File name:

Bad Doc.dotm

Full analysis: https://app.any.run/tasks/9258bc70-4a8d-4973-bc22-04f9e1d85c9e
Verdict: Malicious activity
Analysis date: July 18, 2024, 13:54:19
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
macros
macros-on-open
Indicators:
MIME: application/vnd.openxmlformats-officedocument.wordprocessingml.document
File info: Microsoft Word 2007+
MD5:

B9B410894A1A0B0018176023A7F982CB

SHA1:

7A1A459AAB71AA1E035074AC2CE96DB2470A0EC6

SHA256:

D2B05DF24762CC5D0907221FBD30EB862560A4BA746BBD42513EE2830B974298

SSDEEP:

384:SeQMCsoelEwFyQweORo0rKRSGvShjfuSQ15xAuDu59MQT6hrBzi:p6pYOx+yhbC1EB9DT6NA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • The DLL Hijacking

      • OfficeClickToRun.exe (PID: 7072)
    • Scans artifacts that could help determine the target

      • OfficeClickToRun.exe (PID: 7072)
  • SUSPICIOUS

    • Executes as Windows Service

      • OfficeClickToRun.exe (PID: 7072)
  • INFO

    • Reads the computer name

      • OfficeClickToRun.exe (PID: 7072)
    • Process checks computer location settings

      • OfficeClickToRun.exe (PID: 7072)
    • Checks supported languages

      • OfficeClickToRun.exe (PID: 7072)
    • Reads Microsoft Office registry keys

      • OfficeClickToRun.exe (PID: 7072)
    • Reads the machine GUID from the registry

      • OfficeClickToRun.exe (PID: 7072)
    • Checks proxy server information

      • OfficeClickToRun.exe (PID: 7072)
    • Reads the software policy settings

      • OfficeClickToRun.exe (PID: 7072)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.docm | Word Microsoft Office Open XML Format document (with Macro) (53.6)
.docx | Word Microsoft Office Open XML Format document (24.2)
.zip | Open Packaging Conventions container (18)
.zip | ZIP compressed archive (4.1)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0006
ZipCompression: Deflated
ZipModifyDate: 1980:01:01 00:00:00
ZipCRC: 0x7cbe937c
ZipCompressedSize: 396
ZipUncompressedSize: 1461
ZipFileName: [Content_Types].xml

XMP

Title: -
Subject: -
Creator: Brandon Wilson
Description: -

XML

Keywords: -
LastModifiedBy: Brandon Wilson
RevisionNumber: 4
CreateDate: 2024:07:18 13:49:00Z
ModifyDate: 2024:07:18 13:51:00Z
Template: Bad%20Doc
TotalEditTime: 3 minutes
Pages: 1
Words: 9
Characters: 52
Application: Microsoft Office Word
DocSecurity: None
Lines: 1
Paragraphs: 1
ScaleCrop: No
Company: -
LinksUpToDate: No
CharactersWithSpaces: 60
SharedDoc: No
HyperlinksChanged: No
AppVersion: 16
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
122
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winword.exe officeclicktorun.exe ai.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
884C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6188"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exe" "6BFF9558-57B0-4B30-B1FF-C02F09258705" "683F6143-8EDD-4B43-9F77-AA370674581C" "8140"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exeWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Artificial Intelligence (AI) Host for the Microsoft® Windows® Operating System and Platform x64.
Version:
0.12.2.0
Modules
Images
c:\program files\microsoft office\root\vfs\programfilescommonx64\microsoft shared\office16\ai.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files\common files\microsoft shared\clicktorun\appvisvsubsystems64.dll
c:\windows\system32\advapi32.dll
c:\program files\common files\microsoft shared\clicktorun\c2r64.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
7072"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /serviceC:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Office Click-to-Run (SxS)
Version:
16.0.16026.20140
Modules
Images
c:\program files\common files\microsoft shared\clicktorun\officeclicktorun.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\gdi32.dll
8140"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\Bad Doc.dotm.docm" /o ""C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
16.0.16026.20146
Modules
Images
c:\program files\microsoft office\root\office16\winword.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
10 806
Read events
10 676
Write events
114
Delete events
16

Modification events

(PID) Process:(7072) OfficeClickToRun.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:en-US
Value:
2
(PID) Process:(7072) OfficeClickToRun.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:en-US
Value:
1
(PID) Process:(7072) OfficeClickToRun.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\RuntimeExceptionHelperModules
Operation:writeName:C:\Program Files\Common Files\Microsoft Shared\ClickToRun\c2r64werhandler.dll
Value:
0
(PID) Process:(7072) OfficeClickToRun.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun
Operation:writeName:MachineMetadataSentTime
Value:
13365784485934
(PID) Process:(7072) OfficeClickToRun.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\Office\16.0\Common
Operation:writeName:SessionId
Value:
40F917654866F84DA358390C61EC3DD2
(PID) Process:(7072) OfficeClickToRun.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(7072) OfficeClickToRun.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(7072) OfficeClickToRun.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(7072) OfficeClickToRun.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(8140) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\ClientTelemetry\Sampling
Operation:writeName:0
Value:
017012000000001000B24E9A3E01000000000000000500000000000000
Executable files
0
Suspicious files
10
Text files
0
Unknown types
1

