File name:

Fwd_ Urgent reques for quotion 2025.eml

Full analysis: https://app.any.run/tasks/67cb5fba-f6f7-42bd-84fa-d7a8fd81c138
Verdict: Malicious activity
Analysis date: April 17, 2025, 07:33:10
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
susp-attachments
attachments
attc-html
attc-unc
Indicators:
MIME: message/rfc822
File info: RFC 822 mail, ASCII text, with CRLF line terminators
MD5:

3210024CEC748B2F87CFFD5971A68DCA

SHA1:

F19501EFEDAA2866D9F4C1FB765535917C05C369

SHA256:

7CA15FE44AD623B2374F0D057DFD59CE6AA20230C5DBA32212C9DC3A37B4AC9E

SSDEEP:

24576:H4dlWf5Ck09F+C1w19zzS+EJ5xSva+OkgBl256MKRIFnDObKjabpFsxoAT+NsQd/:Yde10sDeJraxg25tKRAqJpFy2OVi

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • Kazeem Engineering RFQ 099263666_pdf.exe (PID: 7784)
      • Kazeem Engineering RFQ 099263666_pdf.exe (PID: 7828)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 7704)
      • Kazeem Engineering RFQ 099263666_pdf.exe (PID: 7828)
    • Email with suspicious attachment

      • OUTLOOK.EXE (PID: 896)
    • The process creates files with name similar to system file names

      • Kazeem Engineering RFQ 099263666_pdf.exe (PID: 7784)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • Kazeem Engineering RFQ 099263666_pdf.exe (PID: 7784)
    • Executable content was dropped or overwritten

      • Kazeem Engineering RFQ 099263666_pdf.exe (PID: 7784)
    • Application launched itself

      • Kazeem Engineering RFQ 099263666_pdf.exe (PID: 7784)
  • INFO

    • Email with attachments

      • OUTLOOK.EXE (PID: 896)
    • The sample compiled with english language support

      • OUTLOOK.EXE (PID: 896)
      • WinRAR.exe (PID: 7704)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7704)
    • Checks supported languages

      • Kazeem Engineering RFQ 099263666_pdf.exe (PID: 7784)
      • Kazeem Engineering RFQ 099263666_pdf.exe (PID: 7828)
    • Creates files or folders in the user directory

      • Kazeem Engineering RFQ 099263666_pdf.exe (PID: 7784)
      • Kazeem Engineering RFQ 099263666_pdf.exe (PID: 7828)
    • Create files in a temporary directory

      • Kazeem Engineering RFQ 099263666_pdf.exe (PID: 7784)
    • Reads the machine GUID from the registry

      • Kazeem Engineering RFQ 099263666_pdf.exe (PID: 7828)
    • Checks proxy server information

      • Kazeem Engineering RFQ 099263666_pdf.exe (PID: 7828)
    • Reads the computer name

      • Kazeem Engineering RFQ 099263666_pdf.exe (PID: 7828)
    • Reads the software policy settings

      • Kazeem Engineering RFQ 099263666_pdf.exe (PID: 7828)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.eml | E-Mail message (Var. 5) (100)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
138
Monitored processes
7
Malicious processes
1
Suspicious processes
3

Behavior graph

Click at the process to see the details
start outlook.exe sppextcomobj.exe no specs slui.exe no specs ai.exe no specs winrar.exe kazeem engineering rfq 099263666_pdf.exe kazeem engineering rfq 099263666_pdf.exe

