analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

NEW_PROJECT_The Martin Group of Companies_109076532.eml

Full analysis: https://app.any.run/tasks/bc52c71b-2e13-4eca-926a-56331827896e
Verdict: Malicious activity
Analysis date: May 20, 2019, 13:41:11
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: message/rfc822
File info: RFC 822 mail, ASCII text, with very long lines, with CRLF line terminators
MD5:

9151B17CB182D9A74DE33E69B3A89E50

SHA1:

3D25E4C1A611FBCA4903068C467AE660CFDA4A8F

SHA256:

725BBC22504D55FB6D8F4783E6DF5F387A65C4BAB87AC43A3D7A81BBF81AC287

SSDEEP:

192:4eKr42acQRn1UGd4vMuGZBAHUItDBAHUIuBAHUIqH5AxjZ13xx:VF2aPn1UW4vRmQlQuQqHOZ13xx

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Internet Cache Settings

      • OUTLOOK.EXE (PID: 1672)
    • Starts Internet Explorer

      • OUTLOOK.EXE (PID: 1672)
      • AcroRd32.exe (PID: 1028)
    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 1672)
    • Creates files in the program directory

      • firefox.exe (PID: 2468)
      • AdobeARM.exe (PID: 1760)
    • Executable content was dropped or overwritten

      • firefox.exe (PID: 2468)
      • AdobeARM.exe (PID: 1760)
  • INFO

    • Changes internet zones settings

      • iexplore.exe (PID: 2480)
      • iexplore.exe (PID: 3252)
    • Reads Microsoft Office registry keys

      • OUTLOOK.EXE (PID: 1672)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3536)
      • iexplore.exe (PID: 2936)
    • Application launched itself

      • iexplore.exe (PID: 2480)
      • firefox.exe (PID: 2468)
      • iexplore.exe (PID: 3252)
      • AcroRd32.exe (PID: 1028)
      • RdrCEF.exe (PID: 2744)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2480)
      • iexplore.exe (PID: 3536)
      • iexplore.exe (PID: 2936)
      • AcroRd32.exe (PID: 1028)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2480)
      • iexplore.exe (PID: 3252)
      • firefox.exe (PID: 2468)
    • Creates files in the user directory

      • iexplore.exe (PID: 3536)
      • iexplore.exe (PID: 2480)
      • iexplore.exe (PID: 2936)
      • iexplore.exe (PID: 3252)
      • firefox.exe (PID: 2468)
    • Reads CPU info

      • firefox.exe (PID: 2468)
    • Manual execution by user

      • firefox.exe (PID: 2468)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2480)
      • iexplore.exe (PID: 3252)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2480)
      • iexplore.exe (PID: 3252)
    • Dropped object may contain Bitcoin addresses

      • firefox.exe (PID: 2468)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.eml | E-Mail message (Var. 5) (100)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
56
Monitored processes
18
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start outlook.exe iexplore.exe iexplore.exe firefox.exe firefox.exe no specs firefox.exe firefox.exe firefox.exe acrord32.exe acrord32.exe no specs rdrcef.exe no specs rdrcef.exe no specs rdrcef.exe no specs iexplore.exe iexplore.exe adobearm.exe reader_sl.exe no specs firefox.exe

Process information

PID
CMD
Path
Indicators
Parent process
1672"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE" /eml "C:\Users\admin\AppData\Local\Temp\NEW_PROJECT_The Martin Group of Companies_109076532.eml"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
14.0.6025.1000
2480"C:\Program Files\Internet Explorer\iexplore.exe" https://andapak-my.sharepoint.com/:b:/p/marcus/EdVy2WPQQINNt2lfd6vumzcBbn1W_KLDefZnN99pgbx0XQ?e=DA1EQXC:\Program Files\Internet Explorer\iexplore.exe
OUTLOOK.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3536"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2480 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2468"C:\Program Files\Mozilla Firefox\firefox.exe" C:\Program Files\Mozilla Firefox\firefox.exe
explorer.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
65.0.2
1548"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2468.0.1086133955\262150468" -parentBuildID 20190225143501 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - "C:\Users\admin\AppData\LocalLow\Mozilla\Temp-{ce348e4c-7d33-445e-89f9-60108c51bcaf}" 2468 "\\.\pipe\gecko-crash-server-pipe.2468" 1116 gpuC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
65.0.2
864"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2468.6.1453802495\1459820050" -childID 1 -isForBrowser -prefsHandle 848 -prefMapHandle 912 -prefsLen 1 -prefMapSize 180950 -schedulerPrefs 0001,2 -parentBuildID 20190225143501 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 2468 "\\.\pipe\gecko-crash-server-pipe.2468" 1680 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
65.0.2
3020"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2468.13.549886569\1119964023" -childID 2 -isForBrowser -prefsHandle 2448 -prefMapHandle 2452 -prefsLen 216 -prefMapSize 180950 -schedulerPrefs 0001,2 -parentBuildID 20190225143501 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 2468 "\\.\pipe\gecko-crash-server-pipe.2468" 2464 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
65.0.2
1808"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2468.20.727045181\999105805" -childID 3 -isForBrowser -prefsHandle 3476 -prefMapHandle 3480 -prefsLen 5882 -prefMapSize 180950 -schedulerPrefs 0001,2 -parentBuildID 20190225143501 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 2468 "\\.\pipe\gecko-crash-server-pipe.2468" 3492 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
65.0.2
1028"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\admin\AppData\Local\Temp\NEW_PROJECT_The Martin Group of Companies_109076532.pdf"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
firefox.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe Acrobat Reader DC
Version:
15.23.20070.215641
3456"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" --type=renderer "C:\Users\admin\AppData\Local\Temp\NEW_PROJECT_The Martin Group of Companies_109076532.pdf"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeAcroRd32.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe Acrobat Reader DC
Version:
15.23.20070.215641
Total events
3 595
Read events
2 977
Write events
0
Delete events
0

