| File name: | исковое_19.03.docx |
| Full analysis: | https://app.any.run/tasks/b4ec4e57-ec4a-43e3-a03b-a45097b18ae2 |
| Verdict: | Malicious activity |
| Analysis date: | April 03, 2025, 08:54:28 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/octet-stream |
| File info: | Microsoft OOXML |
| MD5: | F9026FABFB8D131863AD06FD72EB2717 |
| SHA1: | FFA14E589D99A95D025B0AE5D7122319195622F7 |
| SHA256: | 4640C58E3C658D8178F4E9D9570566040AD162E25B61A46B0BE989AEB69DB679 |
| SSDEEP: | 1536:bAGziBOMJBmXHPCI6+/v3yh9PKJEgDvb/VT:bA5o8YPcYv3Omvrx |
| .docx | | | Word Microsoft Office Open XML Format document (52.2) |
|---|---|---|
| .zip | | | Open Packaging Conventions container (38.8) |
| .zip | | | ZIP compressed archive (8.8) |
| ZipRequiredVersion: | 20 |
|---|---|
| ZipBitFlag: | - |
| ZipCompression: | Deflated |
| ZipModifyDate: | 1980:01:01 00:00:00 |
| ZipCRC: | 0xb71a911e |
| ZipCompressedSize: | 234 |
| ZipUncompressedSize: | 590 |
| ZipFileName: | _rels/.rels |
| Template: | AdjacencyResume |
|---|---|
| TotalEditTime: | 1 minute |
| Pages: | 1 |
| Words: | 251 |
| Characters: | 1437 |
| Application: | Microsoft Office Word |
| DocSecurity: | None |
| Lines: | 11 |
| Paragraphs: | 3 |
| ScaleCrop: | No |
| Company: | - |
| LinksUpToDate: | No |
| CharactersWithSpaces: | 1685 |
| SharedDoc: | No |
| HyperlinksChanged: | No |
| AppVersion: | 16 |
| LastModifiedBy: | Solo |
| RevisionNumber: | 1 |
| CreateDate: | 2025:03:19 07:29:00Z |
| ModifyDate: | 2025:03:19 07:30:00Z |
| Creator: | Solo |
|---|
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1056 | C:\WINDOWS\system32\SppExtComObj.exe -Embedding | C:\Windows\System32\SppExtComObj.Exe | — | svchost.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: KMS Connection Broker Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1912 | "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n C:\Users\admin\Desktop\исковое_19.03.docx /o "" | C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 16.0.16026.20146 Modules
| |||||||||||||||
| 5164 | "C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEvent | C:\Windows\System32\slui.exe | — | SppExtComObj.Exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7224 | "C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exe" "12869B92-566F-46D7-B9B5-799F4C807B51" "E0E9296B-AC9A-4C39-8B5C-8C7020120357" "1912" | C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exe | — | WINWORD.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Artificial Intelligence (AI) Host for the Microsoft® Windows® Operating System and Platform x64. Version: 0.12.2.0 Modules
| |||||||||||||||
| (PID) Process: | (1912) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\Roaming |
| Operation: | write | Name: | RoamingLastSyncTimeWord |
Value: E907040004000300080036002500F602 | |||
| (PID) Process: | (1912) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\Roaming |
| Operation: | write | Name: | RoamingLastWriteTimeWord |
Value: E907040004000300080036002500F602 | |||
| (PID) Process: | (1912) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\Internet\Server Cache\http://clack.su/ |
| Operation: | write | Name: | EnableBHO |
Value: 0 | |||
| (PID) Process: | (1912) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (1912) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (1912) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (1912) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\Identity\ServiceAuthInfoCache\CredStoreKeyToAuthScheme |
| Operation: | delete value | Name: | http://clack.su |
Value: | |||
| (PID) Process: | (1912) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\ClientTelemetry\Sampling |
| Operation: | write | Name: | 0 |
Value: 017012000000001000B24E9A3E02000000000000000600000000000000 | |||
| (PID) Process: | (1912) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\CrashPersistence\WINWORD\1912 |
| Operation: | write | Name: | 0 |
Value: 0B0E1021AF504E5B483B4E99320F42B43D714E230046F990B7B3E08EE9ED016A04102400449A7D64B29D01008500A907556E6B6E6F776EC906022222CA0DC2190000C91003783634C511F80ED2120B770069006E0077006F00720064002E00650078006500C51620C517808004C91808323231322D44656300 | |||
| (PID) Process: | (1912) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages |
| Operation: | write | Name: | en-US |
Value: 2 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1912 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\CEAC00DC-51F8-49C0-AEDE-79D53E549C6A | xml | |
MD5:1A1CEBD34D9AD90BDBD2E6652F9E166F | SHA256:342D4AF4D6A8F26B40D8B99D45813BDE089CA9071CC9A42D4F5E06AFA409DEBE | |||
| 1912 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Office\16.0\Personalization\Governance\Anonymous\floodgatecampaigns.json | binary | |
MD5:3B76F71ECB36D9099B0A5C550A9FE3F6 | SHA256:D918FF7B6BA2827222BA54F5E606A621F5E8555439FFCC6CFBCE2F48C0E03639 | |||
