analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

PAYMENT.eml

Full analysis: https://app.any.run/tasks/de85ed86-155f-4f0b-bc9e-002d25ce76e8
Verdict: Malicious activity
Analysis date: November 08, 2019, 14:10:24
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: message/rfc822
File info: RFC 822 mail, ASCII text, with CRLF line terminators
MD5:

509B153C4805A16CB1029B332280700F

SHA1:

2C1369EC595D3DF5E88FB99536B921F05893D7BD

SHA256:

34F342B64C44D4ABA35A7E666AEDA054EC64AD4837A35C5B7B4EBA2CA9F7BF73

SSDEEP:

768:YPYxuH8YNGP1n/uroLqxzPNcVX7BLQJvGuiM9ldCc3otwDAu1lUXz+6:fkDN41YomgJsGulvfAMOXp

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Internet Cache Settings

      • OUTLOOK.EXE (PID: 3180)
    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 3180)
    • Application launched itself

      • EXCEL.EXE (PID: 4056)
    • Writes to a desktop.ini file (may be used to cloak folders)

      • EXCEL.EXE (PID: 1536)
      • EXCEL.EXE (PID: 3960)
    • Starts Microsoft Office Application

      • OUTLOOK.EXE (PID: 3180)
      • EXCEL.EXE (PID: 4056)
  • INFO

    • Creates files in the user directory

      • EXCEL.EXE (PID: 4056)
    • Reads Microsoft Office registry keys

      • EXCEL.EXE (PID: 1536)
      • EXCEL.EXE (PID: 3960)
      • EXCEL.EXE (PID: 4056)
      • OUTLOOK.EXE (PID: 3180)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.eml | E-Mail message (Var. 5) (100)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
4
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start outlook.exe excel.exe no specs excel.exe no specs excel.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3180"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE" /eml "C:\Users\admin\AppData\Local\Temp\PAYMENT.eml"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
14.0.6025.1000
1536"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /EmbeddingC:\Program Files\Microsoft Office\Office14\EXCEL.EXEOUTLOOK.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Excel
Version:
14.0.6024.1000
4056"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /ddeC:\Program Files\Microsoft Office\Office14\EXCEL.EXEOUTLOOK.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Version:
14.0.6024.1000
3960"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /EmbeddingC:\Program Files\Microsoft Office\Office14\EXCEL.EXEEXCEL.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Excel
Exit code:
0
Version:
14.0.6024.1000
Total events
2 783
Read events
2 148
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
6
Text files
45
Unknown types
7

Dropped files

PID
Process
Filename
Type
3180OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVRA7D3.tmp.cvr
MD5:
SHA256:
3180OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\W39QQAW9\PAYMENT COPY (2).xlsx\:Zone.Identifier:$DATA
MD5:
SHA256:
3180OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\OICE_372D60CB-0742-40A9-ACC3-0857D5A84B46.0\AA0C8F96.xlsx\:Zone.Identifier:$DATA
MD5:
SHA256:
3180OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmpgc
MD5:24559F3900F41EE72D8CCBA2755F9AF1
SHA256:F05DE2C04E241A4F99B0BDF8DEF0410F89337F419E8BD9863285807E0338FE30
3180OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\outlook logging\firstrun.logtext
MD5:2E36D02271EED718DDABD5644248C601
SHA256:F7A57060B8E5387F44A6B3A44B2AFCDDA42F86FB9180B32A182423041231EF00
3180OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\W39QQAW9\PAYMENT COPY.xlsxdocument
MD5:B2088CD1D007CA2ECF4E6D495A98211F
SHA256:1BFC8204774B85511198B07B2616E941F6733B9F8A6C67A0C8F139AEFBAE5FAF
3180OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\W39QQAW9\PAYMENT COPY (2).xlsxdocument
MD5:B2088CD1D007CA2ECF4E6D495A98211F
SHA256:1BFC8204774B85511198B07B2616E941F6733B9F8A6C67A0C8F139AEFBAE5FAF
1536EXCEL.EXEC:\Users\admin\AppData\Local\Temp\OICE_372D60CB-0742-40A9-ACC3-0857D5A84B46.0\msoEE71.tmpcompressed
MD5:FF6B371A2F0847F86B45179116CF8B1A
SHA256:46B5EFA9EF9176D3F9EF90404B8B7DF060B0ADCBDCFDB1FE62761EFC4EB272E3
3180OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\OICE_372D60CB-0742-40A9-ACC3-0857D5A84B46.0\AA0C8F96.xlsxdocument
MD5:B2088CD1D007CA2ECF4E6D495A98211F
SHA256:1BFC8204774B85511198B07B2616E941F6733B9F8A6C67A0C8F139AEFBAE5FAF
3180OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\mapisvc.inftext
MD5:48DD6CAE43CE26B992C35799FCD76898
SHA256:7BFE1F3691E2B4FB4D61FBF5E9F7782FBE49DA1342DBD32201C2CC8E540DBD1A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
1
DNS requests
19
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3180
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted
transspectr.ru
suspicious

Threats

No threats detected
No debug info