LAB52 identified a backdoor that is using OneDrive to load a malicious version of sspicli.dll to drop a VBA backdoor and use Outlook to execute the macro.
Analyzing NotDoor: Inside APT28’s Expanding Arsenal
A threat actor can craft a malicious version of SSPICLI.dll, write the malicious dll to the same directory as OneDrive.exe and execute a malicious payload.
To test this, I created a benign DLL that could possibly be used for Detection Engineering testing. When loaded, it displays the following popup:

You can use Dependency Walker to see that OneDrive loads sspicli.dll

%LOCALAPPDATA%\\Microsoft\\OneDrive\\ or %ProgramFiles%\\Microsoft OneDrive\\