| File name: | c16b38ae42a9c32ba01ccd93bd90efceb4df05adb997b179758844e2d7d9b8c1_nd.docx |
| Full analysis: | https://app.any.run/tasks/cc5c75c1-d75b-4e03-9dec-ac4fc18127f4 |
| Verdict: | Malicious activity |
| Analysis date: | May 27, 2025, 17:17:48 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Indicators: | |
| MIME: | application/vnd.openxmlformats-officedocument.wordprocessingml.document |
| File info: | Microsoft Word 2007+ |
| MD5: | 0FA0FC8E801D4228A50EC62E2F4D7396 |
| SHA1: | F263339AB10D01DC983CEDBB82FA84E9BF5BAF79 |
| SHA256: | C16B38AE42A9C32BA01CCD93BD90EFCEB4DF05ADB997B179758844E2D7D9B8C1 |
| SSDEEP: | 192:srHLtWGPxJl89xm8DWAB1DzCb/L/hlzhP2FOiyNugVlBk460lSyW:OLYC+xmoB1DIrhhMgVD60HW |
| .docx | | | Word Microsoft Office Open XML Format document (52.2) |
|---|---|---|
| .zip | | | Open Packaging Conventions container (38.8) |
| .zip | | | ZIP compressed archive (8.8) |
| ZipRequiredVersion: | 20 |
|---|---|
| ZipBitFlag: | 0x0006 |
| ZipCompression: | Deflated |
| ZipModifyDate: | 1980:01:01 00:00:00 |
| ZipCRC: | 0x3795fcdd |
| ZipCompressedSize: | 358 |
| ZipUncompressedSize: | 1312 |
| ZipFileName: | [Content_Types].xml |
| Template: | Normal.dotm |
|---|---|
| TotalEditTime: | - |
| Pages: | 1 |
| Words: | - |
| Characters: | 5 |
| Application: | Microsoft Office Word |
| DocSecurity: | None |
| Lines: | 1 |
| Paragraphs: | 1 |
| ScaleCrop: | No |
| Company: | - |
| LinksUpToDate: | No |
| CharactersWithSpaces: | 5 |
| SharedDoc: | No |
| HyperlinksChanged: | No |
| AppVersion: | 12 |
| LastModifiedBy: | syscore |
| RevisionNumber: | 2 |
| CreateDate: | 2018:03:07 09:39:00Z |
| ModifyDate: | 2021:04:18 06:00:00Z |
| Creator: | HP 15 |
|---|
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1276 | "C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exe" "E41F522C-5D41-4574-8CC6-8FE9256D6F28" "AC70D56B-A1C4-4105-A989-2148E528E398" "4652" | C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exe | — | WINWORD.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Artificial Intelligence (AI) Host for the Microsoft® Windows® Operating System and Platform x64. Version: 0.12.2.0 Modules
| |||||||||||||||
| 2088 | C:\WINDOWS\system32\SppExtComObj.exe -Embedding | C:\Windows\System32\SppExtComObj.Exe | — | svchost.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: KMS Connection Broker Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2196 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4652 | "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n C:\Users\admin\AppData\Local\Temp\c16b38ae42a9c32ba01ccd93bd90efceb4df05adb997b179758844e2d7d9b8c1_nd.docx /o "" | C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 16.0.16026.20146 Modules
| |||||||||||||||
| 6872 | "C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEvent | C:\Windows\System32\slui.exe | — | SppExtComObj.Exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (4652) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\ClientTelemetry\Sampling |
| Operation: | write | Name: | 0 |
Value: 017012000000001000B24E9A3E02000000000000000600000000000000 | |||
| (PID) Process: | (4652) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\CrashPersistence\WINWORD\4652 |
| Operation: | write | Name: | 0 |
Value: 0B0E100B1ABA97978C7B48A007D992AE981EFB230046EFC6FBD1B4E5F3ED016A04102400449A7D64B29D01008500A907556E6B6E6F776EC906022222CA0DC2190000C91003783634C511AC24D2120B770069006E0077006F00720064002E00650078006500C51620C517808004C91808323231322D44656300 | |||
| (PID) Process: | (4652) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages |
| Operation: | write | Name: | en-US |
Value: 2 | |||
| (PID) Process: | (4652) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages |
| Operation: | write | Name: | de-de |
Value: 2 | |||
| (PID) Process: | (4652) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages |
| Operation: | write | Name: | fr-fr |
Value: 2 | |||
| (PID) Process: | (4652) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages |
| Operation: | write | Name: | es-es |
Value: 2 | |||
| (PID) Process: | (4652) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages |
| Operation: | write | Name: | it-it |
Value: 2 | |||
| (PID) Process: | (4652) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages |
| Operation: | write | Name: | ja-jp |
Value: 2 | |||
| (PID) Process: | (4652) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages |
| Operation: | write | Name: | ko-kr |
Value: 2 | |||
| (PID) Process: | (4652) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages |
| Operation: | write | Name: | pt-br |
Value: 2 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 4652 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:26039DD6A5925DF4353AD794D9FE3333 | SHA256:ECF88D66A89BEB7011248C0D9533669EA0F05232E82164CE2001AC1B340B8F78 | |||
| 4652 | WINWORD.EXE | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187 | der | |
MD5:281ADA470FDA659B50E164E6BBAF4029 | SHA256:4E825EA872265EF47039E6C78B3F1BFB4DEA4B42D6421F175D3B62C9BC92E2A0 | |||
| 4652 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntities.bin | text | |
