analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Test.msg

Full analysis: https://app.any.run/tasks/8b477026-d344-450f-aad0-ea533a818c53
Verdict: Malicious activity
Analysis date: May 15, 2019, 15:58:49
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
phishing
phish-pdf
phish-securepdf
Indicators:
MIME: application/vnd.ms-outlook
File info: CDFV2 Microsoft Outlook Message
MD5:

CDC611E1EF0204DBC5CCFC2E19CAAC8A

SHA1:

E3AEB24AD508C93E380D44B7CE25E62C64B45DAA

SHA256:

58C85D50C1B3D3E396B46F763F36272F6BBCE47B7848EE5058B8C4636621A099

SSDEEP:

768:EAQpPFSh2ZsKzsK1mVJYjzritp4aCKtEr287:MtShGL93itmaCR

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Unusual execution from Microsoft Office

      • OUTLOOK.EXE (PID: 2888)
  • SUSPICIOUS

    • Starts Internet Explorer

      • OUTLOOK.EXE (PID: 2888)
    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 2888)
    • Reads Internet Cache Settings

      • OUTLOOK.EXE (PID: 2888)
    • Creates files in the program directory

      • AdobeARM.exe (PID: 4084)
  • INFO

    • Changes internet zones settings

      • iexplore.exe (PID: 3104)
    • Reads internet explorer settings

      • iexplore.exe (PID: 764)
      • iexplore.exe (PID: 3040)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3104)
    • Creates files in the user directory

      • iexplore.exe (PID: 3040)
      • iexplore.exe (PID: 764)
      • iexplore.exe (PID: 3104)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3104)
      • iexplore.exe (PID: 3040)
      • iexplore.exe (PID: 764)
    • Application launched itself

      • iexplore.exe (PID: 3104)
      • AcroRd32.exe (PID: 3148)
      • RdrCEF.exe (PID: 2176)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 3104)
    • Changes settings of System certificates

      • iexplore.exe (PID: 3104)
    • Reads Microsoft Office registry keys

      • OUTLOOK.EXE (PID: 2888)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msg | Outlook Message (58.9)
.oft | Outlook Form Template (34.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
47
Monitored processes
11
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start outlook.exe iexplore.exe iexplore.exe acrord32.exe acrord32.exe no specs iexplore.exe rdrcef.exe no specs rdrcef.exe no specs rdrcef.exe no specs adobearm.exe no specs reader_sl.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2888"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\admin\AppData\Local\Temp\Test.msg"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
14.0.6025.1000
3104"C:\Program Files\Internet Explorer\iexplore.exe" https://1drv.ms/b/s!Aj3VQTYQpc3zgSKpL3d9GNJw79gSC:\Program Files\Internet Explorer\iexplore.exe
OUTLOOK.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
764"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3104 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3148"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PFCRR637\RedWood%20Invoice[1].pdf"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
iexplore.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe Acrobat Reader DC
Version:
15.23.20070.215641
3064"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" --type=renderer "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PFCRR637\RedWood%20Invoice[1].pdf"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeAcroRd32.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe Acrobat Reader DC
Version:
15.23.20070.215641
3040"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3104 CREDAT:6405C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2176"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16448250C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeAcroRd32.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe RdrCEF
Version:
15.23.20053.211670
3976"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-3d-apis --disable-databases --disable-direct-npapi-requests --disable-file-system --disable-notifications --disable-shared-workers --disable-direct-write --lang=en-US --lang=en-US --log-severity=disable --product-version="ReaderServices/15.23.20053 Chrome/45.0.2454.85" --device-scale-factor=1 --enable-delegated-renderer --num-raster-threads=2 --gpu-rasterization-msaa-sample-count=8 --content-image-texture-target=3553 --video-image-texture-target=3553 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --channel="2176.0.628110160\1560776853" --allow-no-sandbox-job /prefetch:673131151C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeRdrCEF.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe RdrCEF
Version:
15.23.20053.211670
1012"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-3d-apis --disable-databases --disable-direct-npapi-requests --disable-file-system --disable-notifications --disable-shared-workers --disable-direct-write --lang=en-US --lang=en-US --log-severity=disable --product-version="ReaderServices/15.23.20053 Chrome/45.0.2454.85" --device-scale-factor=1 --enable-delegated-renderer --num-raster-threads=2 --gpu-rasterization-msaa-sample-count=8 --content-image-texture-target=3553 --video-image-texture-target=3553 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --channel="2176.1.1440383222\1065941499" --allow-no-sandbox-job /prefetch:673131151C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeRdrCEF.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe RdrCEF
Version:
15.23.20053.211670
4084"C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" /PRODUCT:Reader /VERSION:15.0 /MODE:3C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exeAcroRd32.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe Reader and Acrobat Manager
Version:
1.824.27.2646
Total events
2 409
Read events
1 862
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
2
Text files
138
Unknown types
27