Dropped files

PID
Process
Filename
Type
8140WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{B28875D1-5E95-4507-AFE7-EB888D9B83D6}.tmpsmt
MD5:830FBF83999E052538EAF156AB6ECB17
SHA256:D5098A2CEAE815DB29CD53C76F85240C95DC4D2E3FEDDD71D628617064C29869
8140WINWORD.EXEC:\Users\admin\AppData\Local\Temp\3AA1D796.tmpbinary
MD5:1F6D4327255B91B6C60FBCF2ADEABFAF
SHA256:B70C034122191D198A79012AD30649A7E36A93E3D32EFEFE3FF33A31E30422BE
8140WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\Floodgate\Word.Settings.jsonbinary
MD5:E4E83F8123E9740B8AA3C3DFA77C1C04
SHA256:6034F27B0823B2A6A76FE296E851939FD05324D0AF9D55F249C79AF118B0EB31
8140WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\Features\6FeatureCache.txtbinary
MD5:1F6D4327255B91B6C60FBCF2ADEABFAF
SHA256:B70C034122191D198A79012AD30649A7E36A93E3D32EFEFE3FF33A31E30422BE
8140WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$d Doc.dotm.docmabr
MD5:CC7E803033A83C964216F2D7835AAE27
SHA256:E902BD3A58F01516C1DA1823F3D8BD7396525E41F13B263180528E21195F2357
8140WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmbinary
MD5:F778814A47071519E48931E8254361A6
SHA256:8E5046BC4B43A2CF30C3F042911E999B443F774C53FA7F8574847B88B2001EA3
8140WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\Floodgate\Word.CampaignStates.jsonbinary
MD5:F1B59332B953B3C99B3C95A44249C0D2
SHA256:138E49660D259061D8152137ABD8829ACDFB78B69179890BEB489FE3FFE23E0C
8140WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\Floodgate\Word.GovernedChannelStates.jsonbinary
MD5:F5A0FBF6DB5254A1E882E09C78B6A0EB
SHA256:C3338F7C5CD465788643D4A5D5EB920A8411DBF2A1C9CDC8EFA361D277E3AC49
8140WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\Floodgate\Word.SurveyHistoryStats.jsonbinary
MD5:6CA4960355E4951C72AA5F6364E459D5
SHA256:88301F0B7E96132A2699A8BCE47D120855C7F0A37054540019E3204D6BCBABA3
8140WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\Floodgate\Word.SurveyEventActivityStats.jsonbinary
MD5:6CA4960355E4951C72AA5F6364E459D5
SHA256:88301F0B7E96132A2699A8BCE47D120855C7F0A37054540019E3204D6BCBABA3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
25
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5628
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4716
svchost.exe
20.190.159.64:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7856
svchost.exe
52.230.59.222:443
MICROSOFT-CORP-MSN-AS-BLOCK
SG
unknown
4
System
192.168.100.255:138
whitelisted
4032
svchost.exe
239.255.255.250:1900
whitelisted
7484
backgroundTaskHost.exe
20.223.35.26:443
fd.api.iris.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2760
svchost.exe
40.113.110.67:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5628
SearchApp.exe
2.23.209.149:443
www.bing.com
Akamai International B.V.
GB
unknown
5628
SearchApp.exe
131.253.33.254:443
a-ring-fallback.msedge.net
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
5628
SearchApp.exe
13.107.246.254:443
t-ring-s.msedge.net
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown

DNS requests

Domain
IP
Reputation
login.live.com
  • 20.190.159.64
  • 20.190.159.23
  • 20.190.159.73
  • 20.190.159.2
  • 40.126.31.67
  • 20.190.159.4
  • 40.126.31.73
  • 20.190.159.71
whitelisted
google.com
  • 216.58.212.174
whitelisted
fd.api.iris.microsoft.com
  • 20.223.35.26
whitelisted
www.bing.com
  • 2.23.209.149
  • 2.23.209.156
  • 2.23.209.171
  • 2.23.209.150
  • 2.23.209.154
  • 2.23.209.166
  • 2.23.209.162
  • 2.23.209.160
  • 2.23.209.158
  • 92.123.104.21
  • 92.123.104.16
  • 92.123.104.20
  • 92.123.104.18
  • 92.123.104.26
  • 92.123.104.17
  • 92.123.104.22
  • 92.123.104.27
  • 92.123.104.19
whitelisted
a-ring-fallback.msedge.net
  • 131.253.33.254
unknown
t-ring-s.msedge.net
  • 13.107.246.254
unknown
c-ring.msedge.net
  • 13.107.4.254
unknown
ocsp.digicert.com
  • 192.229.221.95
whitelisted
fp.msedge.net
  • 204.79.197.222
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted

Threats

No threats detected
No debug info