File name:

Webex_Meeting - Copy.js

Full analysis: https://app.any.run/tasks/13d38445-5de6-482d-9fd1-4807634d19f0
Verdict: Malicious activity
Analysis date: April 08, 2021, 13:30:49
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/calendar
File info: vCalendar calendar file
MD5:

517413A48E27817BFCD6795F1146C917

SHA1:

A924C64190EAA22161AE6F7F7E30E136D975D43C

SHA256:

153E0EFB4D3C76D54FD57E446CCC555C23520A7BFE1B48A6C8551D9F0E2BC3AE

SSDEEP:

192:PLMFYzc2nlmrjQ2QZfHE+6IDGWoWS8DnSPeo6:PGUlGBWHEMDGFbeo6

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Unusual execution from Microsoft Office

      • OUTLOOK.EXE (PID: 2208)
    • Application was dropped or rewritten from another process

      • webex.exe (PID: 3036)
      • cws1.tmp (PID: 3288)
      • atmgr.exe (PID: 2892)
      • atcliun.exe (PID: 2708)
      • CiscoWebExStart.exe (PID: 3304)
      • wbxreport.exe (PID: 1552)
      • CiscoWebExStart.exe (PID: 3208)
      • atmgr.exe (PID: 668)
      • atcliun.exe (PID: 2236)
      • WEBEXA~1.EXE (PID: 1744)
      • CISCOW~1.EXE (PID: 1848)
      • atmgr.exe (PID: 3604)
      • wbxreport.exe (PID: 3468)
    • Loads dropped or rewritten executable

      • cws1.tmp (PID: 3288)
      • atmgr.exe (PID: 2892)
      • CiscoWebExStart.exe (PID: 3304)
      • wbxreport.exe (PID: 1552)
      • CiscoWebExStart.exe (PID: 3208)
      • atmgr.exe (PID: 668)
      • wbxreport.exe (PID: 3468)
      • atmgr.exe (PID: 3604)
    • Changes the autorun value in the registry

      • CiscoWebExStart.exe (PID: 3304)
  • SUSPICIOUS

    • Drops a file that was compiled in debug mode

      • iexplore.exe (PID: 2164)
      • iexplore.exe (PID: 2520)
      • webex.exe (PID: 3036)
      • cws1.tmp (PID: 3288)
      • atmgr.exe (PID: 2892)
    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 2520)
      • iexplore.exe (PID: 2164)
      • webex.exe (PID: 3036)
      • cws1.tmp (PID: 3288)
      • atmgr.exe (PID: 2892)
    • Drops a file with a compile date too recent

      • iexplore.exe (PID: 2164)
      • iexplore.exe (PID: 2520)
      • webex.exe (PID: 3036)
      • cws1.tmp (PID: 3288)
      • atmgr.exe (PID: 2892)
    • Starts Internet Explorer

      • OUTLOOK.EXE (PID: 2208)
    • Starts application with an unusual extension

      • webex.exe (PID: 3036)
    • Drops a file with too old compile date

      • atmgr.exe (PID: 2892)
    • Changes IE settings (feature browser emulation)

      • atmgr.exe (PID: 2892)
      • atmgr.exe (PID: 668)
      • atmgr.exe (PID: 3604)
    • Creates a software uninstall entry

      • atcliun.exe (PID: 2708)
      • atcliun.exe (PID: 2236)
    • Application launched itself

      • CiscoWebExStart.exe (PID: 3304)
    • Creates/Modifies COM task schedule object

      • atmgr.exe (PID: 2892)
    • Changes default file association

      • CISCOW~1.EXE (PID: 1848)
  • INFO

    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 2208)
      • iexplore.exe (PID: 2164)
      • iexplore.exe (PID: 2520)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2164)
      • iexplore.exe (PID: 2520)
      • cws1.tmp (PID: 3288)
      • atmgr.exe (PID: 2892)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 2520)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2520)
    • Reads internet explorer settings

      • OUTLOOK.EXE (PID: 2208)
      • iexplore.exe (PID: 2164)
    • Changes internet zones settings

      • iexplore.exe (PID: 2520)
    • Searches for installed software

      • OUTLOOK.EXE (PID: 2208)
    • Application launched itself

      • iexplore.exe (PID: 2520)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2520)
    • Reads Microsoft Office registry keys

      • OUTLOOK.EXE (PID: 2208)
    • Dropped object may contain Bitcoin addresses

      • atmgr.exe (PID: 2892)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.ics/vcs | iCalendar - vCalendar (100)

