analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

cjgqc431.eml

Full analysis: https://app.any.run/tasks/904ad1b5-e069-4f43-ba40-171f36d2569d
Verdict: Malicious activity
Analysis date: May 30, 2020, 01:42:34
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: message/rfc822
File info: RFC 822 mail, ASCII text, with very long lines, with CRLF line terminators
MD5:

7B8EF2EB5FC209EA866D7F10C86B886C

SHA1:

52E5B19CA457FB9AF35E123228C21746F64EC2BA

SHA256:

6A52F5EB1AF06CC21F99DE8724EA04662FFB10935F7CECC247C193414162A5B2

SSDEEP:

384:cR65ubp1u+wieEsvxN0Hp/vF6Qfl9UGrq31QguR:U1d6s3q1uR

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Internet Cache Settings

      • OUTLOOK.EXE (PID: 2316)
    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 2316)
    • Starts Internet Explorer

      • OUTLOOK.EXE (PID: 2316)
    • Modifies files in Chrome extension folder

      • chrome.exe (PID: 932)
  • INFO

    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2872)
      • iexplore.exe (PID: 2696)
    • Reads Microsoft Office registry keys

      • OUTLOOK.EXE (PID: 2316)
    • Application launched itself

      • iexplore.exe (PID: 2872)
      • chrome.exe (PID: 932)
    • Changes internet zones settings

      • iexplore.exe (PID: 2872)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2696)
    • Manual execution by user

      • chrome.exe (PID: 932)
    • Reads the hosts file

      • chrome.exe (PID: 932)
      • chrome.exe (PID: 2044)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2696)
      • chrome.exe (PID: 2044)
      • iexplore.exe (PID: 2872)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2872)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2872)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.eml | E-Mail message (Var. 5) (100)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
74
Monitored processes
34
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start outlook.exe iexplore.exe iexplore.exe chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2316"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE" /eml "C:\Users\admin\AppData\Local\Temp\cjgqc431.eml"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
14.0.6025.1000
2872"C:\Program Files\Internet Explorer\iexplore.exe" https://linkprotect.cudasvc.com/url?a=http%3a%2f%2fdocs.transactional.pandadoc.com%2fc%2feJxVj9tuwjAMhp-G3K0qaZq2F7lYoSCVg6axDrYb5CYOdPS0Hijj6RekITHJsn5btj__Q9Wc2hok7jMl1hcZvk-u81X4EU7ZsLj4Q3yekkxQm9q2S4OxS7kdWGMrYlPKg4D7Lp1FUcRHzO4aKFuQXVaVkFs1lApUJS1ZFeQoJDKKPkWXpsxLqZZO4I4DkEqZhA6QrN2bAxIhzVG8NT2SXBy7rm5HzvOIzkxAXf-7alpG9QWWnZGeTgPPlgocpdADpj0DZFRr15UaXJ-nXHPJHFI1ByizK9z-vHkuoIqzn92cL9ln3U7OsYbaS0gjviDPsTTGBmwNzjKLpBN35FNr0mPdQXPAxw5p8Jy1fxT96hcrL-k3i9Om2vCXHcXtaUnus7eR7w0WoMJLsN7-HIr1kBR9nCBRQlKUnP0CEL6PKw&c=E,1,tGTMH-82HGkgs29Rt21fgenjNjFUYhrll0KMctesm37YZsRjx134otNAHI1qWs1aBF_CNvYvPCjUj3Yqqn1jph0s_FdChcjqJ2mYpyjS1MWa&typo=1C:\Program Files\Internet Explorer\iexplore.exe
OUTLOOK.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
2696"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2872 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
932"C:\Program Files\Google\Chrome\Application\chrome.exe" C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
3900"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x5fa1a9d0,0x5fa1a9e0,0x5fa1a9ecC:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
3552"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=2116 --on-initialized-event-handle=324 --parent-handle=328 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
3352"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1036,5169022334238641342,11943846319091531275,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=9736125453327417187 --mojo-platform-channel-handle=1052 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
2044"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1036,5169022334238641342,11943846319091531275,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=13746828332416759395 --mojo-platform-channel-handle=1648 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
2796"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1036,5169022334238641342,11943846319091531275,131072 --enable-features=PasswordImport --lang=en-US --instant-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=6517684280752812766 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2284 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
1708"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1036,5169022334238641342,11943846319091531275,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=10006196731238505080 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2452 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Total events
8 329
Read events
2 068
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
86
Text files
295
Unknown types
55

