File name:

microsoft-office-2019-16-0-17328-20162.exe

Full analysis: https://app.any.run/tasks/ca0e0bfd-bbf2-4025-ad0b-d4065e24cf65
Verdict: Malicious activity
Analysis date: July 19, 2024, 12:48:55
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

938BFCD42C660133D1B0F52B3D7DA613

SHA1:

0F3D50CB5B8A1F5C684FF379503FBEE41B4F4BE5

SHA256:

9CD378566121205E6832C3B0BE327D0336331CFA493A93B9670FA1EC889CDCEA

SSDEEP:

98304:LrhTe3SkkiYetlBtt4NxN10INJW5Ew4E3w6TA3Ac54MaKgcze/2tEgcwFc840bRQ:HhD4Ei7

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • microsoft-office-2019-16-0-17328-20162.exe (PID: 1928)
    • Scans artifacts that could help determine the target

      • microsoft-office-2019-16-0-17328-20162.exe (PID: 6440)
      • microsoft-office-2019-16-0-17328-20162.exe (PID: 1928)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • microsoft-office-2019-16-0-17328-20162.exe (PID: 1928)
    • Starts a Microsoft application from unusual location

      • microsoft-office-2019-16-0-17328-20162.exe (PID: 1928)
      • microsoft-office-2019-16-0-17328-20162.exe (PID: 6440)
    • Reads security settings of Internet Explorer

      • microsoft-office-2019-16-0-17328-20162.exe (PID: 1928)
      • microsoft-office-2019-16-0-17328-20162.exe (PID: 6440)
    • Reads the date of Windows installation

      • microsoft-office-2019-16-0-17328-20162.exe (PID: 1928)
    • Application launched itself

      • microsoft-office-2019-16-0-17328-20162.exe (PID: 1928)
    • Checks Windows Trust Settings

      • microsoft-office-2019-16-0-17328-20162.exe (PID: 6440)
    • Searches for installed software

      • microsoft-office-2019-16-0-17328-20162.exe (PID: 6440)
  • INFO

    • Reads the machine GUID from the registry

      • microsoft-office-2019-16-0-17328-20162.exe (PID: 1928)
      • microsoft-office-2019-16-0-17328-20162.exe (PID: 6440)
    • Checks supported languages

      • microsoft-office-2019-16-0-17328-20162.exe (PID: 1928)
      • microsoft-office-2019-16-0-17328-20162.exe (PID: 6440)
    • Reads the computer name

      • microsoft-office-2019-16-0-17328-20162.exe (PID: 1928)
      • microsoft-office-2019-16-0-17328-20162.exe (PID: 6440)
    • Process checks computer location settings

      • microsoft-office-2019-16-0-17328-20162.exe (PID: 1928)
      • microsoft-office-2019-16-0-17328-20162.exe (PID: 6440)
    • Process checks whether UAC notifications are on

      • microsoft-office-2019-16-0-17328-20162.exe (PID: 1928)
    • Reads Microsoft Office registry keys

      • microsoft-office-2019-16-0-17328-20162.exe (PID: 1928)
      • microsoft-office-2019-16-0-17328-20162.exe (PID: 6440)
    • Checks proxy server information

      • microsoft-office-2019-16-0-17328-20162.exe (PID: 1928)
      • microsoft-office-2019-16-0-17328-20162.exe (PID: 6440)
    • Reads the software policy settings

      • microsoft-office-2019-16-0-17328-20162.exe (PID: 1928)
      • microsoft-office-2019-16-0-17328-20162.exe (PID: 6440)
    • Creates files or folders in the user directory

      • microsoft-office-2019-16-0-17328-20162.exe (PID: 1928)
      • microsoft-office-2019-16-0-17328-20162.exe (PID: 6440)
    • Create files in a temporary directory

      • microsoft-office-2019-16-0-17328-20162.exe (PID: 6440)
      • microsoft-office-2019-16-0-17328-20162.exe (PID: 1928)
    • Reads Environment values