EXIF

VCard

Classification: PUBLIC
Priority: 5
Summary: HEARING BEFORE DIVISION BENCH IV- HMJ MANMOHAN AND HMJ ASHA MENON
Alt-desc:
  • <style type="text/css"> table { border-collapse: separate; width =100%; border: 0; border-spacing: 0;} tr { line-height: 18px;} a
  • td { font-size: 14px; font-family: Arial; color: #333; word-wrap: break-word; word-break: normal; padding: 0;} .title { font-size: 28px;} .image { width: auto; max-width: auto;} .footer { width: 604px;} .main { }@media screen and (max-device-width: 800px) { .title { font-size: 22px !important; } .image { width: auto !important; max-width: 100% !important; } .footer { width: 100% !important; max-width: 604px !important } .main { width: 100% !important; max-width: 604px !important } } </style> <table bgcolor="#FFFFFF" style="padding: 0; margin: 0; border: 0; width: 100%;" align="left"> <tr style="height: 28px"><td>&nbsp;</td></tr> <tr> <td align="left" style="padding: 0 20px; margin: 0"> <!--<table bgcolor="#FFFFFF" style="border: 0px; width: 100%; padding-left: 50px; padding-right: 50px;" align="left" class="main"> <tr> <td align="center" valign="top" >&nbsp; </td> </tr> </table>--> <table> <tr> <td> <FONT SIZE="4" COLOR="#666666" FACE="arial">When it's time
  • join the Webex meeting here.</FONT> </td> </tr> </table> <table> <tr style="line-height: 20px;"><td style="height:20px">&nbsp;</td></tr> <tr> <td style="width:auto!important; "> <table border="0" cellpadding="0" cellspacing="0" style="width:auto;width:auto!important;background-color:#00823B; border:0px solid #00823B; border-radius:25px; min-width:160px!important;"> <tr> <td align="center" style="padding:10px 36px;"><a href="https://delhihighcourt.webex.com/delhihighcourt/j.php?MTID=md24666a29ce5367a25da54a76823d12f" style="color:#FFFFFF; font-size:20px; text-decoration:none;">Join meeting</a></td> </tr> </table> </td> </tr> </table> <table> <tr style="line-height: 20px;"><td style="height:20px">&nbsp;</td></tr> <tr> <td> <FONT SIZE="3" COLOR="#666666" FACE="arial">More ways to join:</FONT> </td> </tr> <tr style="line-height: 10px;"><td style="height: 10px;">&nbsp;</td></tr> <tr> <td> <FONT SIZE="3" COLOR="#666666" FACE="arial">Join from the meeting link</FONT> </td> </tr> <tr> <td> <FONT SIZE="2" COLOR="#666666" FACE="arial"><a href='https://delhihighcourt.webex.com/delhihighcourt/j.php?MTID=md24666a29ce5367a25da54a76823d12f' style='color:#005E7D; text-decoration:none; font-family: Arial;font-size: 14px;line-height: 24px;'>https://delhihighcourt.webex.com/delhihighcourt/j.php?MTID=md24666a29ce5367a25da54a76823d12f</a></FONT> </td> </tr> <tr style="line-height: 20px;"><td style="height:20px">&nbsp;</td></tr> <tr> <td> <FONT SIZE="3" COLOR="#666666" FACE="arial">Join by meeting number</FONT> </td> </tr> <tr> <td> <FONT SIZE="2" COLOR="#666666" FACE="arial">Meeting number (access code): 176 208 7866</FONT> </td> </tr> </table> <table><tr><td><FONT SIZE="2" COLOR="#666666" FACE="arial">Meeting password:</FONT></td><td><FONT SIZE="2" COLOR="#666666" FACE="arial">1234</FONT></td></tr></table> <FONT size="2" COLOR="#FF0000" style="font-family: Arial;"></FONT> <FONT SIZE="4" FACE="ARIAL"><FONT SIZE="3" COLOR="#666666" FACE="arial">Join by phone</FONT> &nbsp; <BR><FONT SIZE="2" COLOR="#666666" FACE="arial">Use VoIP only</FONT>&nbsp; <BR><BR><BR> <table><tr style="line-height: 20px;"><td style="height:20px">&nbsp;</td></tr></table> <FONT SIZE="4" FACE="ARIAL"><FONT SIZE="3" COLOR="#666666" FACE="arial">Join from a video system or application</FONT><BR><FONT SIZE="2" COLOR="#666666" FACE="arial">Dial</FONT> <a href="sip:1762087866@delhihighcourt.webex.com"><FONT SIZE="2" COLOR="#005E7D" FACE="arial">1762087866@delhihighcourt.webex.com</FONT></a>&nbsp; <BR><FONT SIZE="2" COLOR="#666666" FACE="arial">You can also dial 210.4.202.4 and enter your meeting number.