Modification events

No data
Executable files
3
Suspicious files
145
Text files
138
Unknown types
111

Dropped files

PID
Process
Filename
Type
1672OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVRECAF.tmp.cvr
MD5:
SHA256:
2480iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\favicon[1].ico
MD5:
SHA256:
2480iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
1672OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmpgc
MD5:A7C9246FCA29F7417E27C25F2BA0F7BF
SHA256:2F1E16793E47710FA769A730620256A1A8FA9AFD2169F2161BB0A270646572CE
1672OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_Calendar_2_52AE49BE843F464CA39092170F0C0505.datxml
MD5:B21ED3BD946332FF6EBC41A87776C6BB
SHA256:B1AAC4E817CD10670B785EF8E5523C4A883F44138E50486987DC73054A46F6F4
3536iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\T77V303K\onedrive[1].aspx
MD5:
SHA256:
1672OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_TCPrefs_2_884D0286AAA1F94D99E2A9890AA9A9A0.datxml
MD5:F194B1FA12F9B6F46A47391FAE8BEEC2
SHA256:FCD8D7E030BE6EA7588E5C6CB568E3F1BDFC263942074B693942A27DF9521A74
3536iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.datdat
MD5:6C6C237CCCCC3E5B4932DC0FC98311F7
SHA256:EBDE1E9E59A9D239F628E803FF7A6832C4665F87B991C5EA513F1B8F0BBDD6E8
1672OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_AvailabilityOptions_2_28CADB05C051704F911B7EB35546A22B.datxml
MD5:EEAA832C12F20DE6AAAA9C7B77626E72
SHA256:C4C9A90F2C961D9EE79CF08FBEE647ED7DE0202288E876C7BAAD00F4CA29CA16
1672OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_WorkHours_1_C997ABD5D80DBE4CB216F4974E576A71.datxml
MD5:807EF0FC900FEB3DA82927990083D6E7
SHA256:4411E7DC978011222764943081500FFF0E43CBF7CCD44264BD1AB6306CA68913
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
25
TCP/UDP connections
82
DNS requests
180
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2468
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
2468
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
2480
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
1028
AcroRd32.exe
GET
304
2.16.186.33:80
http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/message.zip
unknown
whitelisted
1028
AcroRd32.exe
GET
304
2.16.186.33:80
http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/277_15_23_20070.zip
unknown
whitelisted
1028
AcroRd32.exe
GET
304
2.16.186.33:80
http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/278_15_23_20070.zip
unknown
whitelisted
1028
AcroRd32.exe
GET
304
2.16.186.33:80
http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/281_15_23_20070.zip
unknown
whitelisted
1028
AcroRd32.exe
GET
304
2.16.186.33:80
http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/280_15_23_20070.zip
unknown
whitelisted
2468
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
2468
firefox.exe
POST
200
104.18.25.243:80
http://ocsp.msocsp.com/
US
der
1.79 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1672
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted
2480
iexplore.exe
13.107.136.9:443
andapak-my.sharepoint.com
Microsoft Corporation
US
whitelisted
2480
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3536
iexplore.exe
2.19.34.64:443
static.sharepointonline.com
Akamai International B.V.
whitelisted
2468
firefox.exe
52.32.77.100:443
aus5.mozilla.org
Amazon.com, Inc.
US
unknown
3536
iexplore.exe
13.107.136.9:443
andapak-my.sharepoint.com
Microsoft Corporation
US
whitelisted
2468
firefox.exe
52.35.96.157:443
tiles.services.mozilla.com
Amazon.com, Inc.
US
unknown
2468
firefox.exe
13.32.159.216:443
snippets.cdn.mozilla.net
Amazon.com, Inc.
US
unknown
2468
firefox.exe
173.223.11.152:80
detectportal.firefox.com
Akamai International B.V.
NL
whitelisted
2468
firefox.exe
52.27.173.161:443
search.services.mozilla.com
Amazon.com, Inc.
US
unknown

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted
andapak-my.sharepoint.com
  • 13.107.136.9
suspicious
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
static.sharepointonline.com
  • 2.19.34.64
whitelisted
detectportal.firefox.com
  • 173.223.11.152
  • 173.223.11.150
  • 2.16.106.152
  • 2.16.106.209
whitelisted
aus5.mozilla.org
  • 52.32.77.100
  • 34.216.134.104
  • 52.40.226.98
  • 35.164.82.230
  • 34.214.241.105
  • 34.218.159.169
  • 52.43.79.30
  • 54.244.6.221
  • 54.148.138.18
whitelisted
a1089.dscd.akamai.net
  • 173.223.11.150
  • 173.223.11.152
  • 2.16.106.209
  • 2.16.106.152
whitelisted
balrog-aus5.r53-2.services.mozilla.com
  • 54.244.6.221
  • 52.43.79.30
  • 34.218.159.169
  • 34.214.241.105
  • 35.164.82.230
  • 52.40.226.98
  • 34.216.134.104
  • 52.32.77.100
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
search.services.mozilla.com
  • 52.27.173.161
  • 52.10.97.252
  • 52.88.179.171
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET DNS Query to a *.top domain - Likely Hostile
Potentially Bad Traffic
ET DNS Query to a *.top domain - Likely Hostile
No debug info