| File name: | исковое_19.03.docx |
| Full analysis: | https://app.any.run/tasks/b4ec4e57-ec4a-43e3-a03b-a45097b18ae2 |
| Verdict: | Malicious activity |
| Analysis date: | April 03, 2025, 08:54:28 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/octet-stream |
| File info: | Microsoft OOXML |
| MD5: | F9026FABFB8D131863AD06FD72EB2717 |
| SHA1: | FFA14E589D99A95D025B0AE5D7122319195622F7 |
| SHA256: | 4640C58E3C658D8178F4E9D9570566040AD162E25B61A46B0BE989AEB69DB679 |
| SSDEEP: | 1536:bAGziBOMJBmXHPCI6+/v3yh9PKJEgDvb/VT:bA5o8YPcYv3Omvrx |
| .docx | | | Word Microsoft Office Open XML Format document (52.2) |
|---|---|---|
| .zip | | | Open Packaging Conventions container (38.8) |
| .zip | | | ZIP compressed archive (8.8) |
| ZipRequiredVersion: | 20 |
|---|---|
| ZipBitFlag: | - |
| ZipCompression: | Deflated |
| ZipModifyDate: | 1980:01:01 00:00:00 |
| ZipCRC: | 0xb71a911e |
| ZipCompressedSize: | 234 |
| ZipUncompressedSize: | 590 |
| ZipFileName: | _rels/.rels |
| Template: | AdjacencyResume |
|---|---|
| TotalEditTime: | 1 minute |
| Pages: | 1 |
| Words: | 251 |
| Characters: | 1437 |
| Application: | Microsoft Office Word |
| DocSecurity: | None |
| Lines: | 11 |
| Paragraphs: | 3 |
| ScaleCrop: | No |
| Company: | - |
| LinksUpToDate: | No |
| CharactersWithSpaces: | 1685 |
| SharedDoc: | No |
| HyperlinksChanged: | No |
| AppVersion: | 16 |
| LastModifiedBy: | Solo |
| RevisionNumber: | 1 |
| CreateDate: | 2025:03:19 07:29:00Z |
| ModifyDate: | 2025:03:19 07:30:00Z |
| Creator: | Solo |
|---|
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1056 | C:\WINDOWS\system32\SppExtComObj.exe -Embedding | C:\Windows\System32\SppExtComObj.Exe | — | svchost.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: KMS Connection Broker Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1912 | "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n C:\Users\admin\Desktop\исковое_19.03.docx /o "" | C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 16.0.16026.20146 Modules
| |||||||||||||||
| 5164 | "C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEvent | C:\Windows\System32\slui.exe | — | SppExtComObj.Exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7224 | "C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exe" "12869B92-566F-46D7-B9B5-799F4C807B51" "E0E9296B-AC9A-4C39-8B5C-8C7020120357" "1912" | C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exe | — | WINWORD.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Artificial Intelligence (AI) Host for the Microsoft® Windows® Operating System and Platform x64. Version: 0.12.2.0 Modules
| |||||||||||||||
| (PID) Process: | (1912) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\Roaming |
| Operation: | write | Name: | RoamingLastSyncTimeWord |
Value: E907040004000300080036002500F602 | |||
| (PID) Process: | (1912) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\Roaming |
| Operation: | write | Name: | RoamingLastWriteTimeWord |
Value: E907040004000300080036002500F602 | |||
| (PID) Process: | (1912) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\Internet\Server Cache\http://clack.su/ |
| Operation: | write | Name: | EnableBHO |
Value: 0 | |||
| (PID) Process: | (1912) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (1912) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (1912) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (1912) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\Identity\ServiceAuthInfoCache\CredStoreKeyToAuthScheme |
| Operation: | delete value | Name: | http://clack.su |
Value: | |||
| (PID) Process: | (1912) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\ClientTelemetry\Sampling |
| Operation: | write | Name: | 0 |
Value: 017012000000001000B24E9A3E02000000000000000600000000000000 | |||
| (PID) Process: | (1912) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\CrashPersistence\WINWORD\1912 |
| Operation: | write | Name: | 0 |
Value: 0B0E1021AF504E5B483B4E99320F42B43D714E230046F990B7B3E08EE9ED016A04102400449A7D64B29D01008500A907556E6B6E6F776EC906022222CA0DC2190000C91003783634C511F80ED2120B770069006E0077006F00720064002E00650078006500C51620C517808004C91808323231322D44656300 | |||
| (PID) Process: | (1912) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages |
| Operation: | write | Name: | en-US |
Value: 2 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1912 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\CEAC00DC-51F8-49C0-AEDE-79D53E549C6A | xml | |
MD5:1A1CEBD34D9AD90BDBD2E6652F9E166F | SHA256:342D4AF4D6A8F26B40D8B99D45813BDE089CA9071CC9A42D4F5E06AFA409DEBE | |||
| 1912 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | binary | |
MD5:02B0B7D4F69C635E8CB70AB786DAE852 | SHA256:DAC3228822C13CD438543A6FF9E5DF59ADD720B934718110F0EA24012D47EB0F | |||
