File name:

Office2024VolumeLicensePack_x64.exe

Full analysis: https://app.any.run/tasks/a75a25ce-b6c7-49ef-83e4-db8b13e0d3e4
Verdict: Malicious activity
Analysis date: April 29, 2025, 10:12:21
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

650C3A652962E3A0DF8B81CEC440CFB6

SHA1:

09ABDF0F9E9F2858D9D474CCF4E0184D895F4754

SHA256:

59DD32C1E81E829DACFFC74E4B2EF59DD504778BDE8EB9AE692BEB1AD773F0D9

SSDEEP:

12288:B4xxcymHvgBO69xbR9DlWZESvl1aVVVVVVVVVVOmOZEkRrV:B4xxcNvgU69xbJslRmOiqV

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Checks whether a specified folder exists (SCRIPT)

      • cscript.exe (PID: 8000)
    • Gets %windir% folder path (SCRIPT)

      • cscript.exe (PID: 8000)
    • Accesses environment variables (SCRIPT)

      • cscript.exe (PID: 8000)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • Office2024VolumeLicensePack_x64.exe (PID: 7644)
    • Creates FileSystem object to access computer's file system (SCRIPT)

      • cscript.exe (PID: 8000)
    • Accesses WMI object, sets custom ImpersonationLevel (SCRIPT)

      • cscript.exe (PID: 8000)
    • Gets full path of the running script (SCRIPT)

      • cscript.exe (PID: 8000)
    • The process executes VB scripts

      • Office2024VolumeLicensePack_x64.exe (PID: 7644)
    • Checks whether a specific file exists (SCRIPT)

      • cscript.exe (PID: 8000)
    • Sets XML DOM element text (SCRIPT)

      • cscript.exe (PID: 8000)
    • Creates a Stream, which may work with files, input/output devices, pipes, or TCP/IP sockets (SCRIPT)

      • cscript.exe (PID: 8000)
    • Reads data from a binary Stream object (SCRIPT)

      • cscript.exe (PID: 8000)
    • The process checks if it is being run in the virtual environment

      • cscript.exe (PID: 8000)
    • Accesses system date via WMI (SCRIPT)

      • cscript.exe (PID: 8000)
    • Changes charset (SCRIPT)

      • cscript.exe (PID: 8000)
    • Runs shell command (SCRIPT)

      • cscript.exe (PID: 8000)
    • The process creates files with name similar to system file names

      • Dism.exe (PID: 6668)
    • Starts a Microsoft application from unusual location

      • DismHost.exe (PID: 904)
    • Reads security settings of Internet Explorer

      • Office2024VolumeLicensePack_x64.exe (PID: 7644)
    • Reads data from a file (SCRIPT)

      • cscript.exe (PID: 8000)
    • Executable content was dropped or overwritten

      • Dism.exe (PID: 6668)
  • INFO

    • Checks supported languages

      • Office2024VolumeLicensePack_x64.exe (PID: 7644)
      • DismHost.exe (PID: 904)
    • Reads the computer name

      • Office2024VolumeLicensePack_x64.exe (PID: 7644)
      • DismHost.exe (PID: 904)
    • Creates files in the program directory

      • Office2024VolumeLicensePack_x64.exe (PID: 7644)
    • Creates files or folders in the user directory

      • cscript.exe (PID: 8000)
    • Checks proxy server information

      • cscript.exe (PID: 8000)
    • Create files in a temporary directory

      • Office2024VolumeLicensePack_x64.exe (PID: 7644)
      • Dism.exe (PID: 6668)
    • Reads the software policy settings

      • cscript.exe (PID: 8000)
    • Reads security settings of Internet Explorer

      • cscript.exe (PID: 8000)
    • Reads Environment values

      • DismHost.exe (PID: 904)
    • The sample compiled with english language support

