analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

EXTERNAL Jammy Bratlie wants to share a document with you.msg

Full analysis: https://app.any.run/tasks/7627c039-f037-4507-b70c-9c9f50b2d9de
Verdict: Malicious activity
Analysis date: December 02, 2019, 20:47:40
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/vnd.ms-outlook
File info: CDFV2 Microsoft Outlook Message
MD5:

9BFD91F8AF6F83CC57133D88DD2CA6BD

SHA1:

4B4A0D5676022219775AAD1DAAE4504E171D6E60

SHA256:

1FAE3B4B94889E5FA9B1824E71DE12D1BB97908C9EDDC793E71B8F0F16DEF7D3

SSDEEP:

768:VjWphuazBaM8pvW6GlgMHfV+XqB/S5U7WsK0WsKWxWsK0WLzK32VDNhQQYpQG5+B:MzBjSagMHfJB/b7W8W6W8WnKOMWz

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Unusual execution from Microsoft Office

      • OUTLOOK.EXE (PID: 2416)
  • SUSPICIOUS

    • Reads Internet Cache Settings

      • OUTLOOK.EXE (PID: 2416)
    • Executed via COM

      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 2604)
    • Starts Internet Explorer

      • OUTLOOK.EXE (PID: 2416)
    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 2416)
    • Modifies files in Chrome extension folder

      • chrome.exe (PID: 3000)
  • INFO

    • Reads the hosts file

      • chrome.exe (PID: 2128)
      • chrome.exe (PID: 3000)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3236)
      • iexplore.exe (PID: 2040)
    • Manual execution by user

      • chrome.exe (PID: 3000)
    • Changes settings of System certificates

      • iexplore.exe (PID: 3236)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 3236)
    • Application launched itself

      • iexplore.exe (PID: 3236)
      • chrome.exe (PID: 3000)
    • Reads settings of System Certificates

      • chrome.exe (PID: 2128)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2040)
    • Changes internet zones settings

      • iexplore.exe (PID: 3236)
    • Creates files in the user directory

      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 2604)
      • iexplore.exe (PID: 2040)
    • Reads Microsoft Office registry keys

      • OUTLOOK.EXE (PID: 2416)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msg | Outlook Message (58.9)
.oft | Outlook Form Template (34.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
75
Monitored processes
36
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start outlook.exe iexplore.exe iexplore.exe flashutil32_26_0_0_131_activex.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2416"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\admin\AppData\Local\Temp\EXTERNAL Jammy Bratlie wants to share a document with you.msg"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
14.0.6025.1000
3236"C:\Program Files\Internet Explorer\iexplore.exe" https://nam03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fr6ws0xrm.r.eu-west-1.awstrack.me%2FL0%2Fhttps%3A%252F%252Fcloud.gonitro.com%252Fdocview%252F1988463654%253Fs%3DQiJYpcui94kgT_jhff8Y7A%2F1%2F0102016ec7e72091-701b1874-5dc4-43df-99dc-c4188fd91f1e-000000%2F9_vke85HBY2wTIGX3DtCK5_JK-E%3D138&data=02%7C01%7Cscott%40dominohighvoltage.com%7C29ce314314e54a6f656f08d77756acdc%7C78d5360854ca4a748beb8a1399c1189c%7C0%7C1%7C637109086482154884&sdata=NBC03gmHr%2BjupR2Cyq2RCkpqWZq6NQLIIgOlSLEH8Y0%3D&reserved=0C:\Program Files\Internet Explorer\iexplore.exe
OUTLOOK.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2040"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3236 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2604C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe® Flash® Player Installer/Uninstaller 26.0 r0
Exit code:
0
Version:
26,0,0,131
3000"C:\Program Files\Google\Chrome\Application\chrome.exe" C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
236"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6feda9d0,0x6feda9e0,0x6feda9ecC:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
1072"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=2776 --on-initialized-event-handle=312 --parent-handle=316 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
2980"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1012,4017384340031775275,5134087149239693296,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=13647209678817736965 --mojo-platform-channel-handle=1036 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
2128"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1012,4017384340031775275,5134087149239693296,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=15855807857422650131 --mojo-platform-channel-handle=1600 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
532"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1012,4017384340031775275,5134087149239693296,131072 --enable-features=PasswordImport --lang=en-US --instant-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=17998104620746591809 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2236 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Total events
2 647
Read events
1 899
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
44
Text files
317
Unknown types
21

