File name:

RV%3a Documents Tender & Bue %2f%2f GEFCO - Ref %3a 850858001894 Vessel %3a NYK FURANO%2f041.eml

Full analysis: https://app.any.run/tasks/db12c941-6e5e-434d-9757-931af78a0ae6
Verdict: Malicious activity
Threats:

WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.

Analysis date: July 24, 2020, 23:11:46
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
stealer
rat
avemaria
Indicators:
MIME: message/rfc822
File info: news or mail, ASCII text, with CRLF line terminators
MD5:

626CC82942EB15533E0FFEA56E3A54E4

SHA1:

59658B55C388BDBA0C3CBD18AD267093074615B6

SHA256:

4ED892A944F45DE3B4BB5FB12A2FC70F8B6F21F596F407FD99354E9F8ACE5FC2

SSDEEP:

6144:07qZo7oHMHrzo+hTHeVNUfseG8KtILFHRuf1hwMIVzXuWQu0ufLaScuGcw9:8qZo7oHMHrzL9eTvcHRuh60u2ddcw9

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • SHIPMENT DOCS#850858001894 Vessel NYK FURANO041.exe (PID: 3680)
    • Changes settings of System certificates

      • SHIPMENT DOCS#850858001894 Vessel NYK FURANO041.exe (PID: 3680)
    • Loads the Task Scheduler COM API

      • schtasks.exe (PID: 3948)
    • Changes the autorun value in the registry

      • SHIPMENT DOCS#850858001894 Vessel NYK FURANO041.exe (PID: 3680)
    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 2856)
    • Actions looks like stealing of personal data

      • SHIPMENT DOCS#850858001894 Vessel NYK FURANO041.exe (PID: 3680)
    • Connects to CnC server

      • SHIPMENT DOCS#850858001894 Vessel NYK FURANO041.exe (PID: 3680)
    • AVEMARIA was detected

      • SHIPMENT DOCS#850858001894 Vessel NYK FURANO041.exe (PID: 3680)
  • SUSPICIOUS

    • Executed via COM

      • OUTLOOK.EXE (PID: 700)
    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 276)
      • SHIPMENT DOCS#850858001894 Vessel NYK FURANO041.exe (PID: 3680)
    • Reads Internet Cache Settings

      • OUTLOOK.EXE (PID: 276)
      • SHIPMENT DOCS#850858001894 Vessel NYK FURANO041.exe (PID: 3680)
    • Adds / modifies Windows certificates

      • SHIPMENT DOCS#850858001894 Vessel NYK FURANO041.exe (PID: 3680)
    • Starts CMD.EXE for commands execution

      • Notepad.exe (PID: 572)
    • Executable content was dropped or overwritten

      • SHIPMENT DOCS#850858001894 Vessel NYK FURANO041.exe (PID: 3680)
      • WinRAR.exe (PID: 1328)
    • Uses REG.EXE to modify Windows registry

      • cmd.exe (PID: 2856)
    • Loads DLL from Mozilla Firefox

      • SHIPMENT DOCS#850858001894 Vessel NYK FURANO041.exe (PID: 3680)
    • Reads the machine GUID from the registry

      • SHIPMENT DOCS#850858001894 Vessel NYK FURANO041.exe (PID: 3680)
  • INFO

    • Manual execution by user

      • WinRAR.exe (PID: 1328)
      • WinRAR.exe (PID: 2888)
      • SHIPMENT DOCS#850858001894 Vessel NYK FURANO041.exe (PID: 3680)
    • Reads Microsoft Office registry keys

      • OUTLOOK.EXE (PID: 276)
      • OUTLOOK.EXE (PID: 700)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.eml | E-Mail message (Var. 2) (100)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
50
Monitored processes
11
Malicious processes
1
Suspicious processes
2

Behavior graph

Click at the process to see the details
start outlook.exe outlook.exe no specs winrar.exe winrar.exe no specs #AVEMARIA shipment docs#850858001894 vessel  nyk furano041.exe notepad.exe no specs cmd.exe no specs reg.exe no specs reg.exe no specs schtasks.exe no specs reg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
276"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE" /eml "C:\Users\admin\AppData\Local\Temp\692c7610-3282-4d26-877d-0e4e17ba61f5.eml"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Exit code:
0
Version:
14.0.6025.1000
Modules
Images
c:\progra~1\micros~1\office14\outlook.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
572"C:\Windows\System32\Notepad.exe"C:\Windows\System32\Notepad.exeSHIPMENT DOCS#850858001894 Vessel NYK FURANO041.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
700"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE" -EmbeddingC:\Program Files\Microsoft Office\Office14\OUTLOOK.EXEsvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Exit code:
0
Version:
14.0.6025.1000
Modules
Images
c:\progra~1\micros~1\office14\outlook.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1328"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\SHIPMENT DOCS#850858001894 Vessel NYK FURANO041.r00"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1744reg delete hkcu\Environment /v windir /f C:\Windows\system32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1828reg delete hkcu\Environment /v windir /f C:\Windows\system32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1912reg add hkcu\Environment /v windir /d "cmd /c start /min C:\Users\Public\x.bat reg delete hkcu\Environment /v windir /f && REM "C:\Windows\system32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2856cmd /c ""C:\Users\Public\Natso.bat" "C:\Windows\System32\cmd.exeNotepad.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2888"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\SHIPMENT DOCS#850858001894 Vessel NYK FURANO041.r00"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3680"C:\Users\admin\Desktop\SHIPMENT DOCS#850858001894 Vessel NYK FURANO041.exe" C:\Users\admin\Desktop\SHIPMENT DOCS#850858001894 Vessel NYK FURANO041.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\shipment docs#850858001894 vessel nyk furano041.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
Total events
2 725
Read events
1 707
Write events
994
Delete events
24