</FONT> &nbsp; <BR></FONT>&nbsp; <BR> <table><tr style="line-height: 20px;"><td style="height:20px">&nbsp;</td></tr></table><table cellpadding="0" cellspacing="0"><tr><td style="color: #000000; font-family: Arial;font-size: 12px; font-weight: bold; line-height: 24px;"><b>Join using Microsoft Lync or Microsoft Skype for Business</b></td></tr><tr style="margin:0px"><td style="color: #333333; font-family: Arial; font-size: 14px; line-height: 24px;">Dial <a href=" sip:1762087866.delhihighcourt@lync.webex.com" style="text-decoration:none;color:#005E7D">1762087866.delhihighcourt@lync.webex.com</a></td></tr></table> <table><tr style="line-height: 20px"><td style="height:20px">&nbsp;</td></tr></table> <table style="width: 100%;" align="left" class="main"> <tr style="height: 20px"><td>&nbsp;</td></tr> <tr> <td style="height: 24px; color: #000000; font-family:Arial; font-size: 14px; line-height: 24px;">Need help? Go to <a href="https://help.webex.com" style="color:#005E7D; text-decoration:none;">https://help.webex.com</a> </td> </tr> <tr style="height: 44px"><td>&nbsp;</td></tr> </table> </td> </tr> </table>
Description:
  • JOIN WEBEX MEETING https://delhihighcourt.webex.com/delhihighcourt/j.php?MTID=md24666a29ce5367a25da54a76823d12f Meeting number (access code): 176 208 7866 Meeting password: 1234 JOIN BY PHONE Use VoIP only JOIN FROM A VIDEO SYSTEM OR APPLICATION Dial sip:1762087866@delhihighcourt.webex.com You can also dial 210.4.202.4 and enter your meeting number. Join using Microsoft Lync or Microsoft Skype for Business Dial sip:1762087866.delhihighcourt@lync.webex.com Can't join the meeting? https://collaborationhelp.cisco.com/article/WBX000029055 IMPORTANT NOTICE: Please note that this Webex service allows audio and other information sent during the session to be recorded
  • which may be discoverable in a legal matter. By joining this session
  • you automatically consent to such recordings. If you do not consent to being recorded
  • discuss your concerns with the host or do not join the session.
UID: 353a0ed7-c1de-40a6-ad9e-d31755b41d50
SequenceNumber: 1612182153
TimeTransparency: OPAQUE
Location: https://delhihighcourt.webex.com/delhihighcourt/j.php?MTID=md24666a29ce5367a25da54a76823d12f
DateTimeEndTimezoneID: Asia/Kolkata
DateTimeEnd: 2021:02:02 12:30:00
DateTimeStartTimezoneID: Asia/Kolkata
DateTimeStart: 2021:02:02 10:30:00
Organizer: MAILTO:dhcecourtvc5@gmail.com
Attendee: MAILTO:customer.care@nayaraenergy.com
DateTimeStamp: 2021:02:01 12:22:33Z
StandardDateTimeStart: 1970:01:01 00:00:00
StandardTimezoneName: IST
StandardTimezoneOffsetTo: +0530
StandardTimezoneOffsetFrom: +0530
Lic-location: Asia/Kolkata
TimeZoneURL: http://tzurl.org/zoneinfo-outlook/Asia/Kolkata
TimezoneID: Asia/Kolkata
Method: REQUEST
VCalendarVersion: 2
Software: -//Microsoft Corporation//Outlook 10.0 MIMEDIR//EN
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
58
Monitored processes
16
Malicious processes
14
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start outlook.exe iexplore.exe iexplore.exe webex.exe cws1.tmp atmgr.exe webexa~1.exe no specs ciscow~1.exe no specs atcliun.exe no specs ciscowebexstart.exe wbxreport.exe no specs ciscowebexstart.exe no specs atmgr.exe atcliun.exe no specs atmgr.exe wbxreport.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
668 /mcstd "C:\Users\admin\AppData\LocalLow\WebEx\preDownload_3208.ini"c:\users\admin\appdata\local\webex\webex\meetings\atmgr.exe
CiscoWebExStart.exe
