File name:

noname.eml

Full analysis: https://app.any.run/tasks/bf2b0e8f-083e-4b5d-bd7c-fb6cf03813e6
Verdict: Malicious activity
Analysis date: July 18, 2024, 16:37:08
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
spam
Indicators:
MIME: message/rfc822
File info: RFC 822 mail, ASCII text, with very long lines (393), with CRLF line terminators
MD5:

114AEFF5FA6ABCD5DB0F68DB2FCB8684

SHA1:

F5E8DAC607D3E6FDDA80AA0707F7CEFE19DA394E

SHA256:

6202447E997B482A729A9A7EF7411EE64AC98C6671F9884B8AB1DB9DE92DB88C

SSDEEP:

192:4Td1F5NAT4YNp9QntQGimIKQcNIXYYgPHo90tPJ5n5YeJyYJTQyTwrP+UMf4fkEL:4Td1rNATrcIidBtPSeO8lMU8IqFz

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Scans artifacts that could help determine the target

      • OfficeClickToRun.exe (PID: 7044)
    • The DLL Hijacking

      • OfficeClickToRun.exe (PID: 7044)
    • Creates a writable file in the system directory

      • OfficeClickToRun.exe (PID: 7044)
  • SUSPICIOUS

    • Executes as Windows Service

      • OfficeClickToRun.exe (PID: 7044)
  • INFO

    • Checks supported languages

      • OfficeClickToRun.exe (PID: 7044)
    • Reads Microsoft Office registry keys

      • OfficeClickToRun.exe (PID: 7044)
    • Reads the computer name

      • OfficeClickToRun.exe (PID: 7044)
    • Reads the machine GUID from the registry

      • OfficeClickToRun.exe (PID: 7044)
    • Process checks computer location settings

      • OfficeClickToRun.exe (PID: 7044)
    • Checks proxy server information

      • OfficeClickToRun.exe (PID: 7044)
    • Reads the software policy settings

      • OfficeClickToRun.exe (PID: 7044)
    • Reads CPU info

      • OfficeClickToRun.exe (PID: 7044)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.eml | E-Mail message (Var. 5) (100)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
125
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start outlook.exe officeclicktorun.exe ai.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
7044"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /serviceC:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Office Click-to-Run (SxS)
Version:
16.0.16026.20140
Modules
Images
c:\program files\common files\microsoft shared\clicktorun\officeclicktorun.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\gdi32.dll
7628"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exe" "128C1707-5B3D-41F1-972C-0729962A37C2" "9B80B7FD-1CC8-4EE0-AA94-FEA87DDA0D26" "8008"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exeOUTLOOK.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Artificial Intelligence (AI) Host for the Microsoft® Windows® Operating System and Platform x64.
Version:
0.12.2.0
Modules
Images
c:\program files\microsoft office\root\vfs\programfilescommonx64\microsoft shared\office16\ai.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files\common files\microsoft shared\clicktorun\appvisvsubsystems64.dll
c:\windows\system32\advapi32.dll
c:\program files\common files\microsoft shared\clicktorun\c2r64.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
8008"C:\Program Files\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml C:\Users\admin\AppData\Local\Temp\noname.emlC:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
16.0.16026.20146
Modules
Images
c:\program files\microsoft office\root\office16\outlook.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\program files\microsoft office\root\office16\outlookservicing.dll
c:\program files\common files\microsoft shared\clicktorun\appvisvsubsystems64.dll
c:\windows\system32\advapi32.dll
c:\program files\microsoft office\root\office16\vcruntime140_1.dll
Total events
16 500
Read events
15 961
Write events
485
Delete events
54