Process information

PID
CMD
Path
Indicators
Parent process
672"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exe" "94DC588E-CA4D-45DB-914B-6D547089008F" "66613479-5A4A-4EB8-B561-4E40739DBFB4" "896"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exeOUTLOOK.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Artificial Intelligence (AI) Host for the Microsoft® Windows® Operating System and Platform x64.
Version:
0.12.2.0
Modules
Images
c:\program files\microsoft office\root\vfs\programfilescommonx64\microsoft shared\office16\ai.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\common files\microsoft shared\clicktorun\appvisvsubsystems64.dll
c:\windows\system32\advapi32.dll
c:\program files\common files\microsoft shared\clicktorun\c2r64.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\sechost.dll
896"C:\Program Files\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\admin\AppData\Local\Temp\Fwd_ Urgent reques for quotion 2025.eml"C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
16.0.16026.20146
Modules
Images
c:\program files\microsoft office\root\office16\outlook.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
4400C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
6872"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7704"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\GYYTS8OA\Kazeem Engineering RFQ 099263666_pdf.txz"C:\Program Files\WinRAR\WinRAR.exe
OUTLOOK.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7784"C:\Users\admin\AppData\Local\Temp\Rar$EXa7704.4989\Kazeem Engineering RFQ 099263666_pdf.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa7704.4989\Kazeem Engineering RFQ 099263666_pdf.exe
WinRAR.exe
User:
admin
Company:
transversal stvningsmands sykofanternes
Integrity Level:
MEDIUM
Description:
camions
Exit code:
0
Version:
1.4.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa7704.4989\kazeem engineering rfq 099263666_pdf.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
7828"C:\Users\admin\AppData\Local\Temp\Rar$EXa7704.4989\Kazeem Engineering RFQ 099263666_pdf.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa7704.4989\Kazeem Engineering RFQ 099263666_pdf.exe
Kazeem Engineering RFQ 099263666_pdf.exe
User:
admin
Company:
transversal stvningsmands sykofanternes
Integrity Level:
MEDIUM
Description:
camions
Version:
1.4.0.0
Modules
Images
c:\windows\syswow64\mshtml.dll
c:\users\admin\appdata\local\temp\rar$exa7704.4989\kazeem engineering rfq 099263666_pdf.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
Total events
15 392
Read events
14 250
Write events
1 021
Delete events
121

Modification events

(PID) Process:(896) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\ClientTelemetry\Sampling
Operation:writeName:6
Value:
01941A000000001000B24E9A3E06000000000000000600000000000000
(PID) Process:(896) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\CrashPersistence\OUTLOOK\896
Operation:writeName:0
Value:
0B0E1039D0DD1370F31D49BAD5FC3692FDDF422300468F89A6ECAFEDEBED016A04102400449A7D64B29D01008500A907556E6B6E6F776EC906022222CA0DC2190000C91003783634C5118007D2120B6F00750074006C006F006F006B002E00650078006500C51620C517808004C91808323231322D44656300
(PID) Process:(896) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics
Operation:delete valueName:BootCommand
Value:
(PID) Process:(896) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics
Operation:delete valueName:BootFailureCount
Value:
(PID) Process:(896) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsDataPreviousSession
Operation:delete keyName:(default)
Value:
(PID) Process:(896) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsDataPreviousSession
Operation:writeName:CantBootResolution
Value:
BootSuccess
(PID) Process:(896) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsDataPreviousSession
Operation:writeName:ProfileBeingOpened
Value:
Outlook
(PID) Process:(896) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsDataPreviousSession
Operation:writeName:SessionId
Value:
C3D8E96E-C1AF-4750-8D52-F4E28119C131
(PID) Process:(896) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics\BootDiagnosticsDataPreviousSession
Operation:writeName:BootDiagnosticsLogFile
Value:
C:\Users\admin\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16026_20146-20240718T1116060318-1644.etl
(PID) Process:(896) OUTLOOK.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Diagnostics
Operation:delete valueName:ProfileBeingOpened
Value:
Executable files
2
Suspicious files
21
Text files
9
Unknown types
0

