analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

report - 2020-10-20T144335.308.eml

Full analysis: https://app.any.run/tasks/d21198df-88e0-448a-8a9f-093177932081
Verdict: Malicious activity
Analysis date: October 20, 2020, 09:26:09
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: message/rfc822
File info: SMTP mail, ASCII text, with CRLF line terminators
MD5:

D63B5E4023179AB84864DAA600FC055F

SHA1:

BA5A23EA6E819FF1BD38A4446FFE8376ED205BA4

SHA256:

2AB5E52A57B4488EA28CB10790DABAEAE8C893F1CF8AEB5855050B8BCE09A3B2

SSDEEP:

49152:Ejo3SJ4L14hAy5KToVqntKUREo/LXOiAgcY84HuM4LEv:3

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Starts Internet Explorer

      • OUTLOOK.EXE (PID: 1496)
    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 1496)
    • Reads Internet Cache Settings

      • OUTLOOK.EXE (PID: 1496)
    • Creates files in the program directory

      • AdobeARM.exe (PID: 2484)
  • INFO

    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3340)
      • iexplore.exe (PID: 2752)
      • AcroRd32.exe (PID: 716)
      • iexplore.exe (PID: 3972)
      • AcroRd32.exe (PID: 3880)
    • Reads Microsoft Office registry keys

      • OUTLOOK.EXE (PID: 1496)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2752)
      • iexplore.exe (PID: 3340)
      • AcroRd32.exe (PID: 716)
    • Application launched itself

      • iexplore.exe (PID: 3340)
      • AcroRd32.exe (PID: 716)
      • RdrCEF.exe (PID: 3564)
      • AcroRd32.exe (PID: 2552)
      • AcroRd32.exe (PID: 2780)
    • Changes internet zones settings

      • iexplore.exe (PID: 3340)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2752)
      • iexplore.exe (PID: 3972)
    • Creates files in the user directory

      • iexplore.exe (PID: 2752)
      • iexplore.exe (PID: 3340)
      • iexplore.exe (PID: 3972)
    • Reads the hosts file

      • RdrCEF.exe (PID: 3564)
    • Changes IE settings (feature browser emulation)

      • AcroRd32.exe (PID: 716)
    • Changes settings of System certificates

      • iexplore.exe (PID: 3340)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 3340)
    • Dropped object may contain Bitcoin addresses

      • OUTLOOK.EXE (PID: 1496)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.eml | E-Mail message (Var. 7) (100)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
55
Monitored processes
17
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start outlook.exe iexplore.exe iexplore.exe acrord32.exe acrord32.exe no specs rdrcef.exe no specs rdrcef.exe no specs rdrcef.exe no specs acrord32.exe no specs acrord32.exe no specs rdrcef.exe no specs iexplore.exe adobearm.exe no specs reader_sl.exe no specs acrord32.exe no specs acrord32.exe no specs rdrcef.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1496"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE" /eml "C:\Users\admin\AppData\Local\Temp\report - 2020-10-20T144335.308.eml"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
14.0.6025.1000
3340"C:\Program Files\Internet Explorer\iexplore.exe" https://www.gonitro.com/C:\Program Files\Internet Explorer\iexplore.exe
OUTLOOK.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
2752"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3340 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
716"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\BWQ9XF7N\Power Technology Introduction Profile.pdf"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
OUTLOOK.EXE
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe Acrobat Reader DC
Version:
15.23.20070.215641
3880"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" --type=renderer "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\BWQ9XF7N\Power Technology Introduction Profile.pdf"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeAcroRd32.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe Acrobat Reader DC
Version:
15.23.20070.215641
3564"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16448250C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeAcroRd32.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe RdrCEF
Version:
15.23.20053.211670
2576"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-3d-apis --disable-databases --disable-direct-npapi-requests --disable-file-system --disable-notifications --disable-shared-workers --disable-direct-write --lang=en-US --lang=en-US --log-severity=disable --product-version="ReaderServices/15.23.20053 Chrome/45.0.2454.85" --device-scale-factor=1 --enable-delegated-renderer --num-raster-threads=2 --gpu-rasterization-msaa-sample-count=8 --content-image-texture-target=3553 --video-image-texture-target=3553 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --channel="3564.0.585824643\323948710" --allow-no-sandbox-job /prefetch:673131151C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeRdrCEF.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe RdrCEF
Version:
15.23.20053.211670
1724"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-3d-apis --disable-databases --disable-direct-npapi-requests --disable-file-system --disable-notifications --disable-shared-workers --disable-direct-write --lang=en-US --lang=en-US --log-severity=disable --product-version="ReaderServices/15.23.20053 Chrome/45.0.2454.85" --device-scale-factor=1 --enable-delegated-renderer --num-raster-threads=2 --gpu-rasterization-msaa-sample-count=8 --content-image-texture-target=3553 --video-image-texture-target=3553 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --channel="3564.1.1421288441\1971626436" --allow-no-sandbox-job /prefetch:673131151C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeRdrCEF.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe RdrCEF
Version:
15.23.20053.211670
2552"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\BWQ9XF7N\Power Technology-diploma Bitdefender.pdf"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeOUTLOOK.EXE
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe Acrobat Reader DC
Exit code:
1
Version:
15.23.20070.215641
4020"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" --type=renderer "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\BWQ9XF7N\Power Technology-diploma Bitdefender.pdf"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeAcroRd32.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe Acrobat Reader DC
Exit code:
1
Version:
15.23.20070.215641
Total events
2 968
Read events
2 219
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
240
Text files
193
Unknown types
139

