live.com, us.configsvc1.live.com.akadns.net, eus2-azsc-config.officeapps.live.com, officeclient.microsoft.com, ecs.office.trafficmanager.net, onedscolprdjpe02.japaneast.cloudapp.azure.com, mobile.events.data.trafficmanager.net
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtQueryAttributesFile calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
s-0005.dual-s-msedge.net | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Tycoon2FA | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20250610T1320130536-2344.etl
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 98304 |
Entropy (8bit): | 4.4861289598968614 |
Encrypted: | false |
SSDEEP: | 1536:zp4Z2+MJ6Xh1/ZP0j3RQ5nuS/kB+0i4c6SCulJlP4azQza55/Nj/3SOIEwK9MLZ9:t4yK2LZ3NXks |
MD5: | CB7ADAF44D8EB97AA31C88C1F80EBFFD |
SHA1: | 78BA7226CB937B6B896A6BFEB10B0FB3F4D43100 |
SHA-256: | 44BCA767581F9F2AFAD57970C4666D87CDDA212ABCA45EFA4C67BF44A850A56F |
SHA-512: | 37E82B3B46B84A7F847E7C8961CEE9AB9A6F860388167C902F33ECB5738CAF4CF302959443458DF3CC95A19B5306BB8E7302C5BCECA755F1B7C75773A5611168 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 163840 |
Entropy (8bit): | 0.4780595670965211 |
Encrypted: | false |
SSDEEP: | 192:yVomByu58k9eUNgwsAxF6HF4jvF1q4OIqNMNgiXHWQOoqAbAFAqwNh/:qoG58k32wxxMHG51q4OI6iXHOoqMu |
MD5: | 2A98569814BCE5BAD18720C05BF20D6E |
SHA1: | AA77A7BC3248EC85EBC87FCD5D2AA0CD0C1637A0 |
SHA-256: | D510A0C9FD55E928AEA0E7A6C1F9D5EF9A6BB6EB64F8C8AD056A7A250AB80EFE |
SHA-512: | F5E5F86D5E36437EE887186B250EC0F6E95F8CBBA15D0F79119D5151CFE8325E7E37BF6119C75084EA0DE737D613F607CA718FE0C7903F4CEE64789617995947 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 271360 |
Entropy (8bit): | 1.3121868650835704 |
Encrypted: | false |
SSDEEP: | 768:pQQcIKTz9avpBH25ZM5JQDRY9h/L4OGgMbniiBfB8BUTIZ:bU9bSqlY9hvMOgfBeNZ |
MD5: | 454C9DF6F4DA52A88D02FF7DF029CF0A |
SHA1: | BB0A3347162C054DB82E4573973E303E34743E4F |
SHA-256: | 54287096AEF7973348B1F50850D187E1D3F7E613BA94910F9303D89E328FD2F7 |
SHA-512: | 1203FF6D42956759EE76ABAB72A6F6E9481C0DB55A13D8E910DF313FBDA299839D300AB99374CE4263C2AFADACB3FD47CE7B7854BE2C4F93EEA5A1D14CD82696 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 131072 |
Entropy (8bit): | 1.0111811767479657 |
Encrypted: | false |
SSDEEP: | 384:C8k3XjTIXJYsDew+jqHtydTDLnJ7g5nuFZHsWvtlYJFKFcYpRrYnvbCXsH2tSWvi:mTIZp2iE/G6i9K |
MD5: | 4E31CE9CDE27F1B1884385CD478BF24D |
SHA1: | 11A526F51350AF33CCFD6EB4F8876EC1ECCD5E68 |
SHA-256: | 5B13EA835EA88995726915F8FB1596444360CCAE99C019CE9D1E97C4101FB924 |
SHA-512: | FF89CB1AB8557CBBFA55A9F917EB36349BFC5C75B90A3548198DD22E482F89828DA79C77355F3BA686E74CEF9529FC45C61CAC7C0680DD63685FC633D32C8A81 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.81060518065 |
TrID: |
|
File name: | EXTERNAL #U00c3rtztliche Bescheinigung .msg |
File size: | 2'636'288 bytes |
MD5: | b15418abbfe269139e3a692642e623ab |
SHA1: | d8f88f3a22497e9d2fffb87676cb5aeba80034bc |
SHA256: | 340abc8d5febd8860161b8983fbdc0b703e18b0806f13f421bb46cf3ec552a66 |
SHA512: | bd5a0d96dd94549cb07e09b56776edb72ddd0ccdf2435facfc6133874ba11518a645ecdb114ecd5aed5fe7238d4887e3028e118d4e083d351533e64497a2be50 |
SSDEEP: | 49152:RMiJZHfZwtIgq9jzKkoLW8igt0tVWKOKuRN62xr9Xm1dJj4z/NeIL:2eRfOtKj+kh8igt0yBv62FlmtcRe |
TLSH: | 14C52321B9D24B06F27A8F3185E394EB9032AE457E14DD4B2155331F25B39B0EDA1B3E |
