analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

payment confirmation.zip

Full analysis: https://app.any.run/tasks/9e5e33d8-9cb0-48b4-9800-23b3b9a01348
Verdict: Malicious activity
Analysis date: October 04, 2022, 19:57:15
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

9608FA314FA7A98436FC869C1F606E8A

SHA1:

86154D23AF801EDB7E72D38188DB61F3A6EDDC99

SHA256:

7C0A80FD8F607EB9EE4B55614FC01E23AF01CFDF264A46B0EEA7BCD05073D33A

SSDEEP:

12288:I/+JkIgSXwmZal4KMmpchO8N5xCgwRUOMjDkCfOFfN+F1Zx5yv0QGm:I/+dvACWch75xCvMjDwWrSMQt

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Unusual execution from Microsoft Office

      • OUTLOOK.EXE (PID: 3496)
  • SUSPICIOUS

    • Checks supported languages

      • WinRAR.exe (PID: 2988)
    • Reads the computer name

      • WinRAR.exe (PID: 2988)
    • Reads Microsoft Outlook installation path

      • WinRAR.exe (PID: 2988)
      • iexplore.exe (PID: 760)
    • Starts Microsoft Office Application

      • WinRAR.exe (PID: 2988)
    • Starts Internet Explorer

      • OUTLOOK.EXE (PID: 3496)
  • INFO

    • Reads Microsoft Office registry keys

      • WinRAR.exe (PID: 2988)
      • OUTLOOK.EXE (PID: 3496)
    • Checks supported languages

      • OUTLOOK.EXE (PID: 3496)
      • iexplore.exe (PID: 760)
      • iexplore.exe (PID: 2448)
    • Reads the computer name

      • OUTLOOK.EXE (PID: 3496)
      • iexplore.exe (PID: 2448)
      • iexplore.exe (PID: 760)
    • Searches for installed software

      • OUTLOOK.EXE (PID: 3496)
    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 3496)
      • iexplore.exe (PID: 2448)
    • Changes internet zones settings

      • iexplore.exe (PID: 2448)
    • Application launched itself

      • iexplore.exe (PID: 2448)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 760)
      • iexplore.exe (PID: 2448)
    • Reads internet explorer settings

      • iexplore.exe (PID: 760)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 760)
      • iexplore.exe (PID: 2448)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs outlook.exe iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
2988"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\payment confirmation.zip"C:\Program Files\WinRAR\WinRAR.exeExplorer.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
3496"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\admin\AppData\Local\Temp\Rar$DIa2988.10147\payment confirmation.msg"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE
WinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
14.0.6025.1000
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\microsoft office\office14\outlook.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2448"C:\Program Files\Internet Explorer\iexplore.exe" https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fview.storydoc.com%2Fh3uRqSg2&data=05%7C01%7Cjmdeloviar%40epldt.com%7C9b19f196acbc47049bd208daa5249045%7C8a52663257dd46c894e3473cb3d70348%7C0%7C0%7C638003873721298771%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=CjOGa9%2BKQL74NVewd0%2BVAGVV66BTNBLpEOoO2Qri9eI%3D&reserved=0C:\Program Files\Internet Explorer\iexplore.exe
OUTLOOK.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
760"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2448 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
15 076
Read events
14 347
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
7
Text files
26
Unknown types
6

Dropped files

PID
Process
Filename
Type
3496OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVRB5B4.tmp.cvr
MD5:
SHA256:
3496OUTLOOK.EXEC:\Users\admin\Documents\Outlook Files\Outlook Data File - NoMail.pst
MD5:
SHA256:
3496OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\outlook logging\firstrun.logtext
MD5:3CDE436B7FFB8406F33B8A8AD1A8CA77
SHA256:9530CD7C66A5DFA942FBB2E6A25C46DAA29AB7A8EAEE3EC0BDF280269D0E41A3
2988WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIa2988.10147\payment confirmation.msgmsg
MD5:51F157CECDA1C107CA184F52AC0CF5AF
SHA256:A8AAFB70616B3BFF7F1CA0AA3BA3A0A50F78A9E4BE870EDB81ABBED6A57059AD
3496OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmpgc
MD5:687A0A11039763BFBAA303F1B888DB5D
SHA256:E1AE8158DAEEABCF7157053B5D0743FDDE222D28C27F2A3706E8D3A8A0BE2C79
3496OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_Calendar_2_19B021CDBB839C4198E61F74447800A1.datxml
MD5:B21ED3BD946332FF6EBC41A87776C6BB
SHA256:B1AAC4E817CD10670B785EF8E5523C4A883F44138E50486987DC73054A46F6F4
2448iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442der
MD5:B8BDA0B382A7D056A4241B388338B778
SHA256:7BAA967F6686CCE471826B20FFA5CB7FEB4BF3C5C0BF43F51F08E84EB5850DD2
3496OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C47ABAB4.datimage
MD5:C824403243CED636474797FDFC1FC8A9
SHA256:9E8409BB54D83F149CD11CE9071EACC7CC477429C641F94F7F326BA664650D23
2448iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:01379EFDC8EE014590F9E7C95B64C22F
SHA256:53909CA07A2DE662B9C655749B6C13032373D53655ECC7667DFDB36F2A6BBCC3
3496OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\{59825B10-87DA-42AD-A80D-7E587AA282E0}\{1C306CB1-771E-4B4B-A902-86E897877F5B}.pngimage
MD5:4C61C12EDBC453D7AE184976E95258E1
SHA256:296526F9A716C1AA91BA5D6F69F0EB92FDF79C2CB2CFCF0CEB22B7CCBC27035F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
19
DNS requests
11
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3496
OUTLOOK.EXE
GET
64.4.26.155:80
http://config.messenger.msn.com/config/msgrconfig.asmx?op=GetOlcConfig
US
whitelisted
760
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAGewca9P1l7sgwzOOVR2Hc%3D
US
der
471 b
whitelisted
2448
iexplore.exe
GET
200
209.197.3.8:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?8cff23214fc04e70
US
compressed
4.70 Kb
whitelisted
2448
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2BnRyLFPYjID1ie%2Bx%2BdSjo%3D
US
der
1.47 Kb
whitelisted
2448
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
2448
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3496
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2448
iexplore.exe
209.197.3.8:80
ctldl.windowsupdate.com
STACKPATH-CDN
US
whitelisted
760
iexplore.exe
104.47.110.28:443
apc01.safelinks.protection.outlook.com
MICROSOFT-CORP-MSN-AS-BLOCK
JP
suspicious
2448
iexplore.exe
13.107.21.200:443
www.bing.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2448
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
EDGECAST
GB
whitelisted
760
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
EDGECAST
GB
whitelisted
2448
iexplore.exe
152.199.19.161:443
r20swj13mr.microsoft.com
EDGECAST
US
whitelisted
2448
iexplore.exe
204.79.197.200:443
www.bing.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2448
iexplore.exe
104.86.46.111:443
go.microsoft.com
AKAMAI-AS
DE
suspicious

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted
apc01.safelinks.protection.outlook.com
  • 104.47.110.28
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 13.107.21.200
  • 204.79.197.200
whitelisted
ctldl.windowsupdate.com
  • 209.197.3.8
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
ieonline.microsoft.com
  • 204.79.197.200
whitelisted
go.microsoft.com
  • 104.86.46.111
whitelisted

Threats

No threats detected
No debug info