Dropped files

PID
Process
Filename
Type
2316OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVR9983.tmp.cvr
MD5:
SHA256:
2316OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\outlook logging\firstrun.logtext
MD5:944B8CAD78F5F3AD53518C0B2764A350
SHA256:C4425DFA209599E0DE3858F9B6504633F1DC47266D019638F6106FC5C822BB32
2316OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmpgc
MD5:889B257A8F8CB6BB3C68A3DDC14AA1F1
SHA256:66E3C207D02C6A6847757644FBEF346D42E89145D3337D6E7DB6888FE9CE3FA2
2696iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\CabC258.tmp
MD5:
SHA256:
2696iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894der
MD5:9EDA5FB06CD059FC962238EB5B5235A9
SHA256:3BA98B51F41F850B64383185D61D9BB4BA6F7E9D9F89A6EC8EE470E675558A43
2696iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894binary
MD5:D87920609CA603E1F5634E0A67872716
SHA256:46EFD56F317B598C5C94B02268FFC3A75D73522CF83B4EE9B3FEE854FD47A4A8
2696iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62der
MD5:C30E885A21D19AD207D195B57D62285F
SHA256:C4E228478330DD1FEB4A21EC8ED4BB858C4D820A3D32A9C15ECC95A15B736703
2696iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62binary
MD5:FABC33B399DCF0D266B91D4D35F4FB50
SHA256:8B6E83D01F69737ED7DABF985BC1E8DCD31431A6195727C1634349CDF0FED071
2696iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\TarC259.tmp
MD5:
SHA256:
2316OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\{FFD41147-6AA1-4A80-B53E-E165A991F9CD}\{1C306CB1-771E-4B4B-A902-86E897877F5B}.pngimage
MD5:4C61C12EDBC453D7AE184976E95258E1
SHA256:296526F9A716C1AA91BA5D6F69F0EB92FDF79C2CB2CFCF0CEB22B7CCBC27035F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
29
TCP/UDP connections
121
DNS requests
70
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2316
OUTLOOK.EXE
GET
64.4.26.155:80
http://config.messenger.msn.com/config/msgrconfig.asmx?op=GetOlcConfig
US
whitelisted
2696
iexplore.exe
GET
200
52.222.157.28:80
http://o.ss2.us//MEowSDBGMEQwQjAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCCQCnDkpMNIK3fw%3D%3D
US
der
1.70 Kb
whitelisted
2696
iexplore.exe
GET
200
52.222.157.60:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwZ%2FlFeFh%2Bisd96yUzJbvJmLVg0%3D
US
der
1.39 Kb
shared
2696
iexplore.exe
GET
200
23.37.43.27:80
http://s.symcd.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS56bKHAoUD%2BOyl%2B0LhPg9JxyQm4gQUf9Nlp8Ld7LvwMAnzQzn6Aq8zMTMCEGMYDTj7gJd4qdA1oxYY%2BEA%3D
NL
der
1.71 Kb
shared
2696
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAyO4MkNaokViAQGHuJB%2Ba8%3D
US
der
471 b
whitelisted
2696
iexplore.exe
GET
302
52.1.14.103:80
