analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Message.mim

Full analysis: https://app.any.run/tasks/7ad6c7f7-d1e0-49ba-8651-6aabc830a135
Verdict: Malicious activity
Analysis date: October 05, 2022, 07:21:24
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: message/rfc822
File info: RFC 822 mail, ASCII text, with CRLF line terminators
MD5:

08CBE997D921A1E258EC41F052B8A1C3

SHA1:

1C1BC83C8C68ECC98B09F4EFDA3E200B65FC4DAB

SHA256:

6B4CF7C2E64C3B3EDC19913EEF884C506357BD0C5386876ABB3C96DECDAD8C71

SSDEEP:

384:Udn2w6KfqPq1QpEcdKtaato/AA326pzpXpiKn8LiAI:Udn6KiP+Qp1dKt5to/A0NpzpXpidS

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Saves itself using an automatic execution at the hidden registry location

      • OUTLOOK.EXE (PID: 3044)
  • SUSPICIOUS

    • Reads Internet Settings

      • OUTLOOK.EXE (PID: 3044)
    • Reads the machine GUID from the registry

      • OUTLOOK.EXE (PID: 3044)
    • Searches for installed software

      • OUTLOOK.EXE (PID: 3044)
  • INFO

    • Process checks LSA protection

      • OUTLOOK.EXE (PID: 3044)
    • Checks supported languages

      • OUTLOOK.EXE (PID: 3044)
    • Reads the computer name

      • OUTLOOK.EXE (PID: 3044)
    • Creates a file in a temporary directory

      • OUTLOOK.EXE (PID: 3044)
    • Process checks computer location settings

      • OUTLOOK.EXE (PID: 3044)
    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 3044)
    • Starts Internet Explorer

      • OUTLOOK.EXE (PID: 3044)
    • Application launched itself

      • iexplore.exe (PID: 2224)
      • chrome.exe (PID: 2016)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 2224)
    • Manual execution by user

      • chrome.exe (PID: 2016)
    • Reads Microsoft Office registry keys

      • OUTLOOK.EXE (PID: 3044)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.eml | E-Mail message (Var. 5) (100)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
60
Monitored processes
23
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start outlook.exe iexplore.exe iexplore.exe chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3044"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE" /eml "C:\Users\admin\AppData\Local\Temp\Message.mim.eml"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
14.0.6025.1000
2224"C:\Program Files\Internet Explorer\iexplore.exe" https://placestrategy8286.lt.emlnk.com/Prod/link-tracker?notrack=1&redirectUrl=aHR0cHMlM0ElMkYlMkY2MDBmOXIycTM5cnEwMTJwajNlNDIyaTk5ZnNwMWhjNmk0ZjhlbnJocTlyZzdnNjRkOTJhbG5vLnNpYXNreS5uZXQ=&sig=Cv2Zs1JuiBZkWVs6jfqTUqr4iqn6DKtB5WmwQq1eQSXv&iat=1664909537&a=%7C%7C68579212%7C%7C&account=placestrategy8286%2Eactivehosted%2Ecom&email=HRNnJdlVlYGv02FssiZDgc3ykZI%2FNrPcwaJZgjASTbc%3D&s=07a886fac536ff1f0f593248cea02134&i=1A3A1A9#[email protected]C:\Program Files\Internet Explorer\iexplore.exe
OUTLOOK.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
2936"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2224 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
2016"C:\Program Files\Google\Chrome\Application\chrome.exe" C:\Program Files\Google\Chrome\Application\chrome.exe
Explorer.EXE
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
86.0.4240.198
2652"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=86.0.4240.198 --initial-client-data=0xc8,0xcc,0xd0,0x9c,0xd4,0x67ded988,0x67ded998,0x67ded9a4C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
86.0.4240.198
3264"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1004,4528757485504097938,7450020203373200984,131072 --enable-features=PasswordImport --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1020 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
1600"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1004,4528757485504097938,7450020203373200984,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1340 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
86.0.4240.198
3536"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1004,4528757485504097938,7450020203373200984,131072 --enable-features=PasswordImport --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1412 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
2452"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1004,4528757485504097938,7450020203373200984,131072 --enable-features=PasswordImport --lang=en-US --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1960 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
4000"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1004,4528757485504097938,7450020203373200984,131072 --enable-features=PasswordImport --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2264 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
Total events
25 543
Read events
24 768
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
132
Text files
111
Unknown types
15