MD5:CC90D669144261B198DEAD45AA266572 | SHA256:89C701EEFF939A44F28921FD85365ECD87041935DCD0FE0BAF04957DA12C9899 | |||
| 4652 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\81ADCA86-C33B-477A-862D-2B80217B38EE | xml | |
MD5:E5B071044235CA21AEA2DFF0913E0DDE | SHA256:13AD74F53E06279BC9174E020E3AC5840E9C51DAFA19F4D509643B56A36C67AF | |||
| 4652 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntitiesUpdated.bin | text | |
MD5:6A46A4DD706F1695C82ACE2D96D82973 | SHA256:B4D856DF11F8A912E8588B11D0E9689026B7E12415515E6888D134EF8E27A0D3 | |||
| 4652 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$6b38ae42a9c32ba01ccd93bd90efceb4df05adb997b179758844e2d7d9b8c1_nd.docx | pgc | |
MD5:1785B53D99EDC1444102A1EA5704468D | SHA256:95682D8E7F54F24B9C6533D22C08CBA60397DE43CD3C0CC24B15E5D3E9032B99 | |||
| 4652 | WINWORD.EXE | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187 | binary | |
MD5:9D6F3D6BAAF869EEFDA0340E5E7A8D55 | SHA256:E596B9B4CFD74009E6EB3E7E8D344F6DD1A16FFA489C2F53168C18566CFECB29 | |||
| 4652 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\56a61aeb75d8f5be186c26607f4bb213abe7c5ec.tbres | binary | |
MD5:CC42D202D73F9BF1E7EDCB1CFD2FAFAE | SHA256:8F64D1865BEC02A5CDF74F4968164BC5420837A73ACE9A661B9183B7BC4CABD4 | |||
| 4652 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Office\16.0\ResourceInfoCache\data.json | binary | |
MD5:5E20DB76A871483025FFEF269D6FC5EF | SHA256:B006EC0D3F481552E021B91DE1321912B7B1E23DA830383974045FE8FE874422 | |||
| 4652 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Office\16.0\ResourceInfoCache\07fc2a8c43a1d1f16572d21e959a4847e306edae.temp | binary | |
MD5:5E20DB76A871483025FFEF269D6FC5EF | SHA256:B006EC0D3F481552E021B91DE1321912B7B1E23DA830383974045FE8FE874422 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5496 | MoUsoCoreWorker.exe | GET | 200 | 23.53.40.176:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | GET | 200 | 2.16.253.202:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
4652 | WINWORD.EXE | OPTIONS | 200 | 89.33.14.21:80 | http://doctor.hopto.org/torotoro/ | unknown | — | — | unknown |
4652 | WINWORD.EXE | GET | 200 | 23.63.118.230:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D | unknown | — | — | whitelisted |
4652 | WINWORD.EXE | OPTIONS | 200 | 89.33.14.21:80 | http://doctor.hopto.org/torotoro/ | unknown | — | — | unknown |
4652 | WINWORD.EXE | HEAD | 200 | 89.33.14.21:80 | http://doctor.hopto.org/torotoro/nd.dot | unknown | — | — | unknown |
4652 | WINWORD.EXE | GET | 404 | 89.33.14.21:80 | http://doctor.hopto.org/torotoro/nd.dot | unknown | — | — | unknown |
6544 | svchost.exe | GET | 200 | 23.63.118.230:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
4652 | WINWORD.EXE | GET | 200 | 2.16.168.114:80 | http://crl.microsoft.com/pki/crl/products/MicCodSigPCA_08-31-2010.crl | unknown | — | — | whitelisted |
4652 | WINWORD.EXE | GET | 200 | 2.16.168.114:80 | http://crl.microsoft.com/pki/crl/products/microsoftrootcert.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 192.168.100.255:137 | — | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | 23.53.40.176:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5496 | MoUsoCoreWorker.exe | 2.16.253.202:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4652 | WINWORD.EXE | 52.109.89.18:443 | officeclient.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4652 | WINWORD.EXE | 52.123.129.14:443 | ecs.office.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
3216 | svchost.exe | 172.211.123.250:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
4652 | WINWORD.EXE | 52.109.76.243:443 | roaming.officeapps.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4652 | WINWORD.EXE | 23.63.118.230:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
officeclient.microsoft.com |
| whitelisted |
ecs.office.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
roaming.officeapps.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
omex.cdn.office.net |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2196 | svchost.exe | Potentially Bad Traffic | ET DYN_DNS DNS Query to DynDNS Domain *.hopto .org |
4652 | WINWORD.EXE | Potentially Bad Traffic | ET INFO HTTP Connection To DDNS Domain Hopto.org |
4652 | WINWORD.EXE | Misc activity | ET HUNTING Possible Malicious Document Request to NOIP DynDNS Domain |
4652 | WINWORD.EXE | Potentially Bad Traffic | ET INFO HTTP Connection To DDNS Domain Hopto.org |
4652 | WINWORD.EXE | Potentially Bad Traffic | ET DYN_DNS DYNAMIC_DNS HTTP Request to a *.hopto .org Domain |
4652 | WINWORD.EXE | Potentially Bad Traffic | ET DYN_DNS DYNAMIC_DNS HTTP Request to a *.hopto .org Domain |
4652 | WINWORD.EXE | Potentially Bad Traffic | ET INFO HTTP Connection To DDNS Domain Hopto.org |
4652 | WINWORD.EXE | Potentially Bad Traffic | ET INFO HTTP Connection To DDNS Domain Hopto.org |
4652 | WINWORD.EXE | Potentially Bad Traffic | ET DYN_DNS DYNAMIC_DNS HTTP Request to a *.hopto .org Domain |
4652 | WINWORD.EXE | Potentially Bad Traffic | ET DYN_DNS DYNAMIC_DNS HTTP Request to a *.hopto .org Domain |