File name:

Salaries Updated - August 2024.xll

Full analysis: https://app.any.run/tasks/1f06146a-4a22-4fc4-bb38-1af102963610
Verdict: Malicious activity
Analysis date: August 09, 2024, 13:53:21
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32+ executable (DLL) (GUI) x86-64, for MS Windows
MD5:

C6A48A45B6034BB4F5F8913E9E9C2FBB

SHA1:

3DED49022875A8B92B5B464B0357BE703E1618A0

SHA256:

2A1C6CACA9D22EED2532F14705DB9AECF99EC2AAB95079EDDCF9E7AEB0034A24

SSDEEP:

6144:T85Jn5LmkxE6e7v157S3EZufNvk+Vpl0rt0kcec0bHK6OID:T85Jn5yE88EKs+VplMSec0DK6Om

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Drops the executable file immediately after the start

      • EXCEL.EXE (PID: 6416)
    • Opens a file (MACROS)

      • EXCEL.EXE (PID: 6416)
    • Process drops legitimate windows executable

      • EXCEL.EXE (PID: 6416)
    • Sets XML DOM element text (SCRIPT)

      • splwow64.exe (PID: 3032)
    • Reads data from a file (MACROS)

      • EXCEL.EXE (PID: 6416)
    • XLL Add-In module is loaded

      • EXCEL.EXE (PID: 6416)
  • INFO

    • Reads security settings of Internet Explorer

      • splwow64.exe (PID: 3032)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2019:12:08 01:28:30+00:00
ImageFileCharacteristics: Executable, Large address aware, DLL
PEType: PE32+
LinkerVersion: 14.39
CodeSize: 255488
InitializedDataSize: 123904
UninitializedDataSize: -
EntryPoint: 0xf928
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 15.0.4420.0
ProductVersionNumber: 16.0.12325.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Unknown (0)
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: Microsoft Corporation
FileDescription: Microsoft Office component
FileVersion: 15.0.4420.0
InternalName: ieawsdc.dll
LegalCopyright: © 2018 Microsoft Corporation. All rights reserved.
LegalTrademarks1: All Rights Reserved
LegalTrademarks2: All Rights Reserved
OriginalFileName: ieawsdc.dll
ProductName: Microsoft Office Template and Media Control
ProductVersion: 16.0.12325.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
143
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start excel.exe splwow64.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3032C:\WINDOWS\splwow64.exe 8192C:\Windows\splwow64.exeEXCEL.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Print driver host for applications
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\splwow64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6416"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" -xlls "C:\Users\admin\Downloads\Salaries Updated - August 2024.xll"C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Version:
16.0.16026.20146
Modules
Images
c:\program files\microsoft office\root\office16\excel.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ole32.dll
c:\program files\common files\microsoft shared\clicktorun\appvisvsubsystems64.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\program files\common files\microsoft shared\clicktorun\c2r64.dll
Total events
8 760
Read events
8 349
Write events
381
Delete events
30

Modification events

(PID) Process:(6416) EXCEL.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\ClientTelemetry\Sampling
Operation:writeName:1
Value:
01D014000000001000B24E9A3E02000000000000000600000000000000
(PID) Process:(6416) EXCEL.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\CrashPersistence\EXCEL\6416
Operation:writeName:0
Value:
0B0E1019B51F03AF6D424DACD5DE4171C1F6E9230046FBA8E2AFB8CCBAED016A04102400449A7D64B29D01008500A907556E6B6E6F776EC906022222CA0DC2190000C91003783634C5119032D2120965007800630065006C002E00650078006500C51620C517808004C91808323231322D44656300
(PID) Process:(6416) EXCEL.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:en-US
Value:
2
(PID) Process:(6416) EXCEL.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:de-de
Value:
2
(PID) Process:(6416) EXCEL.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:fr-fr
Value:
2
(PID) Process:(6416) EXCEL.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:es-es
Value:
2
(PID) Process:(6416) EXCEL.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:it-it
Value:
2
(PID) Process:(6416) EXCEL.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:ja-jp
Value:
2
(PID) Process:(6416) EXCEL.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:ko-kr
Value:
2
(PID) Process:(6416) EXCEL.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:pt-br
Value:
2
Executable files
0
Suspicious files
10
Text files
9
Unknown types
1