Dropped files

PID
Process
Filename
Type
1496OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVR450C.tmp.cvr
MD5:
SHA256:
1496OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\tmp477E.tmp
MD5:
SHA256:
1496OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\tmp478F.tmp
MD5:
SHA256:
1496OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\tmp47A0.tmp
MD5:
SHA256:
1496OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\tmp47A1.tmp
MD5:
SHA256:
1496OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\tmp47B1.tmp
MD5:
SHA256:
1496OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\tmp47B2.tmp
MD5:
SHA256:
1496OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\tmp47C3.tmp
MD5:
SHA256:
1496OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\outlook logging\firstrun.logtext
MD5:10F34C2E68F8323FA59CAA3C031B82AE
SHA256:A1D8FDE1238F6BAF93767596A8031B900E074A7A1C7F3E575A576B6E1363E53E
1496OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\42A45DD0.datimage
MD5:6EA21BC8700B50E45F7B7594E816E83E
SHA256:60A432B44611512062E2BBAD53DA2E743A8F05F6021F79D1EB1593E9544BF57B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
116
TCP/UDP connections
233
DNS requests
91
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2752
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRJ9L2KGL92BpjF3kAtaDtxauTmhgQUPdNQpdagre7zSmAKZdMh1Pj41g8CEAZG7HHPRJlckO6ZxX5YrAc%3D
US
der
471 b
whitelisted
2752
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAGC%2BAmOouYmuRo7J4Qfua8%3D
US
der
1.47 Kb
whitelisted
2752
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRJ9L2KGL92BpjF3kAtaDtxauTmhgQUPdNQpdagre7zSmAKZdMh1Pj41g8CEAZG7HHPRJlckO6ZxX5YrAc%3D
US
der
471 b
whitelisted
2752
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEAx5qUSwjBGVIJJhX%2BJrHYM%3D
US
der
471 b
whitelisted
2752
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAGC%2BAmOouYmuRo7J4Qfua8%3D
US
der
1.47 Kb
whitelisted
2752
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTuqL92L3tjkN67RNFF%2FEdvT6NEzAQUwBKyKHRoRmfpcCV0GgBFWwZ9XEQCEAgt9o7pxpMVvr9yB5s4EP0%3D
US
der
471 b
whitelisted
2752
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTuqL92L3tjkN67RNFF%2FEdvT6NEzAQUwBKyKHRoRmfpcCV0GgBFWwZ9XEQCEAgt9o7pxpMVvr9yB5s4EP0%3D
US
der
471 b
whitelisted
2752
iexplore.exe
GET
304
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQS14tALDViBvqCf47YkiQRtKz1BAQUpc436uuwdQ6UZ4i0RfrZJBCHlh8CEAwkjOauwchyCqq7K0nUKbU%3D
US
der
471 b
whitelisted
2752
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D
US
der
1.47 Kb
whitelisted
2752
iexplore.exe
GET
304
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTuqL92L3tjkN67RNFF%2FEdvT6NEzAQUwBKyKHRoRmfpcCV0GgBFWwZ9XEQCEAgt9o7pxpMVvr9yB5s4EP0%3D
US
der
1.47 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2752
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
1496
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted
2752
iexplore.exe
104.16.158.102:443
www.gonitro.com
Cloudflare Inc
US
shared
2752
iexplore.exe
216.58.212.170:443
fonts.googleapis.com
Google Inc.
US
whitelisted
2752
iexplore.exe
104.16.119.102:443
www.gonitro.com
Cloudflare Inc
US
shared
2752
iexplore.exe
104.16.95.80:443
app-ab27.marketo.com
Cloudflare Inc
US
shared
2752
iexplore.exe
52.216.92.211:443
cf-nitroengassets-prod.s3.amazonaws.com
Amazon.com, Inc.
US
shared
2752
iexplore.exe
216.58.207.35:80
ocsp.pki.goog
Google Inc.
US
whitelisted
2752
iexplore.exe
34.96.102.137:443
dev.visualwebsiteoptimizer.com
US
suspicious
2752
iexplore.exe
172.217.21.232:443
www.googletagmanager.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted
www.gonitro.com
  • 104.16.119.102
  • 104.16.158.102
unknown
ocsp.digicert.com
  • 93.184.220.29
whitelisted
fonts.googleapis.com
  • 216.58.212.170
whitelisted
cf-nitroengassets-prod.s3.amazonaws.com
  • 52.216.92.211
shared
app-ab27.marketo.com
  • 104.16.95.80
  • 104.16.93.80
  • 104.16.92.80
  • 104.16.96.80
  • 104.16.94.80
suspicious
cdn.gonitro.com
  • 104.16.158.102
  • 104.16.119.102
unknown
dev.visualwebsiteoptimizer.com
  • 34.96.102.137
whitelisted
ocsp.pki.goog
  • 216.58.207.35
whitelisted
www.googletagmanager.com
  • 172.217.21.232
whitelisted

Threats

PID
Process
Class
Message
2752
iexplore.exe
Potentially Bad Traffic
ET INFO TLS Handshake Failure
2752
iexplore.exe
Potentially Bad Traffic
ET INFO TLS Handshake Failure
No debug info