File name:

563900-Copy of Copmuter-IT-Service-Catalog-Inventory-Template.xls

Full analysis: https://app.any.run/tasks/0d28c226-31fe-4954-94a1-05d05e9e41c5
Verdict: No threats detected
Analysis date: April 11, 2019, 07:52:35
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
Indicators:
MIME: application/vnd.ms-excel
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Title: IT Service Catalog Template, Subject: IT Service Management, Author: ITILworx, Comments: Copyright @ 2004 ITILworxVersion 1.12, Last Saved By: Windows User, Name of Creating Application: Microsoft Excel, Last Printed: Sat Sep 4 20:34:50 2004, Create Time/Date: Wed Aug 14 23:07:56 2002, Last Saved Time/Date: Thu Mar 28 10:01:40 2019, Security: 0
MD5:

91C924E92C2F7397AE2BCA066D15B2ED

SHA1:

63595CF9FCEE3961248FDB3A123A7014E297EFCD

SHA256:

6B63D2C8A136FD8BAEA8D77AD704B84852E940650BC9BD39E8D68BA504853E11

SSDEEP:

3072:64A4+rk3hOdsylKlgryzc4bNhZFGzE+cL/gEcrdhgfiIz99yybTLUI:LVck3hOdsylKlgryzc4bNhZF+E+W/gE8

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Starts Microsoft Office Application

      • EXCEL.EXE (PID: 2560)
    • Application launched itself

      • EXCEL.EXE (PID: 2560)
  • INFO

    • Reads Microsoft Office registry keys

      • EXCEL.EXE (PID: 2560)
      • EXCEL.EXE (PID: 2800)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.xls | Microsoft Excel sheet (48)
.xls | Microsoft Excel sheet (alternate) (39.2)

EXIF

FlashPix

CompObjUserType: Microsoft Excel 2003 Worksheet
CompObjUserTypeLen: 31
Publisher: ITILworx
Hyperlinks:
  • http://www.itilworx.com/
HyperlinkBase: http://www.itilworx.com
CodePage: Windows Latin 1 (Western European)
HeadingPairs:
  • Worksheets
  • 12
  • Named Ranges
  • 19
TitleOfParts:
  • Instructions
  • Overview
  • Service Ownership
  • 1 - Server Admin Services
  • 2 - Database Services
  • 3 - IT Client Services
  • 4 - Networking Services
  • 5 - Telecommunications Services
  • 8 - Server&Database Hosting
  • 6 - Utility Hosting
  • 7 - Production Support
  • x - <template> (2)
  • '1 - Server Admin Services'!Print_Area
  • '2 - Database Services'!Print_Area
  • '3 - IT Client Services'!Print_Area
  • '4 - Networking Services'!Print_Area
  • '5 - Telecommunications Services'!Print_Area
  • '6 - Utility Hosting'!Print_Area
  • '7 - Production Support'!Print_Area
  • '8 - Server&Database Hosting'!Print_Area
  • 'Service Ownership'!Print_Area
  • 'x - <template> (2)'!Print_Area
  • '1 - Server Admin Services'!Print_Titles
  • '2 - Database Services'!Print_Titles
  • '3 - IT Client Services'!Print_Titles
  • '4 - Networking Services'!Print_Titles
  • '5 - Telecommunications Services'!Print_Titles
  • '6 - Utility Hosting'!Print_Titles
  • '7 - Production Support'!Print_Titles
  • '8 - Server&Database Hosting'!Print_Titles
  • 'x - <template> (2)'!Print_Titles
HyperlinksChanged: No
SharedDoc: No
LinksUpToDate: No
ScaleCrop: No
AppVersion: 16
Company: ITILworx
Security: None
ModifyDate: 2019:03:28 10:01:40
CreateDate: 2002:08:14 22:07:56
LastPrinted: 2004:09:04 19:34:50
Software: Microsoft Excel
LastModifiedBy: Windows User
Comments: Copyright @ 2004 ITILworx Version 1.12
Author: ITILworx
Subject: IT Service Management
Title: IT Service Catalog Template
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
33
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start excel.exe no specs excel.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2560"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /ddeC:\Program Files\Microsoft Office\Office14\EXCEL.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\excel.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2800"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /EmbeddingC:\Program Files\Microsoft Office\Office14\EXCEL.EXEEXCEL.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Excel
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\excel.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
Total events
977
Read events
923
Write events
39
Delete events
15

