analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

f.ventura 12345678.msg

Full analysis: https://app.any.run/tasks/c2f9eb00-4af3-4786-b54a-8b6d2a9dda0a
Verdict: Malicious activity
Analysis date: September 19, 2019, 10:16:25
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/vnd.ms-outlook
File info: CDFV2 Microsoft Outlook Message
MD5:

DFFF77CD544132BB9882B1E0A4B4D474

SHA1:

B0F61743410BC109116EA1BAD61CA17A4574901C

SHA256:

277E625B4D429E8E71C65D50E2A344608100BCF9D8A480566CF1E8DAB76CF914

SSDEEP:

384:OWEpqSjYhcUUDWda/25to4/K9WsKhl9PrQwmv1yoIMWTSG49msin:OASWda+7/K9WsKhLTQwroIMW1Yk

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Unusual execution from Microsoft Office

      • OUTLOOK.EXE (PID: 3548)
  • SUSPICIOUS

    • Reads Internet Cache Settings

      • OUTLOOK.EXE (PID: 3548)
    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 3548)
    • Executed via COM

      • OUTLOOK.EXE (PID: 2008)
  • INFO

    • Manual execution by user

      • iexplore.exe (PID: 3228)
    • Dropped object may contain Bitcoin addresses

      • OUTLOOK.EXE (PID: 3548)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3228)
    • Application launched itself

      • iexplore.exe (PID: 3228)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3884)
      • iexplore.exe (PID: 3228)
    • Changes internet zones settings

      • iexplore.exe (PID: 3228)
    • Creates files in the user directory

      • iexplore.exe (PID: 3884)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3884)
    • Reads Microsoft Office registry keys

      • OUTLOOK.EXE (PID: 2008)
      • OUTLOOK.EXE (PID: 3548)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msg | Outlook Message (58.9)
.oft | Outlook Form Template (34.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start outlook.exe notepad.exe no specs iexplore.exe iexplore.exe outlook.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3548"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\admin\AppData\Local\Temp\f.ventura 12345678.msg"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Exit code:
0
Version:
14.0.6025.1000
3232"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\BV95RJ78\email.txtC:\Windows\system32\NOTEPAD.EXEOUTLOOK.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3228"C:\Program Files\Internet Explorer\iexplore.exe" C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3884"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3228 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2008"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE" -EmbeddingC:\Program Files\Microsoft Office\Office14\OUTLOOK.EXEsvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Exit code:
0
Version:
14.0.6025.1000
Total events
16 900
Read events
8 237
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
3
Text files
44
Unknown types
10

Dropped files

PID
Process
Filename
Type
3548OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVR9AAE.tmp.cvr
MD5:
SHA256:
3228iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\favicon[1].ico
MD5:
SHA256:
3548OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmpgc
MD5:544C4276C6267BE538B39B96BF672C77
SHA256:1DBD807063B4931694AA9DB85D4A858BD93E85D508DEAC170DF3CC0014380B3C
3228iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
3548OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Office\ONetConfig\54946941a2b45a5ba7f3e1b905b42959.xmlxml
MD5:DED3F5D7279521BDE8AC24AAE3362E44
SHA256:114D97F719714CBA7F9F5D173D902F350EE19359ED70DAA4E3C12329B8F461EA
3548OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\BV95RJ78\email.txthtml
MD5:307179133E0B36416FC7D38DCF116032
SHA256:73D1870A4BDB40BE45033369845E183BC28D74F1C0856BF530BFBD5645EB5A47
3548OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_AvailabilityOptions_2_D9227A2EAB9E8C479809A2FCA5E9E1A8.datxml
MD5:EEAA832C12F20DE6AAAA9C7B77626E72
SHA256:C4C9A90F2C961D9EE79CF08FBEE647ED7DE0202288E876C7BAAD00F4CA29CA16
3884iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\admin@google[2].txt
MD5:
SHA256:
3548OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Office\ONetConfig\54946941a2b45a5ba7f3e1b905b42959.sigbinary
MD5:F88588E009F28F86B9CEA986C2E4556C
SHA256:F9C3B67E37E444B111191B19D6C90EA0AF655497DA1D25F7B219053CFF4DFCB9
3884iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.datdat
MD5:EAB80126745BAEE242D1F990B98DAEC9
SHA256:4D3E5650675E96EE50C703EB49B06A329CEA8626F2508C4059939A448E49BF66
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
11
DNS requests
6
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3548
OUTLOOK.EXE
GET
200
52.109.76.6:80
http://office14client.microsoft.com/config14?UILCID=1033&CLCID=1033&ILCID=1033&HelpLCID=1033&App={CFF13DD8-6EF2-49EB-B265-E3BFC6501C1D}&build=14.0.6023
IE
xml
1.99 Kb
whitelisted
3884
iexplore.exe
GET
301
172.217.22.46:80
http://google.com/
US
html
219 b
whitelisted
3228
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
3884
iexplore.exe
GET
302
172.217.18.4:80
http://www.google.com/
US
html
231 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3884
iexplore.exe
172.217.22.46:80
google.com
Google Inc.
US
whitelisted
3548
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted
3548
OUTLOOK.EXE
52.109.76.6:80
office14client.microsoft.com
Microsoft Corporation
IE
whitelisted
3228
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3884
iexplore.exe
172.217.18.4:80
www.google.com
Google Inc.
US
whitelisted
3548
OUTLOOK.EXE
52.109.120.29:443
rr.office.microsoft.com
Microsoft Corporation
HK
whitelisted
3228
iexplore.exe
172.217.18.4:443
www.google.com
Google Inc.
US
whitelisted
3884
iexplore.exe
172.217.18.4:443
www.google.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted
office14client.microsoft.com
  • 52.109.76.6
whitelisted
rr.office.microsoft.com
  • 52.109.120.29
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
google.com
  • 172.217.22.46
whitelisted
www.google.com
  • 172.217.18.4
whitelisted

Threats

No threats detected
No debug info