analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Ariadna shared Video Tutoriales with you (157 KB).msg

Full analysis: https://app.any.run/tasks/c2343414-da30-472b-8764-d217be69ae6d
Verdict: Malicious activity
Analysis date: December 06, 2019, 12:25:58
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/vnd.ms-outlook
File info: CDFV2 Microsoft Outlook Message
MD5:

6D63EB44AA24612BE530DBCED060C062

SHA1:

BA4027384974276CFE9D94E5B54A0E1665B8970B

SHA256:

3C66E67BA13788E952270632AF3D4B90BFE16A54E01D8426E590B4BF0379DCBC

SSDEEP:

384:DdMJ/riTK0xpl0LmdCUitS1+lcYmlTh6763sW6I87Ppp8Lu+x:Dd2/riTrYpU7kcYmlThuCvsX8R

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Unusual execution from Microsoft Office

      • OUTLOOK.EXE (PID: 2420)
  • SUSPICIOUS

    • Reads Internet Cache Settings

      • OUTLOOK.EXE (PID: 2420)
    • Starts Internet Explorer

      • OUTLOOK.EXE (PID: 2420)
    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 2420)
  • INFO

    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3800)
      • iexplore.exe (PID: 1028)
      • iexplore.exe (PID: 2600)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3800)
      • iexplore.exe (PID: 1028)
      • iexplore.exe (PID: 2600)
    • Application launched itself

      • iexplore.exe (PID: 2344)
    • Changes internet zones settings

      • iexplore.exe (PID: 2344)
    • Reads Microsoft Office registry keys

      • OUTLOOK.EXE (PID: 2420)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msg | Outlook Message (58.9)
.oft | Outlook Form Template (34.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start outlook.exe iexplore.exe iexplore.exe iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
2420"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\admin\AppData\Local\Temp\Ariadna shared Video Tutoriales with you (157 KB).msg"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
14.0.6025.1000
2344"C:\Program Files\Internet Explorer\iexplore.exe" http://brandfactory.telefonica.com/hub/183C:\Program Files\Internet Explorer\iexplore.exe
OUTLOOK.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3800"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2344 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
1028"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2344 CREDAT:6403C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2600"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2344 CREDAT:6406C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Total events
2 230
Read events
1 594
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
58
Unknown types
4

Dropped files

PID
Process
Filename
Type
2420OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVRA7C4.tmp.cvr
MD5:
SHA256:
2420OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmpgc
MD5:09AB0697DC20DFEBD4266344537FEA97
SHA256:8C3DC3FA56BA2EA0B99A28B5C58C2C7868F36DD89DF36BE3D7FD24D5716EC53C
2420OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\outlook logging\firstrun.logtext
MD5:735084E780B16D8DFC3D7DE834CBAD82
SHA256:D11610351E201F6E829E90482DEAE5D31B6D680A6AE3B91BF74A80FA79FD0837
3800iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.datdat
MD5:30BCD440C6AA78290A17E59D9A1FD2AD
SHA256:3300E7F8F18F0F06022F4CB0CA0B08A58A4151C15FEC1EC66F013AB80F8B7A5C
3800iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\R7Z8I09D\errorPageStrings[1]text
MD5:1A0563F7FB85A678771450B131ED66FD
SHA256:EB5678DE9D8F29CA6893D4E6CA79BD5AB4F312813820FE4997B009A2B1A1654C
3800iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2BUXJD9W\dnserror[1]html
MD5:68E03ED57EC741A4AFBBCD11FAB1BDBE
SHA256:1FF3334C3EB27033F8F37029FD72F648EDD4551FCE85FC1F5159FEAEA1439630
2420OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_ContactPrefs_2_0915D7308F6E8144AEF53B66543154B7.datxml
MD5:BBCF400BD7AE536EB03054021D6A6398
SHA256:383020065C1F31F4FB09F448599A6D5E532C390AF4E5B8AF0771FE17A23222AD
2420OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_WorkHours_1_B7DBCFFFD09438419D5C3E42CE44B7F2.datxml
MD5:807EF0FC900FEB3DA82927990083D6E7
SHA256:4411E7DC978011222764943081500FFF0E43CBF7CCD44264BD1AB6306CA68913
2420OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\mapisvc.inftext
MD5:48DD6CAE43CE26B992C35799FCD76898
SHA256:7BFE1F3691E2B4FB4D61FBF5E9F7782FBE49DA1342DBD32201C2CC8E540DBD1A
2344iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\favicon[1].ico
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
17
DNS requests
3
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2420
OUTLOOK.EXE
GET
64.4.26.155:80
http://config.messenger.msn.com/config/msgrconfig.asmx?op=GetOlcConfig
US
whitelisted
2600
iexplore.exe
GET
301
18.194.127.6:80
http://brandfactory.telefonica.com/hub/183
DE
html
150 b
shared
2344
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
3800
iexplore.exe
GET
301
18.194.127.6:80
http://brandfactory.telefonica.com/hub/183
DE
html
150 b
shared
1028
iexplore.exe
GET
301
18.194.127.6:80
http://brandfactory.telefonica.com/hub/183
DE
html
150 b
shared
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2420
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted
2600
iexplore.exe
18.194.127.6:80
brandfactory.telefonica.com
Amazon.com, Inc.
DE
unknown
18.194.127.6:80
brandfactory.telefonica.com
Amazon.com, Inc.
DE
unknown
1028
iexplore.exe
18.194.127.6:443
brandfactory.telefonica.com
Amazon.com, Inc.
DE
unknown
3800
iexplore.exe
18.194.127.6:443
brandfactory.telefonica.com
Amazon.com, Inc.
DE
unknown
1028
iexplore.exe
18.194.127.6:80
brandfactory.telefonica.com
Amazon.com, Inc.
DE
unknown
2600
iexplore.exe
18.194.127.6:443
brandfactory.telefonica.com
Amazon.com, Inc.
DE
unknown

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted
brandfactory.telefonica.com
  • 18.194.127.6
  • 18.184.30.93
  • 52.57.34.235
unknown
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted

Threats

No threats detected
No debug info