Dropped files

PID
Process
Filename
Type
3044OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVR4CDB.tmp.cvr
MD5:
SHA256:
3044OUTLOOK.EXEC:\Users\admin\Documents\Outlook Files\Outlook Data File - NoMail.pst
MD5:
SHA256:
2016chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-633D3085-7E0.pma
MD5:
SHA256:
3044OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\outlook logging\firstrun.logtext
MD5:E8C9C644836A24B25861899EF51379AE
SHA256:10166762DD6BE898D1AA75306274735E0817427F81C921F85A8A270553ABB081
3044OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmpgc
MD5:A7F09B7A57AB9E5D76F2DD8A3476E217
SHA256:996B9F4CE3248A9E2913211D70FF47DF0B22029ECA70C606FA40152F2FF58153
3044OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3BEF4E7B.datimage
MD5:429A503B0D867639EAD2D4C0C005DDC6
SHA256:994FFC03A0E4CD080CCF796D10407ED9DAA18565B0859594F465712AFEB65488
3044OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_AvailabilityOptions_2_2D504F485221884994A2398933D6BF0A.datxml
MD5:EEAA832C12F20DE6AAAA9C7B77626E72
SHA256:C4C9A90F2C961D9EE79CF08FBEE647ED7DE0202288E876C7BAAD00F4CA29CA16
2936iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:EAA56DC6B2E1A03FE4CF432637AA8A23
SHA256:BB11073FA268659453D76E528A3EA06DB16C0C0AC592F3326BD17941C28B70AB
3044OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_TCPrefs_2_FD789EC7D68C2945B4CA390F84822F02.datxml
MD5:F194B1FA12F9B6F46A47391FAE8BEEC2
SHA256:FCD8D7E030BE6EA7588E5C6CB568E3F1BDFC263942074B693942A27DF9521A74
3044OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_WorkHours_1_93FA88BAB73F3746BE69E580064E41AC.datxml
MD5:807EF0FC900FEB3DA82927990083D6E7
SHA256:4411E7DC978011222764943081500FFF0E43CBF7CCD44264BD1AB6306CA68913
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
50
DNS requests
31
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3044
OUTLOOK.EXE
GET
64.4.26.155:80
http://config.messenger.msn.com/config/msgrconfig.asmx?op=GetOlcConfig
US
whitelisted
2936
iexplore.exe
GET
200
18.66.121.29:80
http://ocsp.sca1b.amazontrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQz9arGHWbnBV0DFzpNHz4YcTiFDQQUWaRmBlKge5WSPKOUByeWdFv5PdACEAeQxQ%2FcV2ujnVGETKlby%2B4%3D
US
der
471 b
whitelisted
2224
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2BnRyLFPYjID1ie%2Bx%2BdSjo%3D
US
der
1.47 Kb
whitelisted
2936
iexplore.exe
GET
200
13.226.156.65:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwZ%2FlFeFh%2Bisd96yUzJbvJmLVg0%3D
US
der
1.39 Kb
shared
2936
iexplore.exe
GET
200
18.66.92.52:80
http://s.ss2.us/r.crl
US
der
434 b
whitelisted
2936
iexplore.exe
GET
200
95.140.236.128:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?67c679e7eb782108
GB
compressed
60.9 Kb
whitelisted
2936
iexplore.exe
GET
200
18.66.137.10:80
http://ocsp.rootg2.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBSIfaREXmfqfJR3TkMYnD7O5MhzEgQUnF8A36oB1zArOIiiuG1KnPIRkYMCEwZ%2FlEoqJ83z%2BsKuKwH5CO65xMY%3D
US
der
1.51 Kb
whitelisted
2936
iexplore.exe
GET
200
104.125.75.233:80
http://x1.c.lencr.org/
NL
der
717 b
whitelisted
2224
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
1600
chrome.exe
GET
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvNzI0QUFXNV9zT2RvdUwyMERESEZGVmJnQQ/1.0.0.6_nmmhkkegccagdldgiimedpiccmgmieda.crx
US
crx
242 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1600
chrome.exe
172.217.169.174:443
clients2.google.com
GOOGLE
US
whitelisted
2936
iexplore.exe
3.211.169.235:443
placestrategy8286.lt.emlnk.com
AMAZON-AES
US
unknown
2936
iexplore.exe
108.138.2.195:80
o.ss2.us
AMAZON-02
US
unknown
2936
iexplore.exe
95.140.236.128:80
ctldl.windowsupdate.com
LLNW
US
malicious
2224
iexplore.exe
13.107.21.200:443
www.bing.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
1600
chrome.exe
142.250.186.45:443
accounts.google.com
GOOGLE
US
suspicious
2224
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
EDGECAST
GB
whitelisted
1600
chrome.exe
142.250.187.164:443
www.google.com
GOOGLE
US
whitelisted
1600
chrome.exe
172.217.169.163:443
clientservices.googleapis.com
GOOGLE
US
whitelisted
3044
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted
placestrategy8286.lt.emlnk.com
  • 3.211.169.235
  • 52.204.73.87
  • 52.3.97.231
unknown
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ctldl.windowsupdate.com
  • 95.140.236.128
  • 178.79.242.128
whitelisted
clients2.google.com
  • 172.217.169.174
whitelisted
accounts.google.com
  • 142.250.186.45
shared
clientservices.googleapis.com
  • 172.217.169.163
whitelisted
o.ss2.us
  • 108.138.2.195
  • 108.138.2.173
  • 108.138.2.107
  • 108.138.2.10
whitelisted
www.google.com
  • 142.250.187.164
whitelisted

Threats

No threats detected
No debug info