analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Information pending.msg

Full analysis: https://app.any.run/tasks/541ef47d-7e60-4c76-ae56-fafee3d3f84c
Verdict: Malicious activity
Analysis date: September 30, 2020, 14:23:11
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/vnd.ms-outlook
File info: CDFV2 Microsoft Outlook Message
MD5:

ABC86CFCC961216C4206C2A6AC60C7FB

SHA1:

890C415B03A177441EDA243C3C0EC1CEF04EBB40

SHA256:

0F6CE8DBFE8695064D0EC2EE0A82C7775F60DEC998CF0E966E143CD2333756F0

SSDEEP:

3072:ig14LHKalCrNVr32/fp3UESg1dQNGIrfrXbcwVtRFE:6KalChVb4UESg1dorfrNPE

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Unusual execution from Microsoft Office

      • OUTLOOK.EXE (PID: 2124)
  • SUSPICIOUS

    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 2124)
    • Changes IE settings (feature browser emulation)

      • AcroRd32.exe (PID: 2984)
    • Starts Internet Explorer

      • AcroRd32.exe (PID: 2984)
    • Creates files in the program directory

      • AdobeARM.exe (PID: 3016)
  • INFO

    • Reads Internet Cache Settings

      • OUTLOOK.EXE (PID: 2124)
      • AcroRd32.exe (PID: 2476)
      • iexplore.exe (PID: 2756)
      • iexplore.exe (PID: 3140)
      • AcroRd32.exe (PID: 2984)
      • iexplore.exe (PID: 3648)
    • Application launched itself

      • AcroRd32.exe (PID: 2984)
      • RdrCEF.exe (PID: 2496)
      • iexplore.exe (PID: 2756)
    • Reads Microsoft Office registry keys

      • OUTLOOK.EXE (PID: 2124)
    • Reads the hosts file

      • RdrCEF.exe (PID: 2496)
    • Changes internet zones settings

      • iexplore.exe (PID: 2756)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3140)
      • iexplore.exe (PID: 2756)
      • AcroRd32.exe (PID: 2984)
      • iexplore.exe (PID: 3648)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3140)
      • iexplore.exe (PID: 3648)
    • Creates files in the user directory

      • iexplore.exe (PID: 3140)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2756)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2756)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msg | Outlook Message (58.9)
.oft | Outlook Form Template (34.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
47
Monitored processes
11
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start outlook.exe acrord32.exe acrord32.exe no specs rdrcef.exe no specs rdrcef.exe no specs rdrcef.exe no specs iexplore.exe iexplore.exe iexplore.exe adobearm.exe no specs reader_sl.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2124"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\admin\AppData\Local\Temp\Information pending.msg"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
14.0.6025.1000
2984"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\3FQYL9QZ\Information pending.pdf"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
OUTLOOK.EXE
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe Acrobat Reader DC
Version:
15.23.20070.215641
2476"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" --type=renderer "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\3FQYL9QZ\Information pending.pdf"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeAcroRd32.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe Acrobat Reader DC
Version:
15.23.20070.215641
2496"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16448250C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeAcroRd32.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe RdrCEF
Version:
15.23.20053.211670
2004"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-3d-apis --disable-databases --disable-direct-npapi-requests --disable-file-system --disable-notifications --disable-shared-workers --disable-direct-write --lang=en-US --lang=en-US --log-severity=disable --product-version="ReaderServices/15.23.20053 Chrome/45.0.2454.85" --device-scale-factor=1 --enable-delegated-renderer --num-raster-threads=2 --gpu-rasterization-msaa-sample-count=8 --content-image-texture-target=3553 --video-image-texture-target=3553 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --channel="2496.0.1759281379\1862177151" --allow-no-sandbox-job /prefetch:673131151C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeRdrCEF.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe RdrCEF
Version:
15.23.20053.211670
544"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-3d-apis --disable-databases --disable-direct-npapi-requests --disable-file-system --disable-notifications --disable-shared-workers --disable-direct-write --lang=en-US --lang=en-US --log-severity=disable --product-version="ReaderServices/15.23.20053 Chrome/45.0.2454.85" --device-scale-factor=1 --enable-delegated-renderer --num-raster-threads=2 --gpu-rasterization-msaa-sample-count=8 --content-image-texture-target=3553 --video-image-texture-target=3553 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --channel="2496.1.1818754698\946364000" --allow-no-sandbox-job /prefetch:673131151C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeRdrCEF.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe RdrCEF
Version:
15.23.20053.211670
2756"C:\Program Files\Internet Explorer\iexplore.exe" https://public.3.basecamp.com/p/uVsuvDtqo5fG6sBk3W4xu2eQC:\Program Files\Internet Explorer\iexplore.exe
AcroRd32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
3140"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2756 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
3648"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2756 CREDAT:3216663 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
3016"C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" /PRODUCT:Reader /VERSION:15.0 /MODE:3C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exeAcroRd32.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe Reader and Acrobat Manager
Version:
1.824.27.2646
Total events
3 696
Read events
2 550
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
59
Text files
64
Unknown types
51