User:
admin
Company:
Cisco Webex LLC
Integrity Level:
MEDIUM
Description:
Cisco Webex Service
Exit code:
0
Version:
4104.0000.2103.1900
Modules
Images
c:\users\admin\appdata\local\webex\webex\meetings\atmgr.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\gdiplus.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1552"C:\Users\admin\AppData\Local\WebEx\WebEx\Meetings\wbxreport.exe" C:\Users\admin\AppData\Local\Temp\wbxTraceZip.iniC:\Users\admin\AppData\Local\WebEx\WebEx\Meetings\wbxreport.exeatmgr.exe
User:
admin
Company:
Cisco Webex LLC
Integrity Level:
MEDIUM
Description:
WBXReport Module
Exit code:
0
Version:
4010.0.2008.1800
Modules
Images
c:\users\admin\appdata\local\webex\webex\meetings\wbxreport.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1744"C:\Users\admin\appdata\local\webex\WEBEXA~1.EXE" /rC:\Users\admin\appdata\local\webex\WEBEXA~1.EXEatmgr.exe
User:
admin
Company:
Cisco WebEx LLC
Integrity Level:
MEDIUM
Description:
WebEx Productivity Tools Application
Exit code:
0
Version:
4104,0,2102,1900
Modules
Images
c:\users\admin\appdata\local\webex\webexa~1.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\wininet.dll
c:\windows\system32\api-ms-win-downlevel-user32-l1-1-0.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1848"C:\Users\admin\appdata\local\webex\CISCOW~1.EXE" /rC:\Users\admin\appdata\local\webex\CISCOW~1.EXEatmgr.exe
User:
admin
Company:
Cisco Webex LLC
Integrity Level:
MEDIUM
Description:
Cisco Webex Meetings
Exit code:
1
Version:
10051,4104,2021,0323
Modules
Images
c:\users\admin\appdata\local\webex\ciscow~1.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\imagehlp.dll
2164"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2520 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2208"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE" /ical "C:\Users\admin\AppData\Local\Temp\Webex_Meeting - Copy.js.ics"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Exit code:
0
Version:
14.0.6025.1000
Modules
Images
c:\program files\microsoft office\office14\outlook.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2236"C:\Users\admin\AppData\Local\WebEx\atcliun.exe" /r MC language=ENC:\Users\admin\AppData\Local\WebEx\atcliun.exeatmgr.exe
User:
admin
Company:
Cisco System Inc.
Integrity Level:
MEDIUM
Description:
Cisco Webex Uninstaller
Exit code:
0
Version:
2800.4101.2011.2001
Modules
Images
c:\users\admin\appdata\local\webex\atcliun.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2520"C:\Program Files\Internet Explorer\iexplore.exe" https://delhihighcourt.webex.com/delhihighcourt/j.php?MTID=md24666a29ce5367a25da54a76823d12fC:\Program Files\Internet Explorer\iexplore.exe
OUTLOOK.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2708"C:\Users\admin\AppData\Local\WebEx\atcliun.exe" /r MC language=ENC:\Users\admin\AppData\Local\WebEx\atcliun.exeatmgr.exe
User:
admin
Company:
Cisco System Inc.
Integrity Level:
MEDIUM
Description:
Cisco Webex Uninstaller
Exit code:
0
Version:
2800.4101.2011.2001
Modules
Images
c:\users\admin\appdata\local\webex\atcliun.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\lpk.dll
2892 /mcstd "C:\Users\admin\AppData\LocalLow\WebEx\webex_3288.ini"C:\Users\admin\AppData\Local\WebEx\WebEx\Meetings\atmgr.exe
cws1.tmp
User:
admin
Company:
Cisco Webex LLC
Integrity Level:
MEDIUM
Description:
Cisco Webex Service
Exit code:
0
Version:
4104.0000.2103.1900
Modules
Images
c:\users\admin\appdata\local\webex\webex\meetings\atmgr.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\gdiplus.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
4 949
Read events
3 769
Write events
1 134
Delete events
46

