File name: | Administrator Notification_ Redirecting email with malware.msg |
Full analysis: | https://app.any.run/tasks/464c118e-94a5-42a2-a10d-7ba4f003c6db |
Verdict: | Malicious activity |
Analysis date: | June 19, 2019, 15:25:58 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/vnd.ms-outlook |
File info: | CDFV2 Microsoft Outlook Message |
MD5: | 13D9224986D9DCCBCCD3689B65416F37 |
SHA1: | 2E20CF942C8C31562396FA3B6BDBD00C76895A21 |
SHA256: | 5F2131CC35C6493BC1068403C3E25E3D56F8B20C988E57BDE6169C68C48EF9BE |
SSDEEP: | 1536:ncWTWascLFNTE4CFFi0t3lcYWNWt//gG/u0ThR2ikIUewe3XVo622z1RlRKOjDw+:nHsiFNTkFBkgxmikjCmxgLSQWn |
.msg | | | Outlook Message (58.9) |
---|---|---|
.oft | | | Outlook Form Template (34.4) |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3328 | "C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\admin\AppData\Local\Temp\Administrator Notification_ Redirecting email with malware.msg" | C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE | explorer.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Outlook Version: 14.0.6025.1000 | ||||
644 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\GYO0LO4V\TRANSCONTINENTAL REVISED ORDER.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | OUTLOOK.EXE | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
3636 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Embedding | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | WINWORD.EXE |
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Microsoft Word Exit code: 0 Version: 14.0.6024.1000 |
PID | Process | Filename | Type | |
---|---|---|---|---|
3328 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Temp\CVREE35.tmp.cvr | — | |
MD5:— | SHA256:— | |||
3328 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Temp\~DF55C0B254B79529A7.TMP | — | |
MD5:— | SHA256:— | |||
3328 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\GYO0LO4V\TRANSCONTINENTAL REVISED ORDER (2).doc\:Zone.Identifier:$DATA | — | |
MD5:— | SHA256:— | |||
644 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRA178.tmp.cvr | — | |
MD5:— | SHA256:— | |||
644 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\OICE_61B93381-1714-467F-82BF-E41FE6867682.0\5E27F642.doc\:Zone.Identifier:$DATA | — | |
MD5:— | SHA256:— | |||
3636 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\OICE_61B93381-1714-467F-82BF-E41FE6867682.0\FE5966C9.png | — | |
MD5:— | SHA256:— | |||
644 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C097CD5B.png | — | |
MD5:— | SHA256:— | |||
3636 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\OICE_61B93381-1714-467F-82BF-E41FE6867682.0\~WRS{DA546472-6D88-45F9-A6D8-6EB48FFFBD3D}.tmp | — | |
MD5:— | SHA256:— | |||
3636 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\OICE_61B93381-1714-467F-82BF-E41FE6867682.0\~WRF{FF86FD88-1965-48CE-9956-653A1DA86AF4}.tmp | — | |
MD5:— | SHA256:— | |||
3328 | OUTLOOK.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotm | pgc | |
MD5:8C5BF0F40AE9608ED0B7434885EFAB6B | SHA256:0D4EC052D1A21A455664861B7B8395BD25CA9A6A487B8A9FF1D191A842CEB19E |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
644 | WINWORD.EXE | GET | 404 | 78.138.105.197:80 | http://78.138.105.197/client1.exe | DE | xml | 1.03 Kb | suspicious |
644 | WINWORD.EXE | GET | 404 | 78.138.105.197:80 | http://78.138.105.197/client1.exe | DE | xml | 1.03 Kb | suspicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3328 | OUTLOOK.EXE | 64.4.26.155:80 | config.messenger.msn.com | Microsoft Corporation | US | whitelisted |
644 | WINWORD.EXE | 78.138.105.197:80 | — | velia.net Internetdienste GmbH | DE | suspicious |
Domain | IP | Reputation |
---|---|---|
config.messenger.msn.com |
| whitelisted |
dns.msftncsi.com |
| shared |
PID | Process | Class | Message |
---|---|---|---|
644 | WINWORD.EXE | A Network Trojan was detected | ET INFO Executable Download from dotted-quad Host |
644 | WINWORD.EXE | A Network Trojan was detected | ET CURRENT_EVENTS Possible Malicious Macro DL EXE Feb 2016 |
644 | WINWORD.EXE | A Network Trojan was detected | ET INFO Executable Download from dotted-quad Host |
644 | WINWORD.EXE | A Network Trojan was detected | ET CURRENT_EVENTS Possible Malicious Macro DL EXE Feb 2016 |