http://docs.transactional.pandadoc.com/c/eJxVj9tuwjAMhp-G3K0qaZq2F7lYoSCVg6axDrYb5CYOdPS0Hijj6RekITHJsn5btj__Q9Wc2hok7jMl1hcZvk-u81X4EU7ZsLj4Q3yekkxQm9q2S4OxS7kdWGMrYlPKg4D7Lp1FUcRHzO4aKFuQXVaVkFs1lApUJS1ZFeQoJDKKPkWXpsxLqZZO4I4DkEqZhA6QrN2bAxIhzVG8NT2SXBy7rm5HzvOIzkxAXf-7alpG9QWWnZGeTgPPlgocpdADpj0DZFRr15UaXJ-nXHPJHFI1ByizK9z-vHkuoIqzn92cL9ln3U7OsYbaS0gjviDPsTTGBmwNzjKLpBN35FNr0mPdQXPAxw5p8Jy1fxT96hcrL-k3i9Om2vCXHcXtaUnus7eR7w0WoMJLsN7-HIr1kBR9nCBRQlKUnP0CEL6PKw
US
html
355 b
malicious
2696
iexplore.exe
GET
200
52.222.157.3:80
http://ocsp.sca1b.amazontrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQz9arGHWbnBV0DFzpNHz4YcTiFDQQUWaRmBlKge5WSPKOUByeWdFv5PdACEAS8VnSzwVKQtjWbxZiQsAk%3D
US
der
471 b
whitelisted
2696
iexplore.exe
GET
200
52.222.157.23:80
http://ocsp.rootg2.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBSIfaREXmfqfJR3TkMYnD7O5MhzEgQUnF8A36oB1zArOIiiuG1KnPIRkYMCEwZ%2FlEoqJ83z%2BsKuKwH5CO65xMY%3D
US
der
1.51 Kb
whitelisted
2696
iexplore.exe
GET
200
52.222.157.3:80
http://ocsp.sca1b.amazontrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQz9arGHWbnBV0DFzpNHz4YcTiFDQQUWaRmBlKge5WSPKOUByeWdFv5PdACEAS8VnSzwVKQtjWbxZiQsAk%3D
US
der
471 b
whitelisted
2696
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAH9o%2BtuynXIiEOLckvPvJE%3D
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2316
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted
2696
iexplore.exe
52.10.137.7:443
app.pandadoc.com
Amazon.com, Inc.
US
unknown
52.1.14.103:80
docs.transactional.pandadoc.com
Amazon.com, Inc.
US
unknown
2696
iexplore.exe
52.222.157.28:80
o.ss2.us
Amazon.com, Inc.
US
whitelisted
2696
iexplore.exe
18.156.180.118:443
linkprotect.cudasvc.com
Massachusetts Institute of Technology
US
unknown
2696
iexplore.exe
52.222.157.60:80
ocsp.rootg2.amazontrust.com
Amazon.com, Inc.
US
whitelisted
2696
iexplore.exe
52.222.157.76:80
o.ss2.us
Amazon.com, Inc.
US
whitelisted
2696
iexplore.exe
52.222.157.3:80
ocsp.sca1b.amazontrust.com
Amazon.com, Inc.
US
whitelisted
2696
iexplore.exe
52.222.157.23:80
ocsp.rootg2.amazontrust.com
Amazon.com, Inc.
US
whitelisted
2696
iexplore.exe
2.16.186.59:443
use.typekit.net
Akamai International B.V.
whitelisted

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted
linkprotect.cudasvc.com
  • 18.156.180.118
  • 52.28.83.204
whitelisted
o.ss2.us
  • 52.222.157.76
  • 52.222.157.188
  • 52.222.157.33
  • 52.222.157.28
whitelisted
ocsp.rootg2.amazontrust.com
  • 52.222.157.23
  • 52.222.157.198
  • 52.222.157.101
  • 52.222.157.60
whitelisted
ocsp.rootca1.amazontrust.com
  • 52.222.157.60
  • 52.222.157.101
  • 52.222.157.198
  • 52.222.157.23
shared
ocsp.sca1b.amazontrust.com
  • 52.222.157.3
  • 52.222.157.218
  • 52.222.157.62
  • 52.222.157.230
whitelisted
docs.transactional.pandadoc.com
  • 52.1.14.103
  • 54.210.148.13
malicious
app.pandadoc.com
  • 52.10.137.7
  • 54.218.74.101
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted

Threats

No threats detected
No debug info