File name: | FW_ We received your payment of CA$1392_22 -- SPAM EMAIL.msg |
Full analysis: | https://app.any.run/tasks/279b40c4-4d18-438a-9c6a-0ac26ae54310 |
Verdict: | Malicious activity |
Analysis date: | August 12, 2022, 15:40:58 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MIME: | application/vnd.ms-outlook |
File info: | CDFV2 Microsoft Outlook Message |
MD5: | E4C6E7275BE5D235DED5E6B6BF9F856F |
SHA1: | 0283FAB14D885E169F5A19C183B84867EBA2221E |
SHA256: | 7880A8FBE7DEB62289D9B41BDA839AB316E14E837741E5BF9D5FE9F257CDCA62 |
SSDEEP: | 3072:31wyU7AIduPq/8Iq/a7Sl6G+7QgfgKAaOq5lG7/N7/v11tk:mASGq/Xq/z6GsXtlG7 |
.msg | | | Outlook Message (58.9) |
---|---|---|
.oft | | | Outlook Form Template (34.4) |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
3160 | "C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\admin\AppData\Local\Temp\FW_ We received your payment of CA$1392_22 -- SPAM EMAIL.msg" | C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE | Explorer.EXE | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Outlook Version: 14.0.6025.1000 Modules
|
PID | Process | Filename | Type | |
---|---|---|---|---|
3160 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Temp\CVR9B94.tmp.cvr | — | |
MD5:— | SHA256:— | |||
3160 | OUTLOOK.EXE | C:\Users\admin\Documents\Outlook Files\Outlook Data File - NoMail.pst | — | |
MD5:— | SHA256:— | |||
3160 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\config14[1].xml | xml | |
MD5:B4CD4D5CC0FC53E3F749CABA48E19375 | SHA256:DE4170C7D90D0E9F01B7A3EF9B60DFF43420977FC3E9609D45B2A9081E86BE8A | |||
3160 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Temp\outlook logging\firstrun.log | text | |
MD5:63CA321AD1C93E75A5A8A49FC6CFB057 | SHA256:E65D08319242962ABE1E98F087464CEA6FB5DEE6E9B77051EE8EC185A4317126 | |||
3160 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8FE462FF.dat | image | |
MD5:20F3A072180238446335CD807505F44F | SHA256:B5878382FD6B1286BC6E1861B4396C9C92D0B0A7208E4F28A29D7B165C5BBA15 | |||
3160 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\Office\ONetConfig\54946941a2b45a5ba7f3e1b905b42959.sig | binary | |
MD5:3C4D5D1BA898D1A84942728C0DDA6A39 | SHA256:619D90C1D782AD26D9176AA1646F2A4EBC8949BDB3098F79CBC79EE066A7CCF2 | |||
3160 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\{25A7FADF-288B-4B0E-BB86-6F0294397361}\{1C306CB1-771E-4B4B-A902-86E897877F5B}.png | image | |
MD5:4C61C12EDBC453D7AE184976E95258E1 | SHA256:296526F9A716C1AA91BA5D6F69F0EB92FDF79C2CB2CFCF0CEB22B7CCBC27035F | |||
3160 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_Calendar_2_332054CC0CB3524C97A3BC4957AA8143.dat | xml | |
MD5:B21ED3BD946332FF6EBC41A87776C6BB | SHA256:B1AAC4E817CD10670B785EF8E5523C4A883F44138E50486987DC73054A46F6F4 | |||
3160 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_ContactPrefs_2_FCF8C02B8C20004B9C4B82C7CCAF564C.dat | xml | |
MD5:BBCF400BD7AE536EB03054021D6A6398 | SHA256:383020065C1F31F4FB09F448599A6D5E532C390AF4E5B8AF0771FE17A23222AD | |||
3160 | OUTLOOK.EXE | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 | der | |
MD5:953BBBF2C62EB6DFC48AAC1AA78AA47F | SHA256:FB2030E7F3083D281DA52246BD5AD19971B1A2A7B9FA91F8ACDD1C4E0F43AF3C |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3160 | OUTLOOK.EXE | GET | 200 | 52.109.76.141:80 | http://office14client.microsoft.com/config14?UILCID=1033&CLCID=1033&ILCID=1033&HelpLCID=1033&App={CFF13DD8-6EF2-49EB-B265-E3BFC6501C1D}&build=14.0.6023 | IE | xml | 1.96 Kb | whitelisted |
3160 | OUTLOOK.EXE | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D | US | der | 1.47 Kb | whitelisted |
3160 | OUTLOOK.EXE | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D | US | der | 1.47 Kb | whitelisted |
3160 | OUTLOOK.EXE | GET | 200 | 23.216.77.69:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?73439498480669ec | US | compressed | 4.70 Kb | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
— | — | 64.4.26.155:80 | config.messenger.msn.com | Microsoft Corporation | US | whitelisted |
3160 | OUTLOOK.EXE | 93.184.220.29:80 | ocsp.digicert.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
3160 | OUTLOOK.EXE | 23.216.77.69:80 | ctldl.windowsupdate.com | NTT DOCOMO, INC. | US | suspicious |
3160 | OUTLOOK.EXE | 143.204.89.66:443 | dpuk71x9wlmkf.cloudfront.net | — | US | suspicious |
3160 | OUTLOOK.EXE | 52.109.76.141:80 | office14client.microsoft.com | Microsoft Corporation | IE | suspicious |
3160 | OUTLOOK.EXE | 104.17.72.206:443 | offers.indeed.com | Cloudflare Inc | US | shared |
3160 | OUTLOOK.EXE | 52.109.124.67:443 | rr.office.microsoft.com | Microsoft Corporation | SG | suspicious |
Domain | IP | Reputation |
---|---|---|
config.messenger.msn.com |
| whitelisted |
dns.msftncsi.com |
| shared |
office14client.microsoft.com |
| whitelisted |
rr.office.microsoft.com |
| whitelisted |
ctldl.windowsupdate.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
dpuk71x9wlmkf.cloudfront.net |
| malicious |
offers.indeed.com |
| malicious |
url4965.indeedemail.org |
| unknown |