      • microsoft-office-2019-16-0-17328-20162.exe (PID: 6440)
      • microsoft-office-2019-16-0-17328-20162.exe (PID: 1928)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:03:04 04:31:42+00:00
ImageFileCharacteristics: Executable, 32-bit, Removable run from swap, Net run from swap
PEType: PE32
LinkerVersion: 14.36
CodeSize: 4668416
InitializedDataSize: 3065344
UninitializedDataSize: -
EntryPoint: 0x3f78b7
OSVersion: 5.2
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
FileVersionNumber: 16.0.17328.20162
ProductVersionNumber: 16.0.17328.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Windows, Latin1
CompanyName: Microsoft Corporation
FileDescription: Microsoft 365 and Office
FileVersion: 16.0.17328.20162
InternalName: Bootstrapper.exe
LegalTrademarks1: Microsoft® is a registered trademark of Microsoft Corporation.
LegalTrademarks2: Windows® is a registered trademark of Microsoft Corporation.
OriginalFileName: Bootstrapper.exe
ProductName: Microsoft Office
ProductVersion: 16.0.17328.20162
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
141
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start microsoft-office-2019-16-0-17328-20162.exe microsoft-office-2019-16-0-17328-20162.exe Delivery Optimization User no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1928"C:\Users\admin\AppData\Local\Temp\microsoft-office-2019-16-0-17328-20162.exe" C:\Users\admin\AppData\Local\Temp\microsoft-office-2019-16-0-17328-20162.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft 365 and Office
Version:
16.0.17328.20162
Modules
Images
c:\users\admin\appdata\local\temp\microsoft-office-2019-16-0-17328-20162.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6440"C:\Users\admin\AppData\Local\Temp\microsoft-office-2019-16-0-17328-20162.exe" ELEVATED sid=S-1-5-21-1693682860-607145093-2874071422-1001 C:\Users\admin\AppData\Local\Temp\microsoft-office-2019-16-0-17328-20162.exe
microsoft-office-2019-16-0-17328-20162.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft 365 and Office
Version:
16.0.17328.20162
Modules
Images
c:\users\admin\appdata\local\temp\microsoft-office-2019-16-0-17328-20162.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6616C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7528C:\WINDOWS\system32\DllHost.exe /Processid:{338B40F9-9D68-4B53-A793-6B9AA0C5F63B}C:\Windows\System32\dllhost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
COM Surrogate
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
Total events
12 115
Read events
11 980
Write events
131
Delete events
4

Modification events

(PID) Process:(1928) microsoft-office-2019-16-0-17328-20162.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:en-US
Value:
2
(PID) Process:(1928) microsoft-office-2019-16-0-17328-20162.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:en-US
Value:
1
(PID) Process:(1928) microsoft-office-2019-16-0-17328-20162.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common
Operation:writeName:SessionId
Value:
1CB681FF5D582542BDE91F0115AF532E
(PID) Process:(1928) microsoft-office-2019-16-0-17328-20162.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1928) microsoft-office-2019-16-0-17328-20162.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1928) microsoft-office-2019-16-0-17328-20162.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(1928) microsoft-office-2019-16-0-17328-20162.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(1928) microsoft-office-2019-16-0-17328-20162.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\Internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--syslcid=1033&build=16.0.17328&crev=3
Operation:writeName:Last
Value:
0
(PID) Process:(1928) microsoft-office-2019-16-0-17328-20162.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\Internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--syslcid=1033&build=16.0.17328&crev=3\0
Operation:writeName:FilePath
Value:
officeclient.microsoft.com\AFC3E4C6-7D94-48AD-A606-C314A03FFB00
(PID) Process:(1928) microsoft-office-2019-16-0-17328-20162.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\Internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--syslcid=1033&build=16.0.17328&crev=3\0
Operation:writeName:StartDate
Value:
90D88409DAD9DA01
Executable files
0
Suspicious files
12
Text files
5
Unknown types
1

Dropped files

PID
Process
Filename
Type
6440microsoft-office-2019-16-0-17328-20162.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A583E2A51BFBDC1E492A57B7C8325850binary
MD5:A9EC2FF90C9D922F1A4FA1929821B8A6
SHA256:358E6C8506752C57C7DB2FBB9862AF1219518CD8183926BD8ADF3FA239B86587
6440microsoft-office-2019-16-0-17328-20162.exeC:\Users\admin\AppData\Local\Temp\OfficeC2REE32875F-6C4A-4782-8F63-63D0F4F1BEFB\v64.hashtext
MD5:3940D56B8ECC9D19EF83568FDFA8EB41
SHA256:D50E50C6F767C65067C82587011E1E3F268261D510202749E252D80EFC945177
6440microsoft-office-2019-16-0-17328-20162.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A583E2A51BFBDC1E492A57B7C8325850der
MD5:3582D5284FE8B34513E337C07AE9B8F8
SHA256:686C5D8F56C9BC20D444B6F3A32D78C249B94F10080F1B595CC8F856A62B65A6
6440microsoft-office-2019-16-0-17328-20162.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0B8A20E1F3F4D73D52A19929F922C892binary
MD5:0D41538E0143B2976CEFEE761C26AA38
SHA256:DA3E878B5B1222F7C159CEE3243866B752E3F81F77A6CB4B3F92F84800F39D42
6440microsoft-office-2019-16-0-17328-20162.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\36AC0BE60E1243344AE145F746D881FEder
MD5:A20961D8BD1A5A7D241026D0011751FB
SHA256:4D6AE5BBEF0EACFDC09D5ADE4D145E883CF41B131E4C6988738769F1D32E12F3
6440microsoft-office-2019-16-0-17328-20162.exeC:\Users\admin\AppData\Local\Temp\OfficeC2REE32875F-6C4A-4782-8F63-63D0F4F1BEFBOfficeC2R345DEEB9-2D42-468A-84C6-85035EA05A81\v64.hashtext
MD5:3940D56B8ECC9D19EF83568FDFA8EB41
SHA256:D50E50C6F767C65067C82587011E1E3F268261D510202749E252D80EFC945177
6440microsoft-office-2019-16-0-17328-20162.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\36AC0BE60E1243344AE145F746D881FEbinary
MD5:BAAEF8B04330AB80EC9F25A2031D0D52
SHA256:D0ACCDF74A1FFFA390F29950DB653321F45B6734AAD0C62C82ACBDADD2E5F65F
6440microsoft-office-2019-16-0-17328-20162.exeC:\Users\admin\AppData\Local\Microsoft\Office\OTele\microsoft-office-2019-16-0-17328-20162.exe.db-journalbinary
MD5:6224F2DF8A5F1736AB1BD125853F83F0
SHA256:458C932418CD9C3922B0CD9CBEB18DC77611BE5BE672B46F188FC39967ED21D9
1928microsoft-office-2019-16-0-17328-20162.exeC:\Users\admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\AFC3E4C6-7D94-48AD-A606-C314A03FFB00xml
MD5:86BFA5C5B8C3C10A16BB50B4B4E7C78C
SHA256:CE7F6A3EB622934D1B50097128C3F9CB3FBA03823F7491DB644F58A957D62809
6440microsoft-office-2019-16-0-17328-20162.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0B8A20E1F3F4D73D52A19929F922C892der
MD5:0840F3C261E695105CD15C84EA85BEED
SHA256:F60632399A87485A7417DDF8B407DA66794C37347B3AA9E995EC389ECD091947
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
82
TCP/UDP connections
67
DNS requests
27
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6440
microsoft-office-2019-16-0-17328-20162.exe
HEAD
200
152.199.21.175:80
http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v64_16.0.16026.20146.cab
unknown
whitelisted
6440
microsoft-office-2019-16-0-17328-20162.exe
HEAD
200
152.199.21.175:80
http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v64_16.0.17726.20160.cab
unknown
whitelisted
6888
svchost.exe
HEAD
200
152.199.21.175:80
http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v64_16.0.17726.20160.cab
unknown
whitelisted
6440
microsoft-office-2019-16-0-17328-20162.exe
HEAD
200
152.199.21.175:80
http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v64_16.0.17726.20160.cab
unknown
whitelisted
6888
svchost.exe
HEAD
200
152.199.21.175:80
http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v64_16.0.17726.20160.cab
unknown
whitelisted
6888
svchost.exe
GET
206
152.199.21.175:80
http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v64_16.0.17726.20160.cab
unknown
whitelisted
6888
svchost.exe
GET
200
152.199.21.175:80
http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v64_16.0.17726.20160.cab
unknown
whitelisted
6440
microsoft-office-2019-16-0-17328-20162.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
whitelisted
6440
microsoft-office-2019-16-0-17328-20162.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicCodSigPCA_2010-07-06.crl
unknown
whitelisted
6440
microsoft-office-2019-16-0-17328-20162.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
4716
svchost.exe
40.126.32.133:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
5620
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
7856
svchost.exe
4.209.33.156:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
4032
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
1928
microsoft-office-2019-16-0-17328-20162.exe
52.109.89.18:443
officeclient.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
1928
microsoft-office-2019-16-0-17328-20162.exe
52.113.194.132:443
ecs.office.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
6440
microsoft-office-2019-16-0-17328-20162.exe
52.113.194.132:443
ecs.office.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
6440
microsoft-office-2019-16-0-17328-20162.exe
52.109.89.117:443
mrodevicemgr.officeapps.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown

DNS requests

Domain
IP
Reputation
login.live.com
  • 40.126.32.133
  • 20.190.160.20
  • 20.190.160.14
  • 20.190.160.22
  • 40.126.32.136
  • 40.126.32.140
  • 40.126.32.68
  • 20.190.160.17
whitelisted
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
whitelisted
google.com
  • 142.250.185.110
whitelisted
officeclient.microsoft.com
  • 52.109.89.18
whitelisted
ecs.office.com
  • 52.113.194.132
whitelisted
mrodevicemgr.officeapps.live.com
  • 52.109.89.117
whitelisted
f.c2r.ts.cdn.office.net
  • 152.199.21.175
  • 163.177.116.4
  • 183.131.40.6
  • 113.16.211.7
  • 118.112.233.1
  • 171.214.31.1
  • 183.61.168.1
  • 183.61.243.1
  • 175.6.254.70
  • 42.56.77.10
whitelisted
crl.microsoft.com
  • 2.16.241.12
  • 2.16.241.19
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted
officecdn.microsoft.com
  • 163.177.116.4
  • 183.131.40.6
  • 113.16.211.7
  • 118.112.233.1
  • 171.214.31.1
  • 183.61.168.1
  • 183.61.243.1
  • 175.6.254.70
  • 42.56.77.10
whitelisted

Threats

No threats detected
No debug info