analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

RV IMPORTANTE LA FISCALIA GENERAL DE LA NACION LE HACE EL ULTIMO LLAMADO A INTERROGATORIO.msg

Full analysis: https://app.any.run/tasks/36d451aa-d7d3-40e4-8124-d41e88e7f87e
Verdict: Malicious activity
Analysis date: October 09, 2019, 19:22:34
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/vnd.ms-outlook
File info: CDFV2 Microsoft Outlook Message
MD5:

0A454452DCBD5E58AC5C33A2106693DC

SHA1:

E0D9A916EAE66CD750E74EF0343C8EB2F228BB2C

SHA256:

511ED8C5EAF4E7567827D3994FA4B194E34EF4B7BAA4E6CEF524D95BF8786D03

SSDEEP:

3072:wIOdNVMZnybfkb4Xaa46W7p2mtxqoHmjwtEytYOvKgy7BT12F:ienp4X5462dBGjwtDYelAM

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Unusual execution from Microsoft Office

      • OUTLOOK.EXE (PID: 2360)
  • SUSPICIOUS

    • Starts Microsoft Office Application

      • WinRAR.exe (PID: 1732)
    • Reads Internet Cache Settings

      • OUTLOOK.EXE (PID: 2360)
    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 2360)
  • INFO

    • Creates files in the user directory

      • WINWORD.EXE (PID: 2384)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 2384)
      • OUTLOOK.EXE (PID: 2360)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msg | Outlook Message (58.9)
.oft | Outlook Form Template (34.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start outlook.exe winrar.exe no specs winword.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2360"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\admin\AppData\Local\Temp\RV IMPORTANTE LA FISCALIA GENERAL DE LA NACION LE HACE EL ULTIMO LLAMADO A INTERROGATORIO.msg"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
14.0.6025.1000
1732"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\QJAOCL81\Citacion Fiscalia general de la Nacion Proceso 305351T.rar"C:\Program Files\WinRAR\WinRAR.exeOUTLOOK.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
2384"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\Rar$DIb1732.2496\Citacion Fiscalia general de la Nacion Proceso 305351T.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
Total events
2 178
Read events
1 744
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
2
Text files
27
Unknown types
3

Dropped files

PID
Process
Filename
Type
2360OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVRDFC.tmp.cvr
MD5:
SHA256:
2360OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\QJAOCL81\Citacion Fiscalia general de la Nacion Proceso 305351T (2).rar\:Zone.Identifier:$DATA
MD5:
SHA256:
2384WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVREDDC.tmp.cvr
MD5:
SHA256:
2360OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmpgc
MD5:21810E24690C6943B014F3D3C08EA9FD
SHA256:D7DA5C29129BFA6B9232CF207066A24055571C951B852A02CAA1B5125F0B5F52
2360OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\QJAOCL81\Citacion Fiscalia general de la Nacion Proceso 305351T.rarcompressed
MD5:99B258E9E06158CFA17EE235A280773A
SHA256:4FC3905869408EF88C6005A1D1B60ECDDB16B87B07CAA4936515FEE1D36942F1
1732WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIb1732.2496\Citacion Fiscalia general de la Nacion Proceso 305351T.doctext
MD5:E3050E63631CCDF69322DC89BF715667
SHA256:BB513C3AD2340E8A4A395453273C72041C070FAFD31427ACEAA1A6538D9F0E91
2360OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\QJAOCL81\Citacion Fiscalia general de la Nacion Proceso 305351T (2).rarcompressed
MD5:99B258E9E06158CFA17EE235A280773A
SHA256:4FC3905869408EF88C6005A1D1B60ECDDB16B87B07CAA4936515FEE1D36942F1
2384WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:8513C025A313473CAA535BBFEE9504D8
SHA256:C1A9E80B58A5B98E1A3A76069DA826D8EA496A4CEC5C0999EAB2D8CA50C9EADF
2384WINWORD.EXEC:\Users\admin\AppData\Local\Temp\Rar$DIb1732.2496\~$tacion Fiscalia general de la Nacion Proceso 305351T.docpgc
MD5:D1166740CC3A3A721E17E2603579F36F
SHA256:F36059E62F84AC26605D6C67A40D6D8BA7DFEA7DD24E4574E3C12B5F360BFC28
2360OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\{5B358774-03C8-4DCC-A642-3DFFE12CDC4B}\{1C306CB1-771E-4B4B-A902-86E897877F5B}.pngimage
MD5:7D80C0A7E3849818695EAF4989186A3C
SHA256:72DC527D78A8E99331409803811CC2D287E812C008A1C869A6AEA69D7A44B597
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2360
OUTLOOK.EXE
GET
64.4.26.155:80
http://config.messenger.msn.com/config/msgrconfig.asmx?op=GetOlcConfig
US
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2360
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted

Threats

No threats detected
No debug info