      • Dism.exe (PID: 6668)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:07:02 00:20:33+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.38
CodeSize: 232960
InitializedDataSize: 132096
UninitializedDataSize: -
EntryPoint: 0x20c63
OSVersion: 6.1
ImageVersion: -
SubsystemVersion: 6.1
Subsystem: Windows GUI
FileVersionNumber: 16.0.17830.20004
ProductVersionNumber: 16.0.17830.20004
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Windows, Latin1
CompanyName: Microsoft Corporation
FileVersion: 16.0.17830.20004
LegalTrademarks1: Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2: Windows® is a registered trademark of Microsoft Corporation.
ProductVersion: 16.0.17830.20004
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
138
Monitored processes
9
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start office2024volumelicensepack_x64.exe sppextcomobj.exe no specs slui.exe no specs cscript.exe conhost.exe no specs dism.exe dismhost.exe no specs tiworker.exe no specs office2024volumelicensepack_x64.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
904C:\Users\admin\AppData\Local\Temp\F041D996-9A91-402B-AC02-AB66EE175F1D\dismhost.exe {8CFCCFEB-7C67-44DD-B52D-CBA00255CF42}C:\Users\admin\AppData\Local\Temp\F041D996-9A91-402B-AC02-AB66EE175F1D\DismHost.exeDism.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Dism Host Servicing Process
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\users\admin\appdata\local\temp\f041d996-9a91-402b-ac02-ab66ee175f1d\dismhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ole32.dll
6668C:\WINDOWS\SysNative\Dism.exe /online /get-featureinfo /featurename:volumeactivation-full-role /NoRestartC:\Windows\System32\Dism.exe
cscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Dism Image Servicing Utility
Exit code:
2148468748
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\dism.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ole32.dll
6872C:\WINDOWS\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.3989_none_7ddb45627cb30e03\TiWorker.exe -EmbeddingC:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.3989_none_7ddb45627cb30e03\TiWorker.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Modules Installer Worker
Version:
10.0.19041.3989 (WinBuild.160101.0800)
Modules
Images
c:\windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.3989_none_7ddb45627cb30e03\tiworker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
7548"C:\Users\admin\Downloads\Office2024VolumeLicensePack_x64.exe" C:\Users\admin\Downloads\Office2024VolumeLicensePack_x64.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Exit code:
3221226540
Version:
16.0.17830.20004
Modules
Images
c:\users\admin\downloads\office2024volumelicensepack_x64.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
7644"C:\Users\admin\Downloads\Office2024VolumeLicensePack_x64.exe" C:\Users\admin\Downloads\Office2024VolumeLicensePack_x64.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Exit code:
0
Version:
16.0.17830.20004
Modules
Images
c:\users\admin\downloads\office2024volumelicensepack_x64.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
7680C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7712"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
8000cscript //Nologo kms_host24.vbsC:\Windows\SysWOW64\cscript.exe
Office2024VolumeLicensePack_x64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft ® Console Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\syswow64\cscript.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
8008\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
5 470
Read events
5 468
Write events
2
Delete events
0

Modification events

(PID) Process:(6872) TiWorker.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing
Operation:writeName:SessionIdHigh
Value:
31176943
(PID) Process:(6872) TiWorker.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing
Operation:writeName:SessionIdLow
Value:
Executable files
50
Suspicious files
5
Text files
13
Unknown types
0