Modification events

(PID) Process:(2560) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Operation:writeName:mw:
Value:
6D773A00000A0000010000000000000000000000
(PID) Process:(2560) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
Off
(PID) Process:(2560) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
On
(PID) Process:(2560) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
Operation:writeName:MTTT
Value:
000A00003E8FB48F3BF0D40100000000
(PID) Process:(2560) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Operation:delete valueName:mw:
Value:
6D773A00000A0000010000000000000000000000
(PID) Process:(2560) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Operation:delete keyName:
Value:
(PID) Process:(2560) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency
Operation:delete keyName:
Value:
(PID) Process:(2560) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2560) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2560) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\1069AA
Operation:writeName:1069AA
Value:
04000000000A00006300000043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C004C006F00630061006C005C00540065006D0070005C003500360033003900300030002D0043006F007000790020006F006600200043006F0070006D0075007400650072002D00490054002D0053006500720076006900630065002D0043006100740061006C006F0067002D0049006E00760065006E0074006F00720079002D00540065006D0070006C006100740065002E0078006C007300000000002200000043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C004C006F00630061006C005C00540065006D0070005C000100000000000000109AE5903BF0D401AA691000AA69100000000000AC020000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
Executable files
0
Suspicious files
4
Text files
1
Unknown types
2

Dropped files

PID
Process
Filename
Type
2560EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVR63CD.tmp.cvr
MD5:
SHA256:
2560EXCEL.EXEC:\Users\admin\AppData\Local\Temp\~DF0FC1FCBD5CC4E065.TMP
MD5:
SHA256:
2800EXCEL.EXEC:\Users\admin\AppData\Local\Temp\OICE_6053220F-AE8E-4F3E-998E-0DDE6A68B616.0\~DF6A42CF467FC6FC99.TMP
MD5:
SHA256:
2800EXCEL.EXEC:\Users\admin\AppData\Local\Temp\OICE_6053220F-AE8E-4F3E-998E-0DDE6A68B616.0\~DF89B3DD5FCDB48E4D.TMP
MD5:
SHA256:
2560EXCEL.EXEC:\Users\admin\AppData\Local\Temp\Excel\563900-Copy of Copmuter-IT-Service-Catalog-Inventory-Template.xlsdocument
MD5:34AA174954DB78BA087E58F44491CCD5
SHA256:D066C01970A69E58E5CFFC252C48469EB965D31D9096237735C2D989580D259D
2560EXCEL.EXEC:\Users\admin\AppData\Local\Temp\OICE_6053220F-AE8E-4F3E-998E-0DDE6A68B616.0\D65B7B61.xlsdocument
MD5:34AA174954DB78BA087E58F44491CCD5
SHA256:D066C01970A69E58E5CFFC252C48469EB965D31D9096237735C2D989580D259D
2560EXCEL.EXEC:\Users\admin\AppData\Local\Temp\563900-Copy of Copmuter-IT-Service-Catalog-Inventory-Template.xlsdocument
MD5:34AA174954DB78BA087E58F44491CCD5
SHA256:D066C01970A69E58E5CFFC252C48469EB965D31D9096237735C2D989580D259D
2560EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6246E9EE.emfemf
MD5:23E205FC7A6939C7209A258B5A86F210
SHA256:D76866BD80804D82B64A28716A96252210B201E1E8B0DA88C28B292C5EBDA938
2800EXCEL.EXEC:\Users\admin\AppData\Local\Temp\OICE_6053220F-AE8E-4F3E-998E-0DDE6A68B616.0\mso6CB6.tmpcompressed
MD5:9BEF05A38683E18D574594956085668C
SHA256:CE841A11C12486E13A35D62776D57B5D3283CF9F9101173C9662BC009921EDA9
2800EXCEL.EXEC:\Users\admin\AppData\Local\Temp\OICE_6053220F-AE8E-4F3E-998E-0DDE6A68B616.0\9194DE4.emfemf
MD5:23E205FC7A6939C7209A258B5A86F210
SHA256:D76866BD80804D82B64A28716A96252210B201E1E8B0DA88C28B292C5EBDA938
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info