Modification events

(PID) Process:(276) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
Off
(PID) Process:(276) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1041
Value:
Off
(PID) Process:(276) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1046
Value:
Off
(PID) Process:(276) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1036
Value:
Off
(PID) Process:(276) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1031
Value:
Off
(PID) Process:(276) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1040
Value:
Off
(PID) Process:(276) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1049
Value:
Off
(PID) Process:(276) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:3082
Value:
Off
(PID) Process:(276) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1042
Value:
Off
(PID) Process:(276) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1055
Value:
Off
Executable files
2
Suspicious files
6
Text files
35
Unknown types
3

Dropped files

PID
Process
Filename
Type
276OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVRE1A6.tmp.cvr
MD5:
SHA256:
276OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\tmpE3BA.tmp
MD5:
SHA256:
700OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVR178B.tmp.cvr
MD5:
SHA256:
276OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\tmp1B17.tmp
MD5:
SHA256:
276OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\F7U3RPI8\SHIPMENT DOCS#850858001894 Vessel NYK FURANO041 (2).r00\:Zone.Identifier:$DATA
MD5:
SHA256:
3680SHIPMENT DOCS#850858001894 Vessel NYK FURANO041.exeC:\Users\admin\AppData\Local\Temp\Cab7064.tmp
MD5:
SHA256:
3680SHIPMENT DOCS#850858001894 Vessel NYK FURANO041.exeC:\Users\admin\AppData\Local\Temp\Tar7065.tmp
MD5:
SHA256:
276OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\outlook logging\firstrun.logtext
MD5:
SHA256:
276OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmpgc
MD5:
SHA256:
1328WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1328.22463\SHIPMENT DOCS#850858001894 Vessel NYK FURANO041.exeexecutable
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
6
DNS requests
6
Threats
6

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
276
OUTLOOK.EXE
GET
64.4.26.155:80
http://config.messenger.msn.com/config/msgrconfig.asmx?op=GetOlcConfig
US
whitelisted
3680
SHIPMENT DOCS#850858001894 Vessel NYK FURANO041.exe
GET
200
151.139.128.14:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEBblhnjgcJQ5S9%2FbTvymO98%3D
US
der
471 b
whitelisted
3680
SHIPMENT DOCS#850858001894 Vessel NYK FURANO041.exe
GET
200
151.139.128.14:80
http://ocsp.comodoca4.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrJdiQ%2Ficg9B19asFe73bPYs%2BreAQUdXGnGUgZvJ2d6kFH35TESHeZ03kCEFslzmkHxCZVZtM5DJmpVK0%3D
US
der
313 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
276
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted
3680
SHIPMENT DOCS#850858001894 Vessel NYK FURANO041.exe
162.159.129.233:443
cdn.discordapp.com
Cloudflare Inc
shared
2.18.233.62:443
www.microsoft.com
Akamai International B.V.
whitelisted
3680
SHIPMENT DOCS#850858001894 Vessel NYK FURANO041.exe
151.139.128.14:80
ocsp.comodoca.com
Highwinds Network Group, Inc.
US
suspicious
3680
SHIPMENT DOCS#850858001894 Vessel NYK FURANO041.exe
84.38.135.151:3670
story43.ddns.net
DataClub S.A.
NL
malicious

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted
www.microsoft.com
  • 2.18.233.62
whitelisted
cdn.discordapp.com
  • 162.159.129.233
  • 162.159.130.233
  • 162.159.134.233
  • 162.159.135.233
  • 162.159.133.233
shared
ocsp.comodoca.com
  • 151.139.128.14
whitelisted
ocsp.comodoca4.com
  • 151.139.128.14
whitelisted
story43.ddns.net
  • 84.38.135.151
malicious

Threats

PID
Process
Class
Message
1048
svchost.exe
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
3680
SHIPMENT DOCS#850858001894 Vessel NYK FURANO041.exe
A Network Trojan was detected
AV TROJAN Ave Maria RAT CnC Response
3680
SHIPMENT DOCS#850858001894 Vessel NYK FURANO041.exe
A Network Trojan was detected
MALWARE [PTsecurity] AveMaria.RAT Encrypted Checkin
3680
SHIPMENT DOCS#850858001894 Vessel NYK FURANO041.exe
A Network Trojan was detected
MALWARE [PTsecurity] AveMaria.RAT Connection
2 ETPRO signatures available at the full report
No debug info