| 1912 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntities.bin | text | |
MD5:CC90D669144261B198DEAD45AA266572 | SHA256:89C701EEFF939A44F28921FD85365ECD87041935DCD0FE0BAF04957DA12C9899 | |||
| 1912 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres | binary | |
MD5:59843DDB14F18AAECD587079637BADB2 | SHA256:CEDAD8FE5A3726EC3D88F967689FCC5C0CF937D49E7E487AE4A5AE7BFD4419F0 | |||
| 1912 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntitiesUpdated.bin | text | |
MD5:6E5E466F4F00BA7D239842D98643BA15 | SHA256:06F43C64740EE4BAA35F4982D29E6D4232DD7D94383AA213FF91D9B3CF26DA42 | |||
| 1912 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Office\16.0\ResourceInfoCache\07fc2a8c43a1d1f16572d21e959a4847e306edae.temp | binary | |
MD5:A711D17A878B9490D5E54DF0DBACB657 | SHA256:1E4F25CEA4EC1B1916B60712F52205044B3E048A0ABDC7F197D37611244A05B3 | |||
| 1912 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\56a61aeb75d8f5be186c26607f4bb213abe7c5ec.tbres | binary | |
MD5:489C5086E3D7B466921AE5B5879A6F14 | SHA256:3B8F5EF1FA76F7F0860C5E31CA3AF159546C1D556EC61EC8ABDE8CD3AAFCACA6 | |||
| 1912 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dat | text | |
MD5:F9C04063C1D3BDAFB8FB99523751E0D6 | SHA256:F58C207FEF157BD9E8AC031CC750367E34CC789D2F3526B4D5F2EA5C277028D2 | |||
| 1912 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\fox[1].docx | document | |
MD5:DCAD3BE881D072240B4C5C601E562ED2 | SHA256:E2052EB03DB380BC085A71DD1170CFEA6AC074A9AAB6292BBE5CA4C2525183D2 | |||
| 1912 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Office\16.0\ResourceInfoCache\data.json | binary | |
MD5:A711D17A878B9490D5E54DF0DBACB657 | SHA256:1E4F25CEA4EC1B1916B60712F52205044B3E048A0ABDC7F197D37611244A05B3 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 200 | 23.216.77.28:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1912 | WINWORD.EXE | OPTIONS | — | 91.218.228.26:80 | http://clack.su/ | unknown | — | — | unknown |
5496 | MoUsoCoreWorker.exe | GET | 200 | 23.216.77.28:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1912 | WINWORD.EXE | OPTIONS | — | 91.218.228.26:80 | http://clack.su/ | unknown | — | — | unknown |
1912 | WINWORD.EXE | HEAD | 200 | 91.218.228.26:80 | http://clack.su/fox.docx | unknown | — | — | unknown |
1912 | WINWORD.EXE | GET | 200 | 91.218.228.26:80 | http://clack.su/fox.docx | unknown | — | — | unknown |
1912 | WINWORD.EXE | HEAD | 200 | 91.218.228.26:80 | http://clack.su/fox.docx | unknown | — | — | unknown |
1912 | WINWORD.EXE | OPTIONS | — | 91.218.228.26:80 | http://valisi.ru/ | unknown | — | — | unknown |
1912 | WINWORD.EXE | OPTIONS | — | 91.218.228.26:80 | http://valisi.ru/ | unknown | — | — | unknown |
6544 | svchost.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2104 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5496 | MoUsoCoreWorker.exe | 23.216.77.28:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 23.216.77.28:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
1912 | WINWORD.EXE | 52.109.76.240:443 | officeclient.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1912 | WINWORD.EXE | 52.123.131.14:443 | ecs.office.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
1912 | WINWORD.EXE | 23.50.131.87:443 | omex.cdn.office.net | Akamai International B.V. | DE | whitelisted |
1912 | WINWORD.EXE | 91.218.228.26:80 | clack.su | EuroByte LLC | RU | unknown |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
officeclient.microsoft.com |
| whitelisted |
ecs.office.com |
| whitelisted |
omex.cdn.office.net |
| whitelisted |
clack.su |
| unknown |
client.wns.windows.com |
| whitelisted |
valisi.ru |
| unknown |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
1912 | WINWORD.EXE | Potentially Bad Traffic | ET INFO HTTP Request to .su TLD (Soviet Union) Often Malware Related |
1912 | WINWORD.EXE | Potentially Bad Traffic | ET INFO HTTP Request to .su TLD (Soviet Union) Often Malware Related |
1912 | WINWORD.EXE | Potentially Bad Traffic | ET INFO HTTP Request to .su TLD (Soviet Union) Often Malware Related |
1912 | WINWORD.EXE | Potentially Bad Traffic | ET HUNTING Microsoft Office User-Agent Requesting A Doc File |
1912 | WINWORD.EXE | Potentially Bad Traffic | ET INFO HTTP Request to .su TLD (Soviet Union) Often Malware Related |
1912 | WINWORD.EXE | Misc activity | ET USER_AGENTS Microsoft Office Existence Discovery User-Agent |
1912 | WINWORD.EXE | Potentially Bad Traffic | ET INFO HTTP Request to .su TLD (Soviet Union) Often Malware Related |
1912 | WINWORD.EXE | Malware Command and Control Activity Detected | ET MALWARE TA399/Sidewinder Activity Payload Request M3, Microsoft Word UA Request for .rtf |
1912 | WINWORD.EXE | Malware Command and Control Activity Detected | ET MALWARE TA399/Sidewinder Activity Payload Request M2, Microsoft Office UA Request for .rtf |