Modification events

(PID) Process:(2208) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
Off
(PID) Process:(2208) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1041
Value:
Off
(PID) Process:(2208) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1046
Value:
Off
(PID) Process:(2208) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1036
Value:
Off
(PID) Process:(2208) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1031
Value:
Off
(PID) Process:(2208) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1040
Value:
Off
(PID) Process:(2208) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1049
Value:
Off
(PID) Process:(2208) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:3082
Value:
Off
(PID) Process:(2208) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1042
Value:
Off
(PID) Process:(2208) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1055
Value:
Off
Executable files
214
Suspicious files
264
Text files
201
Unknown types
29

Dropped files

PID
Process
Filename
Type
2208OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVRF645.tmp.cvr
MD5:
SHA256:
2208OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\C2Q0JOAYF8YMLCYB119R.temp
MD5:
SHA256:
2208OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\~DF44B93F10B7DEDF55.TMP
MD5:
SHA256:
2208OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\~DF76FAE74F94FFF881.TMP
MD5:
SHA256:
2208OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\~DFEDDE9EA750CC1F51.TMP
MD5:
SHA256:
2164iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\CabA4E4.tmp
MD5:
SHA256:
2164iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\TarA4E5.tmp
MD5:
SHA256:
2208OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\outlook logging\firstrun.logtext
MD5:
SHA256:
2164iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\30628a0881e64cfaa7337e5e15cf91ee[1].htmhtml
MD5:
SHA256:
2208OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Microsoft Outlook.lnklnk
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
24
TCP/UDP connections
75
DNS requests
35
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2208
OUTLOOK.EXE
GET
64.4.26.155:80
http://config.messenger.msn.com/config/msgrconfig.asmx?op=GetOlcConfig
US
whitelisted
2164
iexplore.exe
GET
200
35.158.10.169:80
http://ocsp.quovadisglobal.com/MFUwUzBRME8wTTAJBgUrDgMCGgUABBTyhcKR1A4XhQLFZRt5u%2BT8TDsYdQQUGoRivEhMMyUE1O7Q9gPEGUbRlGsCFHUXFneD0EN%2BtVbDV5RuRWO469Os
DE
der
1.78 Kb
whitelisted
2164
iexplore.exe
GET
200
35.156.254.208:80
http://ocsp.quovadisglobal.com/MFUwUzBRME8wTTAJBgUrDgMCGgUABBTyhcKR1A4XhQLFZRt5u%2BT8TDsYdQQUGoRivEhMMyUE1O7Q9gPEGUbRlGsCFHI7b%2BXCUnVNIYmwkVVSGjGHkW24
DE
der
1.78 Kb
whitelisted
2520
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
2164
iexplore.exe
GET
200
35.156.254.208:80
http://ocsp.quovadisglobal.com/MFUwUzBRME8wTTAJBgUrDgMCGgUABBTyhcKR1A4XhQLFZRt5u%2BT8TDsYdQQUGoRivEhMMyUE1O7Q9gPEGUbRlGsCFHI7b%2BXCUnVNIYmwkVVSGjGHkW24
DE
der
1.78 Kb
whitelisted
2520
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
2164
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAH9o%2BtuynXIiEOLckvPvJE%3D
US
der
471 b
whitelisted
2520
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
2520
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2BnRyLFPYjID1ie%2Bx%2BdSjo%3D
US
der
1.47 Kb
whitelisted
2520
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2BnRyLFPYjID1ie%2Bx%2BdSjo%3D
US
der
1.47 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2164
iexplore.exe
64.68.120.41:443
tsa.webex.com
Cisco Webex LLC
US
unknown
2208
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted
2164
iexplore.exe
114.29.213.193:443
delhihighcourt.webex.com
Cisco Webex LLC
SG
suspicious
2164
iexplore.exe
35.158.10.169:80
ocsp.quovadisglobal.com
Amazon.com, Inc.
DE
whitelisted
2164
iexplore.exe
35.156.254.208:80
ocsp.quovadisglobal.com
Amazon.com, Inc.
DE
unknown
2164
iexplore.exe
92.122.252.10:443
akamaicdn.webex.com
GTT Communications Inc.
unknown
2520
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3036
webex.exe
114.29.213.193:443
delhihighcourt.webex.com
Cisco Webex LLC
SG
suspicious
2520
iexplore.exe
104.18.10.39:80
cacerts.digicert.com
Cloudflare Inc
US
shared
3288
cws1.tmp
92.122.252.10:443
akamaicdn.webex.com
GTT Communications Inc.
unknown

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted
delhihighcourt.webex.com
  • 114.29.213.193
suspicious
ocsp.quovadisglobal.com
  • 35.158.10.169
  • 35.156.254.208
  • 52.214.169.148
whitelisted
akamaicdn.webex.com
  • 92.122.252.10
  • 104.76.200.156
whitelisted
nebulaas.webex.com
  • 114.29.213.193
suspicious
api.bing.com
  • 13.107.13.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
cacerts.digicert.com
  • 104.18.10.39
  • 104.18.11.39
whitelisted
tsa.webex.com
  • 64.68.120.41
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted

Threats

No threats detected
No debug info