Dropped files

PID
Process
Filename
Type
2888OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVRFE91.tmp.cvr
MD5:
SHA256:
2888OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmpgc
MD5:F49B2DBD94245CD778EB04FC691B8C48
SHA256:D53CB92A961F7B4009F036F537EBB1215BC613D42E0CDCF849AC13BF84C6C609
2888OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3E136AD5.datimage
MD5:ED25EFC7177E418C07062A1DE93057C9
SHA256:A061B9A63345EBD6C3CEFB886CB144853C99B6EDF6B95A6BC75EE8C6EC578F31
2888OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\525A4AD2.datimage
MD5:4F862FAF7278A866DBFBE283B96B7E38
SHA256:F98C97D5E67C0C3A9EE45B664F15A5C2BF628A3352D42798BF7AD2C1B19F246B
3104iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\favicon[1].ico
MD5:
SHA256:
3104iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
764iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.datdat
MD5:2A9ABBE375B98B243B8F4C71170E5D0E
SHA256:3538C031CA00F3DF84B2697DB9E6D5E8AA4181418C464BDA056CC0E65890D8C9
2888OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\mapisvc.inftext
MD5:48DD6CAE43CE26B992C35799FCD76898
SHA256:7BFE1F3691E2B4FB4D61FBF5E9F7782FBE49DA1342DBD32201C2CC8E540DBD1A
2888OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\{E577EE1C-8D95-433B-BBFC-558A5FC55534}\{1C306CB1-771E-4B4B-A902-86E897877F5B}.pngimage
MD5:7D80C0A7E3849818695EAF4989186A3C
SHA256:72DC527D78A8E99331409803811CC2D287E812C008A1C869A6AEA69D7A44B597
764iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\desktop.iniini
MD5:4A3DEB274BB5F0212C2419D3D8D08612
SHA256:2842973D15A14323E08598BE1DFB87E54BF88A76BE8C7BC94C56B079446EDF38
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
39
DNS requests
18
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2888
OUTLOOK.EXE
GET
64.4.26.155:80
http://config.messenger.msn.com/config/msgrconfig.asmx?op=GetOlcConfig
US
whitelisted
3148
AcroRd32.exe
GET
304
2.16.186.33:80
http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/281_15_23_20070.zip
unknown
whitelisted
3148
AcroRd32.exe
GET
304
2.16.186.33:80
http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/280_15_23_20070.zip
unknown
whitelisted
3148
AcroRd32.exe
GET
304
2.16.186.33:80
http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/message.zip
unknown
whitelisted
3148
AcroRd32.exe
GET
304
2.16.186.33:80
http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/277_15_23_20070.zip
unknown
whitelisted
3148
AcroRd32.exe
GET
304
2.16.186.33:80
http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/278_15_23_20070.zip
unknown
whitelisted
3104
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3104
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
764
iexplore.exe
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
764
iexplore.exe
2.16.186.25:443
spoprod-a.akamaihd.net
Akamai International B.V.
whitelisted
3104
iexplore.exe
2.19.37.83:443
p.sfx.ms
Akamai International B.V.
whitelisted
2888
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted
764
iexplore.exe
13.107.42.12:443
1drv.ms
Microsoft Corporation
US
suspicious
764
iexplore.exe
52.142.114.2:443
c.live.com
Microsoft Corporation
IE
whitelisted
764
iexplore.exe
2.19.37.83:443
p.sfx.ms
Akamai International B.V.
whitelisted
764
iexplore.exe
13.107.42.13:443
onedrive.live.com
Microsoft Corporation
US
malicious
764
iexplore.exe
23.43.112.150:443
r3.res.outlook.com
Akamai International B.V.
NL
whitelisted

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted
1drv.ms
  • 13.107.42.12
shared
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
onedrive.live.com
  • 13.107.42.13
shared
spoprod-a.akamaihd.net
  • 2.16.186.25
  • 2.16.186.40
whitelisted
p.sfx.ms
  • 2.19.37.83
whitelisted
c.live.com
  • 52.142.114.2
whitelisted
c.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
r3.res.outlook.com
  • 23.43.112.150
whitelisted
skyapi.onedrive.live.com
  • 40.90.136.179
shared

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET INFO DNS Query for Suspicious .cf Domain
3040
iexplore.exe
Potentially Bad Traffic
ET INFO Suspicious Domain (*.cf) in TLS SNI
No debug info