File name: | Administrator Notification_ Redirecting email with malware.msg |
Full analysis: | https://app.any.run/tasks/28f4470a-342c-49db-85fc-29433663c8f5 |
Verdict: | Malicious activity |
Analysis date: | July 17, 2019, 16:42:27 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MIME: | application/vnd.ms-outlook |
File info: | CDFV2 Microsoft Outlook Message |
MD5: | 9C9DC6443B9E46C14B33BA848E64C4BE |
SHA1: | B59376B1B989A67FD1B45259AB0130520E5B5B40 |
SHA256: | 7DB91FBD6299E6C6C9BFC8B9C0A531ED15641890E3DE76CA7667C47BB0F5F86F |
SSDEEP: | 3072:R6jJ2eOv+rESHr9gdvkYRL7uv7i+VpuO5Z+rESHr9gdvkY3uv7opuVFf:GOv+PHhgFkcuv7hVpuO7+PHhgFkauv7B |
.msg | | | Outlook Message (58.9) |
---|---|---|
.oft | | | Outlook Form Template (34.4) |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
540 | "C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\admin\AppData\Local\Temp\Administrator Notification_ Redirecting email with malware.msg" | C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Outlook Version: 14.0.6025.1000 Modules
| |||||||||||||||
1636 | "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\MWLV7C0G\VM alert July-17 wav.html | C:\Program Files\Internet Explorer\iexplore.exe | OUTLOOK.EXE | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Version: 8.00.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
876 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1636 CREDAT:71937 | C:\Program Files\Internet Explorer\iexplore.exe | iexplore.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Internet Explorer Version: 8.00.7600.16385 (win7_rtm.090713-1255) Modules
|
PID | Process | Filename | Type | |
---|---|---|---|---|
540 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Temp\CVRF4A1.tmp.cvr | — | |
MD5:— | SHA256:— | |||
540 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Temp\~DFC48EDE59637185BA.TMP | — | |
MD5:— | SHA256:— | |||
540 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\MWLV7C0G\VM alert July-17 wav (2).html\:Zone.Identifier:$DATA | — | |
MD5:— | SHA256:— | |||
1636 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\favicon[1].ico | — | |
MD5:— | SHA256:— | |||
1636 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico | — | |
MD5:— | SHA256:— | |||
540 | OUTLOOK.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotm | pgc | |
MD5:B842BCB6DBFA869FF6825E814179E6BF | SHA256:7DDBAC6FBF9DD8FDC820E0D6CBC0526FA95C54F3EA2ABD497C9A50CFB7FB199E | |||
540 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Temp\StructuredQuery.log | text | |
MD5:B0688698196CD79F6014B39E4A6CE9A9 | SHA256:A93F84A8040AB923AF685FA8D569EF70DD5101CAF8D76BBEFAF7A86384CE7792 | |||
540 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\MWLV7C0G\VM alert July-17 wav.html | html | |
MD5:2095632BA498BA05AC816709616E61EE | SHA256:85C7D48BC22FD6E1A9A464633D2F7413C5EC5FF9DAD5A2CC65046DAB8A2ACAF0 | |||
540 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\{FF5169EA-8585-4199-BDC2-3912BD1646B9}\{1C306CB1-771E-4B4B-A902-86E897877F5B}.png | image | |
MD5:7D80C0A7E3849818695EAF4989186A3C | SHA256:72DC527D78A8E99331409803811CC2D287E812C008A1C869A6AEA69D7A44B597 | |||
876 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\MSHist012019071720190718\index.dat | dat | |
MD5:821982893FC56D2BA2720846B2EFA80F | SHA256:8AA9A688F8DBB504E66308A488FD61AC01496DD1B94E648301C899E89566AD5E |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
540 | OUTLOOK.EXE | GET | — | 64.4.26.155:80 | http://config.messenger.msn.com/config/msgrconfig.asmx?op=GetOlcConfig | US | — | — | whitelisted |
1636 | iexplore.exe | GET | 200 | 204.79.197.200:80 | http://www.bing.com/favicon.ico | US | image | 237 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
1636 | iexplore.exe | 204.79.197.200:80 | www.bing.com | Microsoft Corporation | US | whitelisted |
876 | iexplore.exe | 104.19.196.151:443 | cdnjs.cloudflare.com | Cloudflare Inc | US | shared |
876 | iexplore.exe | 23.98.55.144:443 | bbobob.blob.core.windows.net | Microsoft Corporation | US | unknown |
540 | OUTLOOK.EXE | 64.4.26.155:80 | config.messenger.msn.com | Microsoft Corporation | US | whitelisted |
876 | iexplore.exe | 209.197.3.15:443 | maxcdn.bootstrapcdn.com | Highwinds Network Group, Inc. | US | whitelisted |
876 | iexplore.exe | 205.185.208.52:443 | code.jquery.com | Highwinds Network Group, Inc. | US | unknown |
1636 | iexplore.exe | 23.98.55.144:443 | bbobob.blob.core.windows.net | Microsoft Corporation | US | unknown |
876 | iexplore.exe | 95.216.15.24:443 | www.freeiconspng.com | Hetzner Online GmbH | DE | suspicious |
876 | iexplore.exe | 152.199.23.37:443 | aadcdn.msftauth.net | MCI Communications Services, Inc. d/b/a Verizon Business | US | suspicious |
876 | iexplore.exe | 20.190.137.98:443 | login.microsoftonline.com | Microsoft Corporation | US | suspicious |
Domain | IP | Reputation |
---|---|---|
config.messenger.msn.com |
| whitelisted |
www.bing.com |
| whitelisted |
bbobob.blob.core.windows.net |
| unknown |
maxcdn.bootstrapcdn.com |
| whitelisted |
cdnjs.cloudflare.com |
| whitelisted |
stackpath.bootstrapcdn.com |
| whitelisted |
aadcdn.msftauth.net |
| whitelisted |
secure.aadcdn.microsoftonline-p.com |
| whitelisted |
code.jquery.com |
| whitelisted |
www.freeiconspng.com |
| whitelisted |