Dropped files

PID
Process
Filename
Type
2124OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVRAB74.tmp.cvr
MD5:
SHA256:
2124OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\3FQYL9QZ\Information pending (2).pdf\:Zone.Identifier:$DATA
MD5:
SHA256:
2476AcroRd32.exeC:\Users\admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
MD5:
SHA256:
2124OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmpgc
MD5:87600269E0938D3353FD5C349B0FAF90
SHA256:3BEBBF5AD3951BE3AAAE4383EF4D53B7DE8BE550D447C82813F9090127E3640C
2124OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\outlook logging\firstrun.logtext
MD5:9A4D99EEB142AA63099A0A451B478A28
SHA256:C43EFA0091DA4EF311011FE8DC73ADFA0FD4C6617B5C8B927AE03443A4ECF82E
2124OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8D9EB011.datimage
MD5:2BAD0F667C0CDABBF68FEC40F7916D49
SHA256:B038E53BD87769FC62105F35195981B66CA29E8A36D24A7690C21A93F81EB329
2124OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\3FQYL9QZ\Information pending.pdfpdf
MD5:7AF518BF70D4546D9AD365A777D180C8
SHA256:FBDA4E8803AF671F41E95D5153ADA158C07873057FF2FF3A0D87694B48CFD926
2124OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\StructuredQuery.logtext
MD5:853B5B1E68AFC7551E127112C4792293
SHA256:508C76A7C240491612B28EF4848AB26EF23C5D1F0B5FA7C8182FAF791AA44E89
2124OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\3FQYL9QZ\Information pending (2).pdfpdf
MD5:7AF518BF70D4546D9AD365A777D180C8
SHA256:FBDA4E8803AF671F41E95D5153ADA158C07873057FF2FF3A0D87694B48CFD926
2476AcroRd32.exeC:\Users\admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessagessqlite
MD5:6A4B1B037558BF8F10E59F459D8DDE87
SHA256:00A9B694B777068557C8DA71D07B9AC9269457492341D8E150E4E3D1A2BD4328
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
31
TCP/UDP connections
52
DNS requests
25
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2984
AcroRd32.exe
GET
304
2.16.177.91:80
http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/281_15_23_20070.zip
unknown
whitelisted
2984
AcroRd32.exe
GET
304
2.16.177.91:80
http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/277_15_23_20070.zip
unknown
whitelisted
2984
AcroRd32.exe
GET
304
2.16.177.91:80
http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/278_15_23_20070.zip
unknown
whitelisted
2984
AcroRd32.exe
GET
304
2.16.177.91:80
http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/280_15_23_20070.zip
unknown
whitelisted
3140
iexplore.exe
GET
200
93.184.220.29:80
http://status.rapidssl.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRhhZrQET0hvbSHUJmNfBKqR%2FiT7wQUU8oXWfxrwAMhLxqu5KqoHIJW2nUCEAYvtu8jj%2F%2FcrHXQ5GizQcc%3D
US
der
471 b
shared
2984
AcroRd32.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAH9o%2BtuynXIiEOLckvPvJE%3D
US
der
471 b
whitelisted
3140
iexplore.exe
GET
200
143.204.101.42:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwZ%2FlFeFh%2Bisd96yUzJbvJmLVg0%3D
US
der
1.39 Kb
shared
3140
iexplore.exe
GET
200
143.204.101.124:80
http://ocsp.rootg2.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBSIfaREXmfqfJR3TkMYnD7O5MhzEgQUnF8A36oB1zArOIiiuG1KnPIRkYMCEwZ%2FlEoqJ83z%2BsKuKwH5CO65xMY%3D
US
der
1.51 Kb
whitelisted
3140
iexplore.exe
GET
200
143.204.101.124:80
http://ocsp.rootg2.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBSIfaREXmfqfJR3TkMYnD7O5MhzEgQUnF8A36oB1zArOIiiuG1KnPIRkYMCEwZ%2FlEoqJ83z%2BsKuKwH5CO65xMY%3D
US
der
1.51 Kb
whitelisted
3140
iexplore.exe
GET
200
13.225.84.42:80
http://o.ss2.us//MEowSDBGMEQwQjAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCCQCnDkpMNIK3fw%3D%3D
US
der
1.70 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3140
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2124
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted
2984
AcroRd32.exe
2.21.36.203:443
armmf.adobe.com
GTT Communications Inc.
FR
suspicious
3140
iexplore.exe
64.202.125.18:443
public.3.basecamp.com
Basecamp, LLC
US
unknown
3140
iexplore.exe
13.225.84.42:80
o.ss2.us
US
unknown
3140
iexplore.exe
13.225.73.75:443
bc3-production-assets-cdn.basecamp-static.com
US
unknown
2984
AcroRd32.exe
2.16.177.91:80
acroipm2.adobe.com
Akamai International B.V.
whitelisted
3140
iexplore.exe
143.204.101.124:80
ocsp.rootg2.amazontrust.com
US
whitelisted
143.204.101.124:80
ocsp.rootg2.amazontrust.com
US
whitelisted
13.225.84.42:80
o.ss2.us
US
unknown

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted
public.3.basecamp.com
  • 64.202.125.18
suspicious
ocsp.digicert.com
  • 93.184.220.29
whitelisted
status.rapidssl.com
  • 93.184.220.29
shared
bc3-production-assets-cdn.basecamp-static.com
  • 13.225.73.75
  • 13.225.73.65
  • 13.225.73.45
  • 13.225.73.12
whitelisted
acroipm2.adobe.com
  • 2.16.177.91
  • 2.16.177.123
whitelisted
armmf.adobe.com
  • 2.21.36.203
whitelisted
o.ss2.us
  • 13.225.84.42
  • 13.225.84.68
  • 13.225.84.66
  • 13.225.84.97
whitelisted
ocsp.rootg2.amazontrust.com
  • 143.204.101.124
  • 143.204.101.74
  • 143.204.101.190
  • 143.204.101.42
whitelisted
ocsp.rootca1.amazontrust.com
  • 143.204.101.42
  • 143.204.101.74
  • 143.204.101.124
  • 143.204.101.190
shared

Threats

No threats detected
No debug info