analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

phish_alert_iocp_v1.3.98 (10).eml

Full analysis: https://app.any.run/tasks/d7060e91-90ef-48b7-88b7-46c9e759d911
Verdict: Malicious activity
Analysis date: May 20, 2022, 18:07:30
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: message/rfc822
File info: RFC 822 mail, ASCII text, with very long lines, with CRLF line terminators
MD5:

4DD486EBECCD38B16B4D9C75877C6DEF

SHA1:

0A4F970E5C2E3B433844D470BEF6E06208B75610

SHA256:

5ADD61D42BBE9DAF804EF2D208E923682F877D1D6FE4CAB621FEC8F2EC491F31

SSDEEP:

768:IEBb6qnSaYKhp9+6jh8MdnofWG3VJXMb9s9m9X9Lx9QLj:IEBb6qnSaYKhp9+6jh8knofWG3V9eEiq

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads the computer name

      • OUTLOOK.EXE (PID: 2964)
    • Checks supported languages

      • OUTLOOK.EXE (PID: 2964)
    • Searches for installed software

      • OUTLOOK.EXE (PID: 2964)
    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 2964)
    • Starts Internet Explorer

      • OUTLOOK.EXE (PID: 2964)
    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 3932)
      • iexplore.exe (PID: 3064)
  • INFO

    • Reads the computer name

      • iexplore.exe (PID: 3648)
      • iexplore.exe (PID: 3932)
      • iexplore.exe (PID: 3064)
    • Checks supported languages

      • iexplore.exe (PID: 3648)
      • iexplore.exe (PID: 3932)
      • iexplore.exe (PID: 3064)
    • Changes internet zones settings

      • iexplore.exe (PID: 3648)
    • Application launched itself

      • iexplore.exe (PID: 3648)
    • Creates files in the user directory

      • iexplore.exe (PID: 3932)
      • iexplore.exe (PID: 3648)
      • iexplore.exe (PID: 3064)
    • Dropped object may contain Bitcoin addresses

      • iexplore.exe (PID: 3932)
      • iexplore.exe (PID: 3064)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3932)
      • iexplore.exe (PID: 3648)
      • iexplore.exe (PID: 3064)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 3932)
      • iexplore.exe (PID: 3064)
      • iexplore.exe (PID: 3648)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3932)
      • iexplore.exe (PID: 3064)
    • Reads Microsoft Office registry keys

      • OUTLOOK.EXE (PID: 2964)
    • Changes settings of System certificates

      • iexplore.exe (PID: 3648)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 3648)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.eml | E-Mail message (Var. 5) (100)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start outlook.exe iexplore.exe iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
2964"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE" /eml "C:\Users\admin\AppData\Local\Temp\phish_alert_iocp_v1.3.98 (10).eml"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
14.0.6025.1000
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\microsoft office\office14\outlook.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\version.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\system32\sechost.dll
c:\windows\system32\lpk.dll
3648"C:\Program Files\Internet Explorer\iexplore.exe" https://teams.microsoft.com/l/home?tenantId=7eea480e-2e42-4bbd-8266-1579a508ffdcC:\Program Files\Internet Explorer\iexplore.exe
OUTLOOK.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
3932"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3648 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\sechost.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
c:\windows\system32\version.dll
c:\windows\system32\rpcrt4.dll
3064"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3648 CREDAT:2168072 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
c:\windows\system32\rpcrt4.dll
Total events
23 148
Read events
22 400
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
10
Text files
45
Unknown types
7

Dropped files

PID
Process
Filename
Type
2964OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVRD306.tmp.cvr
MD5:
SHA256:
2964OUTLOOK.EXEC:\Users\admin\Documents\Outlook Files\Outlook Data File - NoMail.pst
MD5:
SHA256:
2964OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\outlook logging\firstrun.logtext
MD5:283E60AEEAF56F2347907930045834BC
SHA256:43F619D229AB8FE3431AA6BAFA3521A496796AF99D61516F481421817A216CC1
2964OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmpgc
MD5:90AF9E95B35F1548ECB6375F6555A19B
SHA256:5F10D621B4CA7422DD5DB57331CD2865CB6547A95776FB80A9F5A8B78C8CE184
3648iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63der
MD5:AC8FE9D561E9E7288AECF13F03AEA3D1
SHA256:CECD911136F3CCBE6F4869CBCBD9FD15B3FA91CD2FD49B9655FA3BCF8E932C05
3932iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:A4A97513F99BAB0965B5716317A5B017
SHA256:011788A8A3219FB30214B13B37FE19E3EE884367EF2C129355A1BA97EEAEF2B0
3932iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442binary
MD5:3246543593CED88366BF7F5455C37D52
SHA256:35A76F7996B6C3538603361F3F447B7F6EF5EDC50976A1FC73EB557C3375279C
3932iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\UQSLYJYY.txttext
MD5:B82FC1B035E967A833A788D817E0D56E
SHA256:F57FF5A3A4969ADDC9D7820AE875E546B7D543B1F46F14D87A847592CDA6D5AE
3648iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63binary
MD5:9B4DDB5079B8C39D7C583A29AD3AF8DA
SHA256:5454C48BCB6E0A7314AD087927E53D7D6467C9D2F65B420B76EF3D8E8C34867F
3932iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\launcher[1].htmhtml
MD5:01985609AEA3ED22B85930180B793360
SHA256:12A2E0F8665CBC68580E6C5CC8D9C67114E600EC65D5AD75AAF2CBF4A044DF76
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
29
DNS requests
18
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3648
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
3932
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
3648
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
3932
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2BnRyLFPYjID1ie%2Bx%2BdSjo%3D
US
der
1.47 Kb
whitelisted
3932
iexplore.exe
GET
200
92.123.194.108:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?969e7d0f9325e257
unknown
compressed
4.70 Kb
whitelisted
3932
iexplore.exe
GET
200
92.123.194.108:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?8810623a8d743780
unknown
compressed
4.70 Kb
whitelisted
3932
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEALnkXH7gCHpP%2BLZg4NMUMA%3D
US
der
471 b
whitelisted
3648
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA177el9ggmWelJjG4vdGL0%3D
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3648
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3932
iexplore.exe
52.113.194.132:443
teams.microsoft.com
Microsoft Corporation
US
suspicious
3648
iexplore.exe
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
2964
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted
3932
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3932
iexplore.exe
92.123.194.108:80
ctldl.windowsupdate.com
Akamai International B.V.
suspicious
192.168.100.2:53
whitelisted
52.113.194.132:443
teams.microsoft.com
Microsoft Corporation
US
suspicious
3648
iexplore.exe
131.253.33.203:443
www.msn.com
Microsoft Corporation
US
whitelisted
3648
iexplore.exe
152.199.19.161:443
r20swj13mr.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted

DNS requests

Domain
IP
Reputation
www.microsoft.com
whitelisted
config.messenger.msn.com
  • 64.4.26.155
whitelisted
teams.microsoft.com
  • 52.113.194.132
whitelisted
ctldl.windowsupdate.com
  • 92.123.194.108
  • 92.123.194.121
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
statics.teams.cdn.office.net
  • 52.113.194.132
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted

Threats

No threats detected
No debug info