File Content Preview: | ........................>...................).................................................................................................................................................................................................................. |
File Name: | EXTERNAL #U00c3rtztliche Bescheinigung .msg | ||||||||||||
Subject: | [EXTERNAL] rtztliche Bescheinigung | ||||||||||||
From: | Marc Nattermann <marc1993nattermann@hotmail.de> | ||||||||||||
To: | "sschneider@moog.com" <sschneider@moog.com> | ||||||||||||
Cc: | |||||||||||||
BCC: | |||||||||||||
Date: | Fri, 06 Jun 2025 10:35:16 +0200 | ||||||||||||
Communications: |
| ||||||||||||
Attachments: |
|
Key | Value |
---|---|
Received | from PRAP251MB0513.EURP251.PROD.OUTLOOK.COM |
15.2.1748.10 via Mailbox Transport; Fri, 6 Jun 2025 04 | 37:52 -0400 |
15.2.1748.10; Fri, 6 Jun 2025 04 | 37:50 -0400 |
15.2.1748.10 via Frontend Transport; Fri, 6 Jun 2025 04 | 37:50 -0400 |
for <sschneider@moog.com>; Fri, 6 Jun 2025 04 | 37:48 -0400 |
Authentication-Results | moog.com; |
for <sschneider@moog.com>; Fri, 06 Jun 2025 04 | 35:25 -0400 (EDT) |
ARC-Seal | i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; |
ARC-Message-Signature | i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; |
h=From | Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; |
ARC-Authentication-Results | i=1; mx.microsoft.com 1; spf=none; dmarc=none; |
DKIM-Signature | v=1; a=rsa-sha256; c=relaxed/relaxed; d=HOTMAIL.DE; |
by DB9P251MB0308.EURP251.PROD.OUTLOOK.COM (2603 | 10a6:10:2ca::5) with |
2025 08 | 35:16 +0000 |
([fe80 | :1639:6098:e43f:b31d%4]) with mapi id 15.20.8813.020; Fri, 6 Jun 2025 |
08 | 35:16 +0000 |
From | Marc Nattermann <marc1993nattermann@hotmail.de> |
To | "sschneider@moog.com" <sschneider@moog.com> |
Thread-Topic | =?iso-8859-1?Q?=C3rtztliche_Bescheinigung_?= |
Thread-Index | AQHb1r3DFP/CaYnyQkiJvw8QdmrMdQ== |
Date | Fri, 6 Jun 2025 08:35:16 +0000 |
Message-ID | <PRAP251MB051372E21E7707EEA341CC7BA46EA@PRAP251MB0513.EURP251.PROD.OUTLOOK.COM> |
Accept-Language | de-DE, en-US |
Content-Language | de-DE |
X-MS-Has-Attach | yes |
X-MS-TNEF-Correlator | x-ms-reactions: allow |
x-ms-exchange-messagesentrepresentingtype | 1 |
x-ms-publictraffictype | |
x-ms-traffictypediagnostic | PRAP251MB0513:EE_|DB9P251MB0308:EE_ |
x-ms-office365-filtering-correlation-id | 0b69161f-d3a0-43ec-9fba-08dda4d51034 |
x-ms-exchange-slblob-mailprops | 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 |
x-microsoft-antispam | BCL:0;ARA:14566002|14030799003|461199028|6092099012|19110799006|15080799009|7092599006|8060799009|8062599006|3412199025|13095399003|440099028|102099032; |
x-microsoft-antispam-message-info | =?iso-8859-1?Q?1soPJzxitg/U7VWuu5rhbqA6v3BADIUAmCjzIvjlVgWLdYWbcJ/fBwF55c?= |
x-ms-exchange-antispam-messagedata-chunkcount | 1 |
x-ms-exchange-antispam-messagedata-0 | =?iso-8859-1?Q?akfSNfDhBg6fP2R6CPJmI/hXPs8D2xMFn+F0a7YDRyJo++g8HZJ0/2RgD/?= |
Content-Type | multipart/mixed; |
MIME-Version | 1.0 |
X-MS-Exchange-CrossTenant-AuthAs | Internal |
X-MS-Exchange-CrossTenant-AuthSource | PRAP251MB0513.EURP251.PROD.OUTLOOK.COM |
X-MS-Exchange-CrossTenant-RMS-PersistedConsumerOrg | 00000000-0000-0000-0000-000000000000 |