Dropped files

PID
Process
Filename
Type
6416EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbresbinary
MD5:69438BDE4E56DBB9E54B42B813044E71
SHA256:7B3C531A6E041A01DB890651214CF1EAD1AF0600F80D3D2985B13EFC5B9DEA44
6416EXCEL.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04der
MD5:2C48D78B2AE297D1C4A77C26F8E3DA5C
SHA256:CEB8F54E3D4E734B242559100D8C2A7E7E749B35F2147EC6E42E65368783FA6C
6416EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\Personalization\Content\Anonymous\Insights.json.tmpbinary
MD5:1C2D398491AC927BE2919AA5B85C7E98
SHA256:0F8F1AB196AB47ACB335D8A336F18E9AA2CCD576B943A97F59C446175FAE8714
6416EXCEL.EXEC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\PK1XK7D5Y0GEME8DOYRL.tempbinary
MD5:E4A1661C2C886EBB688DEC494532431C
SHA256:B76875C50EF704DBBF7F02C982445971D1BBD61AEBE2E4B28DDC58A1D66317D5
6416EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\DTS\en-US{F1471EB0-69E1-4121-97F4-D4EAFED339D9}\{54D1702F-827B-4014-8201-353DF1ED8048}mt16400656.pngimage
MD5:0B4B576B60F444C6502461711E7432DB
SHA256:07F2B6E764FFBDD8D0FF28642B47417F27072E52BB581280D8C50261E01D4C96
6416EXCEL.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04binary
MD5:A5097228238157CE2A00270E92AF6B78
SHA256:C9B42E825689D1C92BF385FA5EF9876F198BA0E835852EB28798461113C4C923
6416EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\DTS\en-US{F1471EB0-69E1-4121-97F4-D4EAFED339D9}\{6A08C65E-E885-4730-8E09-F4B4B5A94CAE}mt10000137.pngimage
MD5:DE55D11D4C4071BB9F1B2A91487F41BE
SHA256:57733C40F13A9C7F44584AA52F0C1D1DB26C41C0AF73FD3EDD47C3288B85E892
6416EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\DTS\en-US{F1471EB0-69E1-4121-97F4-D4EAFED339D9}\{21E879C6-8DE0-4BFD-A244-A65FFAF3A0A2}mt45299826.pngimage
MD5:1A06FCC9279FE0FA76E1E74E2A26A747
SHA256:55704B4D08BC44CB39D7BE93D9C595ECA75D2F6EAA4ADE529754360427F2396E
6416EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\DTS\en-US{F1471EB0-69E1-4121-97F4-D4EAFED339D9}\{BA5C6C68-1374-43D7-B408-9474964B5B4F}mt11829122.pngimage
MD5:3EE6FB71B09A2ECADEEAC7C3B55E1382
SHA256:3A982A3B7E10EC50D2AF3A126277D48F41AE65756C7A5FDD5802049B5350704A
6416EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\DTS\en-US{F1471EB0-69E1-4121-97F4-D4EAFED339D9}\{949F82A0-A7FB-43E7-9743-1962AE53CA5E}mt67739505.pngimage
MD5:FE238D4D994149381553BA0A5CD17B17
SHA256:F25507CB3FAE7439117F05285EC6DE20A5A7356FAE74F5F935D31A63430598DA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
69
DNS requests
30
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4276
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
5336
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
2212
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
3700
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6416
EXCEL.EXE
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
whitelisted
5336
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
whitelisted
5336
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
876
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
1184
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2120
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
6416
EXCEL.EXE
52.109.89.18:443
officeclient.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
6416
EXCEL.EXE
52.113.194.132:443
ecs.office.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
876
svchost.exe
13.71.55.58:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IN
unknown
6416
EXCEL.EXE
52.111.240.11:443
messaging.lifecycle.office.com
MICROSOFT-CORP-MSN-AS-BLOCK
SG
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 13.71.55.58
  • 51.11.168.232
whitelisted
google.com
  • 216.58.206.78
whitelisted
officeclient.microsoft.com
  • 52.109.89.18
whitelisted
ecs.office.com
  • 52.113.194.132
whitelisted
messaging.lifecycle.office.com
  • 52.111.240.11
whitelisted
www.bing.com
  • 184.86.251.15
  • 184.86.251.11
  • 184.86.251.30
  • 184.86.251.7
  • 184.86.251.14
  • 184.86.251.26
  • 184.86.251.28
  • 184.86.251.9
  • 184.86.251.10
  • 2.23.209.176
  • 2.23.209.160
  • 2.23.209.142
  • 2.23.209.143
  • 2.23.209.154
  • 2.23.209.175
  • 2.23.209.149
  • 2.23.209.150
  • 2.23.209.158
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
client.wns.windows.com
  • 40.113.110.67
whitelisted
login.live.com
  • 20.190.159.2
  • 20.190.159.68
  • 20.190.159.75
  • 20.190.159.4
  • 40.126.31.73
  • 20.190.159.73
  • 20.190.159.0
  • 20.190.159.23
whitelisted
th.bing.com
  • 2.23.209.142
  • 2.23.209.130
  • 2.23.209.149
  • 2.23.209.189
  • 2.23.209.135
  • 2.23.209.140
  • 2.23.209.141
  • 2.23.209.133
  • 2.23.209.143
  • 2.23.209.154
  • 2.23.209.158
  • 2.23.209.179
  • 2.23.209.177
  • 2.23.209.160
  • 2.23.209.182
  • 2.23.209.156
  • 2.23.209.175
  • 2.23.209.176
whitelisted

Threats

No threats detected
No debug info