File name:

test.xlsm

Full analysis: https://app.any.run/tasks/63b1f33b-4986-4510-875c-5d221532c049
Verdict: Malicious activity
Analysis date: January 09, 2024, 08:30:14
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
Indicators:
MIME: application/vnd.openxmlformats-officedocument.spreadsheetml.sheet
File info: Microsoft Excel 2007+
MD5:

379C50433AF2AFFA68E6756AAD1D3AEA

SHA1:

C6BF8B58D6A9E7550AD44860D8C5B0698362F04A

SHA256:

2CE4722ABB1A34A93957A404FE5110CB648AC42D70F55E8824E15CC6C92A58BE

SSDEEP:

6144:BJxnIMPSx8otprlhXpBOLdPD6H9vxX0sEegthZzl102I/IaiIQD6eshvzoNAx:BLIfrfpuPGH9JXzqhdl1wIgI6vhLoNo

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Unusual execution from MS Office

      • EXCEL.EXE (PID: 2036)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Reads mouse settings

      • EXCEL.EXE (PID: 2036)
    • Checks supported languages

      • DW20.EXE (PID: 696)
    • Creates files or folders in the user directory

      • DWWIN.EXE (PID: 2128)
    • Manual execution by a user

      • EXCEL.EXE (PID: 2312)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.xlam | Excel Macro-enabled Open XML add-in (42.4)
.xlsm | Excel Microsoft Office Open XML Format document (with Macro) (29.2)
.xlsx | Excel Microsoft Office Open XML Format document (17.3)
.zip | Open Packaging Conventions container (8.9)
.zip | ZIP compressed archive (2)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0006
ZipCompression: Deflated
ZipModifyDate: 1980:01:01 00:00:00
ZipCRC: 0x819fd8b5
ZipCompressedSize: 512
ZipUncompressedSize: 2872
ZipFileName: [Content_Types].xml

XML

Application: Microsoft Excel
DocSecurity: None
ScaleCrop: No
HeadingPairs:
  • Fogli di lavoro
  • 6
TitlesOfParts:
  • ISO 8692 Info
  • Calibration
  • Algaltoxkit results sheet
  • Algae Regtox
  • License
  • DEF_PAR
Company: INERIS
LinksUpToDate: No
SharedDoc: No
HyperlinksChanged: No
AppVersion: 15.03
LastModifiedBy: Tecnico
CreateDate: 2000:07:18 20:02:42Z
ModifyDate: 2018:06:20 10:32:51Z

XMP

Title: REGTOX
Subject: Calculation of toxicity parameters
Creator: Eric Vindimian
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start excel.exe no specs dw20.exe no specs dwwin.exe no specs excel.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
696"C:\PROGRA~1\COMMON~1\MICROS~1\DW\DW20.EXE" -x -s 1408C:\Program Files\Common Files\microsoft shared\DW\DW20.EXEEXCEL.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Application Error Reporting
Exit code:
0
Version:
14.0.6015.1000
Modules
Images
c:\program files\common files\microsoft shared\dw\dw20.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
2036"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /ddeC:\Program Files\Microsoft Office\Office14\EXCEL.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\excel.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2128C:\Windows\system32\dwwin.exe -x -s 1408C:\Windows\System32\DWWIN.EXEDW20.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Watson Client
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dwwin.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2312"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /ddeC:\Program Files\Microsoft Office\Office14\EXCEL.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\excel.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
Total events
4 550
Read events
4 441
Write events
71
Delete events
38

Modification events

(PID) Process:(2036) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
On
(PID) Process:(2036) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1041
Value:
On
(PID) Process:(2036) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1046
Value:
On
(PID) Process:(2036) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1036
Value:
On
(PID) Process:(2036) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1031
Value:
On
(PID) Process:(2036) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1040
Value:
On
(PID) Process:(2036) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1049
Value:
On
(PID) Process:(2036) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:3082
Value:
On
(PID) Process:(2036) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1042
Value:
On
(PID) Process:(2036) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1055
Value:
On
Executable files
1
Suspicious files
20
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
2036EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVRF9F1.tmp.cvr
MD5:
SHA256:
2128DWWIN.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_EXCEL.EXE_1221f59ab485ffbc329453c839a59232576bd3ad_085f0546\Report.wer
MD5:
SHA256:
2312EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVR1813.tmp.cvr
MD5:
SHA256:
2036EXCEL.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\test.xlsm.LNKbinary
MD5:797974F895DF6C471E0B74D73FD9F76E
SHA256:70F226E2B4E1D106DA10F0FC55F383088A000254C3D8155731DABA3A25DEB26E
2036EXCEL.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dattext
MD5:5173705812CDE6C2337AF0F96397F43E
SHA256:F43AD82FEC80A3294D7F807EE2D0F74ED6CF93F085A54210CBDDDB2E10F70C0F
2036EXCEL.EXEC:\Users\admin\AppData\Local\Temp\~DF01AD072AFD704CB6.TMPdocument
MD5:802548B191279C36013772389B9ABB36
SHA256:2CEC7CDADAB1F521AE26B13916B8E286233B67AB39ED3A9C67956E5A8240F9AB
2036EXCEL.EXEC:\Users\admin\AppData\Roaming\Microsoft\Forms\EXCEL.boxbinary
MD5:2D33F008646685792B38C09516CB15B7
SHA256:5CC4A8AF254D5E44F92EECC344F092887D901753B6BBB6C2DFC3F0CBD8AA9933
2036EXCEL.EXEC:\Users\admin\AppData\Local\Temp\VBE\RefEdit.exdbinary
MD5:223B82A587DDA128E0707F7EC90F2F0A
SHA256:AE1A2DF5F47967609924C1E2153B96F876B3B2F84AF0CB4950ACB970D5B16D4B
2036EXCEL.EXEC:\Users\admin\Desktop\~$test.xlsm.xlambinary
MD5:21E5D64E6DD2C94C577A61B0A25DE7A4
SHA256:657F0604A7C1F6CFDC4E8A224F59BD6E1900A4A4DD8B3F61A20F67DEBE41F209
2312EXCEL.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\test.xlsm.LNKbinary
MD5:7411929E54054E1EC90164FB1183532C
SHA256:E8C5355907EE80D418360198F054604ED937087F6B468CAF3BFF2895B4344100
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown

DNS requests

No data

Threats

No threats detected
No debug info