Dropped files

PID
Process
Filename
Type
7644Office2024VolumeLicensePack_x64.exeC:\Program Files (x86)\MSECache\OfficeKMS\Catalog\files.catbinary
MD5:5F4FAA48EEA210D7BC199B81071606EB
SHA256:629CB19F93BD400A897E232CCAFDC2BE84633636DE383EBA140E6D69704AEC7B
7644Office2024VolumeLicensePack_x64.exeC:\Program Files (x86)\MSECache\OfficeKMS\kms_host.xmltext
MD5:195B335E6F9C7D65416C973F2F084762
SHA256:9F5BA492B3D09551F04F13F95372ED245F51EE3CA761C337F904665E9F1037EE
7644Office2024VolumeLicensePack_x64.exeC:\Users\admin\AppData\Local\Temp\OWPBAC6.tmp\eula.txttext
MD5:FF5A780583F82C2ACCA1B28C0EB9E8E6
SHA256:FBF3D437B420C67A41463CB89C3430C41360A00018B5AB454F9BA96C895ACDEE
7644Office2024VolumeLicensePack_x64.exeC:\Program Files (x86)\MSECache\OfficeKMS\win8\client-issuance-bridge-office.xrm-msxml
MD5:33C1695D278F5917F28067D27B4868EE
SHA256:65BCCC008F5B44D2DBD880C0C33AFCFFF27C07DD24DC0CC7DDA2B3BFA7E9AE74
7644Office2024VolumeLicensePack_x64.exeC:\Program Files (x86)\MSECache\OfficeKMS\win8\pkeyconfig-office-kmshost.xrm-msxml
MD5:B8528026F2454B7ABECFFDC9F8799197
SHA256:629B2224103186A1EB6A5ED4DDF2FB1DA46707D3770802348C59E6E265F0F830
7644Office2024VolumeLicensePack_x64.exeC:\Program Files (x86)\MSECache\OfficeKMS\win8\kmshost2024vl_kms_host-ul-oob.xrm-msxml
MD5:916DC7D6F671D1FB41AD3F8849172D63
SHA256:635D233C9C3151A04178C42CA958B2EB52360EFCB6914CD8AB04A5B13A74E753
8000cscript.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A583E2A51BFBDC1E492A57B7C8325850binary
MD5:86BEC7A51419CF6F8277608E79B2B807
SHA256:1AE99C253A484A9CB6814FB52AFD40E347DFE2CD6273E50B245695B87C1BC6E5
7644Office2024VolumeLicensePack_x64.exeC:\Program Files (x86)\MSECache\OfficeKMS\kms_host24.vbstext
MD5:813ADD22B015607FF475258A66784E9A
SHA256:FA97ECF609FF15BD7034BF6A29F8F3EFC886C7C2A2476D6D305F7365EEE23985
7644Office2024VolumeLicensePack_x64.exeC:\Program Files (x86)\MSECache\OfficeKMS\win8\client-issuance-ul.xrm-msxml
MD5:5B39AE306BDCF1AB7432EF34668E7840
SHA256:387BBEDCE2F48B2AE3EAFD83BC0BD8383EC23C9031221DD4F9E0D2CC78150C7B
7644Office2024VolumeLicensePack_x64.exeC:\Program Files (x86)\MSECache\OfficeKMS\win8\kmshost2024vl_kms_host-ppd.xrm-msxml
MD5:D177603B32CE4C79E108FC18BE52D7AF
SHA256:4B9EFC3A13CD259336AD60FA6384C60307978FF55E0ACC75187CC84ADD10F1A8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
20
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.164.114:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
8000
cscript.exe
GET
200
2.16.164.106:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
whitelisted
7636
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
8000
cscript.exe
GET
200
2.16.164.106:80
http://crl.microsoft.com/pki/crl/products/MicCodSigPCA_2010-07-06.crl
unknown
whitelisted
7636
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.16.164.114:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
4
System
192.168.100.255:138
whitelisted
2112
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
8000
cscript.exe
2.16.164.106:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
6544
svchost.exe
20.190.159.130:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 40.127.240.158
  • 51.104.136.2
whitelisted
google.com
  • 142.250.185.238
whitelisted
crl.microsoft.com
  • 2.16.164.114
  • 2.16.164.43
  • 2.16.164.18
  • 2.16.164.106
  • 2.16.164.9
whitelisted
www.microsoft.com
  • 2.23.246.101
  • 95.101.149.131
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 20.190.159.130
  • 40.126.31.1
  • 20.190.159.68
  • 40.126.31.2
  • 20.190.159.131
  • 20.190.159.0
  • 40.126.31.69
  • 20.190.159.75
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted

Threats

No threats detected
No debug info