Modification events

(PID) Process:(7044) OfficeClickToRun.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:en-US
Value:
2
(PID) Process:(7044) OfficeClickToRun.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:en-US
Value:
1
(PID) Process:(7044) OfficeClickToRun.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\RuntimeExceptionHelperModules
Operation:writeName:C:\Program Files\Common Files\Microsoft Shared\ClickToRun\c2r64werhandler.dll
Value:
0
(PID) Process:(7044) OfficeClickToRun.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\Office\16.0\Common
Operation:writeName:SessionId
Value:
C7F4C372DCEC3245B443897E2F7E783D
(PID) Process:(7044) OfficeClickToRun.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun
Operation:writeName:MachineMetadataSentTime
Value:
13365794255288
(PID) Process:(7044) OfficeClickToRun.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(7044) OfficeClickToRun.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(7044) OfficeClickToRun.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(7044) OfficeClickToRun.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(7044) OfficeClickToRun.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\Office\16.0\Common\Internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--syslcid=1033&build=16.0.16026&crev=3\0
Operation:writeName:FilePath
Value:
officeclient.microsoft.com\43DC891F-4654-49FD-9207-FB1E8871BF8F
Executable files
0
Suspicious files
9
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
8008OUTLOOK.EXEC:\USERS\ADMIN\DOCUMENTS\OUTLOOK FILES\OUTLOOK1.PST
MD5:
SHA256:
7044OfficeClickToRun.exeC:\WINDOWS\system32\config\systemprofile\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\43DC891F-4654-49FD-9207-FB1E8871BF8Fxml
MD5:ED5E2E388876069009B7B1FAF79FCB69
SHA256:85E8E836ECB41EA74EF1382438D9E7B0B2722FD07BBD7AC11D404D0878A3DDF7
8008OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\56a61aeb75d8f5be186c26607f4bb213abe7c5ec.tbresbinary
MD5:D3554955B8588232DCA78F1977E0E89D
SHA256:C251C82C3DE2A47D8A0574E7333CEE60DF55BD7B8EA9BF079870C051680B46E7
8008OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\723B2A92-2023-4ACF-A411-5C4908AD9AAAxml
MD5:674646AF41287BF3D74379D3F587448C
SHA256:B2FC324BEE3FBC3369647AFA99E9C54D2D42433127818751F632925E32E395CD
8008OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\FORMS\FRMDATA64.DATbinary
MD5:6D4DE3C5917BAA7B9B0C272974B2FD4E
SHA256:EA295E017CCCD7A740EE9B7BFED3CC7C0FBBE82C991C26C051F8B3F549AB2F14
8008OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\5475cb191e478c39370a215b2da98a37e9dc813d.tbresbinary
MD5:6E4ED9AED7D8A10D81715FC9E495F942
SHA256:0DF26CB198AC4D97C7E853E9A58B68B526562B2681BCB05C04E71163B0FD7D35
8008OUTLOOK.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9binary
MD5:5A26F75F014290D1B720B5CCD4FE9249
SHA256:0282961A16376A3885C3927C3B99460AA45187B0F2EF48ABF405F40E6FE66207
8008OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntities.bintext
MD5:CC90D669144261B198DEAD45AA266572
SHA256:89C701EEFF939A44F28921FD85365ECD87041935DCD0FE0BAF04957DA12C9899
8008OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntitiesUpdated.bintext
MD5:799BEA0544006AA06DAF7993AE8A8698
SHA256:FE45A0A012B5BD81CE40BF4518AADF465DAC1E2BAF152E3D0F9998687D8B6C3A
8008OUTLOOK.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9binary
MD5:B07AC3105F9C5C0A44DE5E9C494426D2
SHA256:ECA2F91DD9A69898C9CF1314CEF9B0D76EB076FA47815353DB7EEA2EABC29295
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
24
DNS requests
14
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5628
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4716
svchost.exe
40.126.31.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5212
backgroundTaskHost.exe
20.74.47.205:443
fd.api.iris.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
unknown
7856
svchost.exe
4.209.32.67:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
4032
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
2760
svchost.exe
40.115.3.253:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5628
SearchApp.exe
150.171.22.254:443
ln-ring.msedge.net
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
5628
SearchApp.exe
4.150.240.254:443
arm-ring.msedge.net
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
5628
SearchApp.exe
20.111.38.59:443
07ec1378061caa40ef5f7adcbaac0821.azr.footprintdns.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
unknown

DNS requests

Domain
IP
Reputation
login.live.com
  • 40.126.31.71
  • 20.190.159.71
  • 40.126.31.69
  • 40.126.31.67
  • 20.190.159.73
  • 40.126.31.73
  • 20.190.159.64
  • 20.190.159.2
whitelisted
google.com
  • 172.217.16.206
whitelisted
fd.api.iris.microsoft.com
  • 20.74.47.205
whitelisted
ln-ring.msedge.net
  • 150.171.22.254
unknown
arm-ring.msedge.net
  • 4.150.240.254
unknown
07ec1378061caa40ef5f7adcbaac0821.azr.footprintdns.com
  • 20.111.38.59
whitelisted
fp.msedge.net
  • 204.79.197.222
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
www.bing.com
  • 2.23.209.158
  • 2.23.209.156
  • 2.23.209.130
  • 2.23.209.176
  • 2.23.209.189
  • 2.23.209.154
  • 2.23.209.183
  • 2.23.209.179
  • 2.23.209.177
whitelisted
spo-ring.msedge.net
  • 13.107.138.254
  • 13.107.136.254
whitelisted

Threats

No threats detected
No debug info