X-MS-Exchange-CrossTenant-Network-Message-Id | 0b69161f-d3a0-43ec-9fba-08dda4d51034 |
X-MS-Exchange-CrossTenant-originalarrivaltime | 06 Jun 2025 08:35:16.2788 |
X-MS-Exchange-CrossTenant-fromentityheader | Hosted |
X-MS-Exchange-CrossTenant-id | 84df9e7f-e9f6-40af-b435-aaaaaaaaaaaa |
X-MS-Exchange-CrossTenant-rms-persistedconsumerorg | 00000000-0000-0000-0000-000000000000 |
X-MS-Exchange-Transport-CrossTenantHeadersStamped | DB9P251MB0308 |
X-Authority-Analysis | v=2.4 cv=CNcqXQrD c=1 sm=1 tr=0 ts=6842a8dd cx=c_pps a=D2OqjJP3l1TtdM8aNOhWxg==:117 a=xqWC_Br6kY4A:10 a=6IFa9wvqVegA:10 a=Mrz3sjv-sVQA:10 a=x7bEGLp0ZPQA:10 a=Hc63M5QuceoA:10 a=vhvNClfDl-sA:10 a=36iWEnDGfxAgJZrWHE4A:9 a=wPNLvfGTeEIA:10 |
a=WKic2-FRKu6qs4FGrkUA | 9 a=_W_S_7VecoQA:10 a=9ldi6u3FIqauiwRbRAQA:9 a=KQqxNPgzF0kA:10 a=VEiTNn8F7TgA:10 a=kF0tzIniFmvx25JUiXD1:22 |
X-Proofpoint-ORIG-GUID | Pr5TRm3a9IMgr3aE5RF0JgdI25p1hU0Q |
X-CLX-Shades | MLX |
X-CLX-Response | 1TFkXGBoRCkx6Fx0aEQpZRBdmZEJiGxp8QW8TRhEKWFgXZXxoG0sbTVh7ZXM RCnhOF3p6bEtrAVpGYGlFEQp5TBdnQhhnUk54TBlzfREKQ0gXBxsZHBEKQ1kXBxsfGBEKQ0kXGg QaGhoRCllNF2dmchEKX1kXGB4eEQpfTRdnZnIRCllJFwcTcRsGBxsddwYYGhoGEhxCGwYaBhsdB |
X-Proofpoint-GUID | mZOtG1HpztwmInIURT0pPIf7Jalqwdrv |
X-Proofpoint-Spam-Details-Enc | AW1haW4tMjUwNjA2MDA3OSBTYWx0ZWRfX3EGqDPOUqK0e b37GV/BuhO9Ifirm4KZ9jrh/QwTqCOpaIabA8hsel75rgknLTvgnJaG6E9hTZuxrKoxy+vbBXHT eqHwvfdYQgBBiA5v+hL2jRHB0Ax99UKQlyOIrSDzQLVcY+vz/45E69XzKKhuoBu8H9yKWZzT/X4 |
Subject | =?UTF-8?Q?[EXTERNAL]_=C3=83rtztliche_Bescheinigung_?= |
X-Moog-Type | Onprem |
X-Proofpoint-SPF-Result | pass |
X-Proofpoint-SPF-Record | v=spf1 include:spf2.outlook.com ~all |
X-Proofpoint-Virus-Version | vendor=baseguard |
engine=ICAP | 2.0.293,Aquarius:18.0.1099,Hydra:6.0.736,FMLib:17.12.80.40 |
X-Proofpoint-Spam-Details | rule=inbound_spam_notspam policy=inbound_spam score=0 bulkscore=0 |
Return-Path | marc1993nattermann@hotmail.de |
X-MS-Exchange-Organization-Network-Message-Id | b26a0879-8cf1-4dab-1b3c-08dda4d56c56 |
X-MS-Exchange-Organization-AuthSource | USEA1SVEXCH04.corp.mooginc.com |
X-MS-Exchange-Organization-AuthAs | Anonymous |
X-MS-Exchange-Transport-EndToEndLatency | 00:00:01.8310708 |
date | Fri, 06 Jun 2025 10:35:16 +0200 |
Icon Hash: | c4e1928eacb280a2 |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jun 10, 2025 19:20:18.813963890 CEST | 1.1.1.1 | 192.168.2.6 | 0x5c3d | No error (0) | s-0005.dual-s-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jun 10, 2025 19:20:18.813963890 CEST | 1.1.1.1 | 192.168.2.6 | 0x5c3d | No error (0) | 52.123.129.14 | A (IP address) | IN (0x0001) | false | ||
Jun 10, 2025 19:20:18.813963890 CEST | 1.1.1.1 | 192.168.2.6 | 0x5c3d | No error (0) | 52.123.128.14 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 1 |
Start time: | 13:20:10 |
Start date: | 10/06/2025 |
Path: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x4e0000 |
File size: | 34'446'744 bytes |
MD5 hash: | 91A5292942864110ED734005B7E005C0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 4 |
Start time: | 13:20:17 |
Start date: | 10/06/2025 |
Path: | C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff633480000 |
File size: | 710'048 bytes |
MD5 hash: | EC652BEDD90E089D9406AFED89A8A8BD |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |