File name:

RN001005049.docx

Full analysis: https://app.any.run/tasks/ffbd30ad-f938-4aff-9ac5-4d743d3afbab
Verdict: Malicious activity
Analysis date: December 13, 2024, 23:23:32
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
ole-embedded
Indicators:
MIME: application/vnd.openxmlformats-officedocument.wordprocessingml.document
File info: Microsoft Word 2007+
MD5:

A5E111B3672DBC700CFC9225CFD78C5A

SHA1:

754AFE5A81533F115F09DDB6F898F4B77D912DFA

SHA256:

BA03071326DC6D63A637E360C3846C7407D30FAF91EA38DD4D4B26056469EF4C

SSDEEP:

1536:KKkedifD/2fXCP0Urf5kHvRdklYgGIJl0/DrnG4zthlyoq/UfpWT7:nx08C8UrfMRdCvKW4zthgoq/eWT7

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Connects to the server without a host name

      • WINWORD.EXE (PID: 3040)
  • INFO

    • The process uses the downloaded file

      • WINWORD.EXE (PID: 3040)
    • Drops encrypted VBS script (Microsoft Script Encoder)

      • WINWORD.EXE (PID: 3040)
    • Sends debugging messages

      • WINWORD.EXE (PID: 3040)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.docx | Word Microsoft Office Open XML Format document (52.2)
.zip | Open Packaging Conventions container (38.8)
.zip | ZIP compressed archive (8.8)

EXIF

XML

AppVersion: 12
HyperlinksChanged: No
SharedDoc: No
CharactersWithSpaces: 82
LinksUpToDate: No
Company: Grizli777
ScaleCrop: No
Paragraphs: 1
Lines: 1
DocSecurity: None
Application: Microsoft Office Word
Characters: 71
Words: 12
Pages: 1
TotalEditTime: 1 minute
Template: Normal.dotm
ModifyDate: 2024:12:12 10:41:00Z
CreateDate: 2024:12:12 10:40:00Z
RevisionNumber: 2
LastModifiedBy: 91974
Keywords: -

XMP

Description: -
Creator: 91974
Subject: -
Title: -

ZIP

ZipFileName: [Content_Types].xml
ZipUncompressedSize: 1460
ZipCompressedSize: 365
ZipCRC: 0x7fcf3406
ZipModifyDate: 2024:12:12 17:20:16
ZipCompression: Deflated
ZipBitFlag: 0x0002
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winword.exe ai.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3040"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n C:\Users\admin\AppData\Local\Temp\RN001005049.docx /o ""C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
16.0.16026.20146
Modules
Images
c:\program files\microsoft office\root\office16\winword.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
4540"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exe" "66E1AFDF-FF8E-4922-BC7B-2429E147FA13" "9105BA00-CCF0-4E4D-990B-B348BFAA92F9" "3040"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exeWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Artificial Intelligence (AI) Host for the Microsoft® Windows® Operating System and Platform x64.
Version:
0.12.2.0
Modules
Images
c:\program files\microsoft office\root\vfs\programfilescommonx64\microsoft shared\office16\ai.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\common files\microsoft shared\clicktorun\appvisvsubsystems64.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
13 113
Read events
12 928
Write events
164
Delete events
21

Modification events

(PID) Process:(3040) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\ClientTelemetry\Sampling
Operation:writeName:0
Value:
017012000000001000B24E9A3E02000000000000000600000000000000
(PID) Process:(3040) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\CrashPersistence\WINWORD\3040
Operation:writeName:0
Value:
0B0E10D5F3333899112341A128465608832ED3230046AAD89EC9E0B6D3ED016A04102400449A7D64B29D01008500A907556E6B6E6F776EC906022222CA0DC2190000C91003783634C511E017D2120B770069006E0077006F00720064002E00650078006500C51620C517808004C91808323231322D44656300
(PID) Process:(3040) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:en-US
Value:
2
(PID) Process:(3040) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:de-de
Value:
2
(PID) Process:(3040) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:fr-fr
Value:
2
(PID) Process:(3040) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:es-es
Value:
2
(PID) Process:(3040) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:it-it
Value:
2
(PID) Process:(3040) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:ja-jp
Value:
2
(PID) Process:(3040) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:ko-kr
Value:
2
(PID) Process:(3040) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:pt-br
Value:
2
Executable files
14
Suspicious files
137
Text files
37
Unknown types
5

Dropped files

PID
Process
Filename
Type
3040WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntities.bintext
MD5:CC90D669144261B198DEAD45AA266572
SHA256:89C701EEFF939A44F28921FD85365ECD87041935DCD0FE0BAF04957DA12C9899
3040WINWORD.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04binary
MD5:CBED3197CF8E14C2A4A39E17ADFF2A57
SHA256:77EA5F3F4E4B13CEDC78BE554CE75EB05DE45F06137570665F75289CA8D18E54
3040WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntitiesUpdated.bintext
MD5:CC3EC4A7489D02D2BED8B55FCE7AB36F
SHA256:5CB9280F5B658E42F78419572473ADC1DDE11F22114DF5D7735A8D0F972D997D
3040WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\5C7112ED-2F4E-4772-83FC-DCE715E8BF8Exml
MD5:24F34855AEAB5BEF969F186561257D2B
SHA256:25ED2778CE9E72DAD1C10482993C957DF61CABCF18750668482EACADB740B865
3040WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\ResourceInfoCache\07fc2a8c43a1d1f16572d21e959a4847e306edae.tempbinary
MD5:53157862BB5244ED0084F4BBE4A62A21
SHA256:09E555BE37CD1427F0B46367A6EE91F717C9CAB6070AB5C9096092FEF450505D
3040WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbresbinary
MD5:FFB7BF1D32679DEB2205AE6488E76F23
SHA256:9F6A98139F2163C923F707C330A57CF6D576F63105FFF1EE3F1E8E0B6D943ADA
3040WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\ResourceInfoCache\data.jsonbinary
MD5:53157862BB5244ED0084F4BBE4A62A21
SHA256:09E555BE37CD1427F0B46367A6EE91F717C9CAB6070AB5C9096092FEF450505D
3040WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmbinary
MD5:47C8D438FCC31507C3BE6066D1A7111F
SHA256:738CAEAD3C1B3B74F4F3500D6DEA73CF3C2251F8EB2F06516EF5AA5729BA2D01
3040WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$001005049.docxbinary
MD5:286EFB4991E0775919A206D787AA4841
SHA256:1093558B0B000AA9E3EB7452FEBD26A56FA65323A58218BFE2BFE9595B2B132C
3040WINWORD.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\87063374136EEC47E933C8519BBDFF7Fbinary
MD5:6946168CA4B9693D0E60A6C33D4F1429
SHA256:3FB9D03A8B35D14CE651E8C312AAA956C3FF78761F37E621D64692A98B0622F6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
23
TCP/UDP connections
92
DNS requests
35
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3040
WINWORD.EXE
GET
200
104.18.38.233:80
http://ocsp.sectigo.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRDC9IOTxN6GmyRjyTl2n4yTUczyAQUjYxexFStiuF36Zv5mwXhuAGNYeECEHdj953KEba36aTSnQ7XHnA%3D
unknown
whitelisted
3040
WINWORD.EXE
HEAD
200
87.106.188.164:80
http://87.106.188.164/2322/ecc/verynicepeoplesthinkingeverythinggoodforentiretimeperfect________withgreatnicecakewhicheatsweetkissingtobefine____verygoodpeoplesaroundtheworldwithnicepeoples.doc
unknown
3040
WINWORD.EXE
HEAD
200
87.106.188.164:80
http://87.106.188.164/2322/ecc/verynicepeoplesthinkingeverythinggoodforentiretimeperfect________withgreatnicecakewhicheatsweetkissingtobefine____verygoodpeoplesaroundtheworldwithnicepeoples.doc
unknown
132
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
132
svchost.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
3040
WINWORD.EXE
GET
200
87.106.188.164:80
http://87.106.188.164/2322/ecc/verynicepeoplesthinkingeverythinggoodforentiretimeperfect________withgreatnicecakewhicheatsweetkissingtobefine____verygoodpeoplesaroundtheworldwithnicepeoples.doc
unknown
3040
WINWORD.EXE
GET
200
2.16.164.106:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
3040
WINWORD.EXE
GET
200
104.18.38.233:80
http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m%2FWqorSs9UgOHYm8Cd8rIDZssCEH1bUSa0droR23QWC7xTDac%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
132
svchost.exe
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
132
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
192.168.100.255:138
whitelisted
52.109.28.46:443
officeclient.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
GB
whitelisted
104.126.37.171:443
www.bing.com
Akamai International B.V.
DE
whitelisted
52.113.194.132:443
ecs.office.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 23.53.40.178
  • 23.53.40.176
  • 2.16.164.106
  • 2.16.164.49
whitelisted
google.com
  • 142.250.186.46
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 88.221.169.152
whitelisted
officeclient.microsoft.com
  • 52.109.28.46
whitelisted
www.bing.com
  • 104.126.37.171
  • 104.126.37.162
  • 104.126.37.155
  • 104.126.37.145
  • 104.126.37.130
  • 104.126.37.139
  • 104.126.37.123
whitelisted
ecs.office.com
  • 52.113.194.132
whitelisted
roaming.officeapps.live.com
  • 52.109.68.129
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
omex.cdn.office.net
  • 2.19.198.58
  • 23.32.238.120
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET INFO Dotted Quad Host DOC Request
Potentially Bad Traffic
ET INFO Dotted Quad Host DOC Request
Potentially Bad Traffic
ET HUNTING Microsoft Office User-Agent Requesting A Doc File
Potentially Bad Traffic
ET INFO Dotted Quad Host DOC Request
Misc activity
ET USER_AGENTS Microsoft Office Existence Discovery User-Agent
Process
Message
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.