Dropped files

PID
Process
Filename
Type
896OUTLOOK.EXEC:\Users\admin\Documents\Outlook Files\Outlook1.pst
MD5:
SHA256:
7784Kazeem Engineering RFQ 099263666_pdf.exeC:\Users\admin\AppData\Roaming\strafudmaalingen\reverent\Aalekvabbernes.nea
MD5:
SHA256:
7784Kazeem Engineering RFQ 099263666_pdf.exeC:\Users\admin\AppData\Roaming\strafudmaalingen\reverent\Caprylate.foo
MD5:
SHA256:
896OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmbinary
MD5:9CDD7E06B16B402A9BDE24ED1CF7707B
SHA256:9430F90CF979A2F90FEA8B4885BF690DAED46D5A254F712728A175BAE1AF97CC
896OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\9E27CF42-8B44-4E39-81E6-016530CB4648xml
MD5:EAD096EE7F9B0209705C173C6A45D0B1
SHA256:1882EFFE1EDE2482A3224B16CA14C50A7871FC40687996EC416371B84A5CBF6D
896OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\56a61aeb75d8f5be186c26607f4bb213abe7c5ec.tbresbinary
MD5:C3E7CC52B77D0BC4F872053D16531327
SHA256:1053E2863CD348D4DB83FEC762623B37E02F8CC6DC7612F20127309800418EC7
896OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbresbinary
MD5:342763D1B0CE45B0DD3FA7ECDE275918
SHA256:6EC39D63645A4225D2903FABC3F353D65514A775DA14FB183081CAE3FE6BE8AC
896OUTLOOK.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9binary
MD5:4444A113F46CAF623D19939100931376
SHA256:04C225C5E97B2DD26DE5569B1F2BF2DEF85F9394559167AA7452C8CFE5AC7152
896OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\olkC8A1.tmpbinary
MD5:FBDE16C7157319104745231CB3E968BC
SHA256:90A2D4966A0AA6AEFB72A26EAA036C5CF2691D744B8128889E0D1FD492BE8124
7784Kazeem Engineering RFQ 099263666_pdf.exeC:\Users\admin\AppData\Roaming\strafudmaalingen\reverent\kkkenmaskinens.Ski250binary
MD5:420C892182B725E2A250A06D20645BFD
SHA256:CAD83FADAF1537A07C7ED625A099C3AA75A59F0352116ED51D88FEBBACBFD256
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
33
DNS requests
25
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.20.245.139:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
896
OUTLOOK.EXE
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
whitelisted
896
OUTLOOK.EXE
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D
unknown
whitelisted
7608
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7608
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7828
Kazeem Engineering RFQ 099263666_pdf.exe
GET
200
172.217.16.195:80
http://c.pki.goog/r/gsr1.crl
unknown
whitelisted
7828
Kazeem Engineering RFQ 099263666_pdf.exe
GET
200
172.217.16.195:80
http://c.pki.goog/r/r4.crl
unknown
whitelisted
7828
Kazeem Engineering RFQ 099263666_pdf.exe
GET
200
216.58.206.67:80
http://o.pki.goog/we2/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTuMJxAT2trYla0jia%2F5EUSmLrk3QQUdb7Ed66J9kQ3fc%2BxaB8dGuvcNFkCEQDQZgpWpezrXAmFnbj86J49
unknown
whitelisted
7828
Kazeem Engineering RFQ 099263666_pdf.exe
GET
200
216.58.206.67:80
http://o.pki.goog/we2/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTuMJxAT2trYla0jia%2F5EUSmLrk3QQUdb7Ed66J9kQ3fc%2BxaB8dGuvcNFkCEDmdiANCnbVJCTfkel4NKS0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.20.245.139:80
crl.microsoft.com
Akamai International B.V.
SE
whitelisted
4
System
192.168.100.255:138
whitelisted
896
OUTLOOK.EXE
52.109.89.18:443
officeclient.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
896
OUTLOOK.EXE
52.123.131.14:443
ecs.office.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6544
svchost.exe
20.190.159.129:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.124.78.146
whitelisted
google.com
  • 142.250.181.238
whitelisted
crl.microsoft.com
  • 2.20.245.139
  • 2.20.245.137
whitelisted
officeclient.microsoft.com
  • 52.109.89.18
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
ecs.office.com
  • 52.123.131.14
  • 52.123.130.14
whitelisted
login.live.com
  • 20.190.159.129
  • 40.126.31.71
  • 20.190.159.0
  • 40.126.31.131
  • 20.190.159.75
  • 40.126.31.130
  • 40.126.31.69
  • 40.126.31.67
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
roaming.officeapps.live.com
  • 52.109.76.243
whitelisted
omex.cdn.office.net
  • 2.16.168.119
  • 2.16.168.101
whitelisted

Threats

No threats detected
No debug info