Dropped files

PID
Process
Filename
Type
2416OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVRA39D.tmp.cvr
MD5:
SHA256:
3236iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\favicon[1].ico
MD5:
SHA256:
3236iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2416OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmpgc
MD5:4716AC013D1CEE710A6335F68E6B5D28
SHA256:741A2A4BA82CE0B5D45BBA947CFD0C52B30B72EB27091FDA17ACD25205522330
2416OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\outlook logging\firstrun.logtext
MD5:839245F0FAB55B2392D1EFD7CAF52CE4
SHA256:71D324B3EC544EC7E924DDF8C7F5C45C00C76B511B5794BC67B081712BF8D9D1
2040iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab2502.tmp
MD5:
SHA256:
2040iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar2503.tmp
MD5:
SHA256:
2040iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab2514.tmp
MD5:
SHA256:
2040iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar2515.tmp
MD5:
SHA256:
2040iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\index.datdat
MD5:DA27C2C72032577CADCA94FF856F0634
SHA256:24AF479E9B09BE6FAC0517DB6C989162FE1BAEE911B82D50F9F8F4DC71D261DB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
60
DNS requests
43
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2416
OUTLOOK.EXE
GET
64.4.26.155:80
http://config.messenger.msn.com/config/msgrconfig.asmx?op=GetOlcConfig
US
whitelisted
2128
chrome.exe
GET
200
74.125.153.27:80
http://r5---sn-hpa7zned.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOTRmQUFXVHlhaGJaUTdMLWtCSkNJUl9ZQQ/1.0.0.5_nmmhkkegccagdldgiimedpiccmgmieda.crx?cms_redirect=yes&mip=185.128.27.151&mm=28&mn=sn-hpa7zned&ms=nvh&mt=1575319704&mv=m&mvi=4&pl=24&shardbypass=yes
US
crx
293 Kb
whitelisted
2128
chrome.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEAx5qUSwjBGVIJJhX%2BJrHYM%3D
US
der
471 b
whitelisted
2128
chrome.exe
GET
302
172.217.18.110:80
http://redirector.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOWVmQUFXS041NV9ZVXlJVWwxbGc5TUM4dw/7519.422.0.3_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx
US
html
515 b
whitelisted
2128
chrome.exe
GET
302
172.217.18.110:80
http://redirector.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOTRmQUFXVHlhaGJaUTdMLWtCSkNJUl9ZQQ/1.0.0.5_nmmhkkegccagdldgiimedpiccmgmieda.crx
US
html
510 b
whitelisted
2128
chrome.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRJ9L2KGL92BpjF3kAtaDtxauTmhgQUPdNQpdagre7zSmAKZdMh1Pj41g8CEAggB5NQF2%2FrfdtiHHSJddU%3D
US
der
471 b
whitelisted
2128
chrome.exe
GET
200
74.125.153.27:80
http://r5---sn-hpa7zned.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOWVmQUFXS041NV9ZVXlJVWwxbGc5TUM4dw/7519.422.0.3_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx?cms_redirect=yes&mip=185.128.27.151&mm=28&mn=sn-hpa7zned&ms=nvh&mt=1575319704&mv=m&mvi=4&pl=24&shardbypass=yes
US
crx
862 Kb
whitelisted
2040
iexplore.exe
GET
200
13.224.197.208:80
http://x.ss2.us/x.cer
US
der
1.27 Kb
whitelisted
2040
iexplore.exe
GET
200
67.27.157.126:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
US
compressed
57.4 Kb
whitelisted
2040
iexplore.exe
GET
200
172.217.16.170:80
http://fonts.googleapis.com/css?family=Open+Sans:400,600|Cedarville+Cursive
US
text
235 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2416
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted
172.217.16.170:80
fonts.googleapis.com
Google Inc.
US
whitelisted
2040
iexplore.exe
151.101.2.110:443
js-agent.newrelic.com
Fastly
US
suspicious
2040
iexplore.exe
216.58.210.3:443
fonts.gstatic.com
Google Inc.
US
whitelisted
2040
iexplore.exe
172.217.16.170:80
fonts.googleapis.com
Google Inc.
US
whitelisted
2040
iexplore.exe
99.80.104.131:443
r6ws0xrm.r.eu-west-1.awstrack.me
AT&T Services, Inc.
US
unknown
3236
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2040
iexplore.exe
172.217.16.170:443
fonts.googleapis.com
Google Inc.
US
whitelisted
2040
iexplore.exe
172.217.18.104:443
www.googletagmanager.com
Google Inc.
US
suspicious
2040
iexplore.exe
216.58.205.238:443
www.google-analytics.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted
nam03.safelinks.protection.outlook.com
  • 104.47.41.28
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
r6ws0xrm.r.eu-west-1.awstrack.me
  • 99.80.104.131
  • 52.210.60.36
  • 34.246.16.187
unknown
x.ss2.us
  • 13.224.197.208
  • 13.224.197.167
  • 13.224.197.157
  • 13.224.197.19
whitelisted
www.download.windowsupdate.com
  • 67.27.157.126
  • 8.248.117.254
  • 8.241.121.126
  • 67.27.158.126
  • 67.27.235.126
whitelisted
cloud.gonitro.com
  • 104.16.119.102
  • 104.16.158.102
unknown
fonts.googleapis.com
  • 172.217.16.170
whitelisted
fonts.gstatic.com
  • 216.58.210.3
whitelisted
www.googletagmanager.com
  • 172.217.18.104
whitelisted

Threats

No threats detected
No debug info