| 1912 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\4FE769D7.docx | document | |
MD5:DCAD3BE881D072240B4C5C601E562ED2 | SHA256:E2052EB03DB380BC085A71DD1170CFEA6AC074A9AAB6292BBE5CA4C2525183D2 | |||
| 1912 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\msoC064.tmp | image | |
MD5:ED3C1C40B68BA4F40DB15529D5443DEC | SHA256:039FE79B74E6D3D561E32D4AF570E6CA70DB6BB3718395BE2BF278B9E601279A | |||
| 1912 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\56a61aeb75d8f5be186c26607f4bb213abe7c5ec.tbres | binary | |
MD5:489C5086E3D7B466921AE5B5879A6F14 | SHA256:3B8F5EF1FA76F7F0860C5E31CA3AF159546C1D556EC61EC8ABDE8CD3AAFCACA6 | |||
| 1912 | WINWORD.EXE | C:\Users\admin\Desktop\~$ковое_19.03.docx | binary | |
MD5:B63BE7A59E9A746E2654B4670C24B7A9 | SHA256:6F048FF180A94C6125471A2BB8EDDC25733D0E0DBDEDFABC8599D676DC111EBB | |||
| 1912 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\исковое_19.03.docx.LNK | binary | |
MD5:02A9E81FA0CD080FFD13A84ADAC20F72 | SHA256:22FB579004B3E3C514105381B296516B76E5444AF3970D4686C7C8C42AD06E62 | |||
| 1912 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Office\16.0\ResourceInfoCache\data.json | binary | |
MD5:A711D17A878B9490D5E54DF0DBACB657 | SHA256:1E4F25CEA4EC1B1916B60712F52205044B3E048A0ABDC7F197D37611244A05B3 | |||
| 1912 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\fox[1].docx | document | |
MD5:DCAD3BE881D072240B4C5C601E562ED2 | SHA256:E2052EB03DB380BC085A71DD1170CFEA6AC074A9AAB6292BBE5CA4C2525183D2 | |||
| 1912 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres | binary | |
MD5:59843DDB14F18AAECD587079637BADB2 | SHA256:CEDAD8FE5A3726EC3D88F967689FCC5C0CF937D49E7E487AE4A5AE7BFD4419F0 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 200 | 23.216.77.28:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | GET | 200 | 23.216.77.28:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1912 | WINWORD.EXE | OPTIONS | — | 91.218.228.26:80 | http://clack.su/ | unknown | — | — | unknown |
1912 | WINWORD.EXE | OPTIONS | — | 91.218.228.26:80 | http://clack.su/ | unknown | — | — | unknown |
1912 | WINWORD.EXE | HEAD | 200 | 91.218.228.26:80 | http://clack.su/fox.docx | unknown | — | — | unknown |
1912 | WINWORD.EXE | GET | 200 | 91.218.228.26:80 | http://clack.su/fox.docx | unknown | — | — | unknown |
1912 | WINWORD.EXE | OPTIONS | — | 91.218.228.26:80 | http://valisi.ru/ | unknown | — | — | unknown |
1912 | WINWORD.EXE | HEAD | 200 | 91.218.228.26:80 | http://clack.su/fox.docx | unknown | — | — | unknown |
6544 | svchost.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
1912 | WINWORD.EXE | OPTIONS | — | 91.218.228.26:80 | http://valisi.ru/ | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2104 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5496 | MoUsoCoreWorker.exe | 23.216.77.28:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 23.216.77.28:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
1912 | WINWORD.EXE | 52.109.76.240:443 | officeclient.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1912 | WINWORD.EXE | 52.123.131.14:443 | ecs.office.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
1912 | WINWORD.EXE | 23.50.131.87:443 | omex.cdn.office.net | Akamai International B.V. | DE | whitelisted |
1912 | WINWORD.EXE | 91.218.228.26:80 | clack.su | EuroByte LLC | RU | unknown |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
officeclient.microsoft.com |
| whitelisted |
ecs.office.com |
| whitelisted |
omex.cdn.office.net |
| whitelisted |
clack.su |
| unknown |
client.wns.windows.com |
| whitelisted |
valisi.ru |
| unknown |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
1912 | WINWORD.EXE | Potentially Bad Traffic | ET INFO HTTP Request to .su TLD (Soviet Union) Often Malware Related |
1912 | WINWORD.EXE | Potentially Bad Traffic | ET INFO HTTP Request to .su TLD (Soviet Union) Often Malware Related |
1912 | WINWORD.EXE | Potentially Bad Traffic | ET INFO HTTP Request to .su TLD (Soviet Union) Often Malware Related |
1912 | WINWORD.EXE | Potentially Bad Traffic | ET HUNTING Microsoft Office User-Agent Requesting A Doc File |
1912 | WINWORD.EXE | Potentially Bad Traffic | ET INFO HTTP Request to .su TLD (Soviet Union) Often Malware Related |
1912 | WINWORD.EXE | Misc activity | ET USER_AGENTS Microsoft Office Existence Discovery User-Agent |
1912 | WINWORD.EXE | Potentially Bad Traffic | ET INFO HTTP Request to .su TLD (Soviet Union) Often Malware Related |
1912 | WINWORD.EXE | Malware Command and Control Activity Detected | ET MALWARE TA399/Sidewinder Activity Payload Request M3, Microsoft Word UA Request for .rtf |
1912 | WINWORD.EXE | Malware Command and Control Activity Detected | ET MALWARE TA399/Sidewinder Activity Payload Request M2, Microsoft Office UA Request for .rtf |