analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Southco VAT Number Communication.msg

Full analysis: https://app.any.run/tasks/dc3ddcbf-98df-4f7c-bf45-f0d8d1140185
Verdict: Malicious activity
Analysis date: July 18, 2019, 11:07:44
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/vnd.ms-outlook
File info: CDFV2 Microsoft Outlook Message
MD5:

49A7751E64CDC59E7DCAC5A3901942CE

SHA1:

A86EA638CFF23CEBAFBDCD964C42AFB0AC111379

SHA256:

8DA707F352CE7A5D9620C4FEAE732CB3DE7203319C1C77EFFB29C7C5E168A9C6

SSDEEP:

1536:FLE99RJSBBiZCKvJXZDfgc0zZqfoWGWEW421Epu4eWlcU:FLEvvSXa/pTgcoQc21Epu4dJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Unusual execution from Microsoft Office

      • OUTLOOK.EXE (PID: 2880)
  • SUSPICIOUS

    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 2880)
    • Reads Internet Cache Settings

      • OUTLOOK.EXE (PID: 2880)
    • Starts Internet Explorer

      • OUTLOOK.EXE (PID: 2880)
  • INFO

    • Reads Microsoft Office registry keys

      • OUTLOOK.EXE (PID: 2880)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3936)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3936)
    • Changes internet zones settings

      • iexplore.exe (PID: 3088)
    • Application launched itself

      • iexplore.exe (PID: 3088)
    • Creates files in the user directory

      • iexplore.exe (PID: 3936)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3936)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msg | Outlook Message (58.9)
.oft | Outlook Form Template (34.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start outlook.exe iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
2880"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\admin\AppData\Local\Temp\Southco VAT Number Communication.msg"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
14.0.6025.1000
3088"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\2ROWI2L6\General VAT comms_pdf.htmlC:\Program Files\Internet Explorer\iexplore.exe
OUTLOOK.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3936"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3088 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Total events
1 817
Read events
1 351
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
4
Text files
52
Unknown types
6

Dropped files

PID
Process
Filename
Type
2880OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVRCFB4.tmp.cvr
MD5:
SHA256:
2880OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\2ROWI2L6\General VAT comms_pdf (2).html\:Zone.Identifier:$DATA
MD5:
SHA256:
2880OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmpgc
MD5:C9363ABDE879CDD5B8A4392AFB1E31D4
SHA256:158A5C506114D387FEABF3CAAB86C6CD8F975460F6761530C67E5374CAC3A5F0
2880OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\{38BE3B72-399E-49F8-AEA2-DA03CF5CB2CC}\{1C306CB1-771E-4B4B-A902-86E897877F5B}.pngimage
MD5:7D80C0A7E3849818695EAF4989186A3C
SHA256:72DC527D78A8E99331409803811CC2D287E812C008A1C869A6AEA69D7A44B597
2880OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_Calendar_2_2DC92A63EEFACE4C82031DC1AEDEA13D.datxml
MD5:B21ED3BD946332FF6EBC41A87776C6BB
SHA256:B1AAC4E817CD10670B785EF8E5523C4A883F44138E50486987DC73054A46F6F4
2880OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\2ROWI2L6\General VAT comms_pdf.htmlhtml
MD5:AFA8F8C8F5F3DEB105A3543DFF0D09ED
SHA256:EC2F93F3E9E3400E073BF9DFF7D28F891D1A8864524E81067ADE0318F6AC009B
2880OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\2ROWI2L6\General VAT comms_pdf.html:Zone.Identifiertext
MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B
SHA256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913
2880OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_AvailabilityOptions_2_5F3FD5B81DA9E14E8A86BDFE4FB1C39A.datxml
MD5:EEAA832C12F20DE6AAAA9C7B77626E72
SHA256:C4C9A90F2C961D9EE79CF08FBEE647ED7DE0202288E876C7BAAD00F4CA29CA16
3936iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\desktop.iniini
MD5:4A3DEB274BB5F0212C2419D3D8D08612
SHA256:2842973D15A14323E08598BE1DFB87E54BF88A76BE8C7BC94C56B079446EDF38
2880OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_ConversationPrefs_2_9F4459BC2B0CAE40820A8F3B132DB845.datxml
MD5:57F30B1BCA811C2FCB81F4C13F6A927B
SHA256:612BAD93621991CB09C347FF01EC600B46617247D5C041311FF459E247D8C2D3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
14
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3936
iexplore.exe
GET
200
205.185.216.10:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
US
compressed
56.3 Kb
whitelisted
3088
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2880
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted
3936
iexplore.exe
205.185.216.10:80
www.download.windowsupdate.com
Highwinds Network Group, Inc.
US
whitelisted
3936
iexplore.exe
136.147.42.81:443
southco.my.salesforce.com
Salesforce.com, Inc.
US
unknown
3936
iexplore.exe
195.130.217.187:443
protect-eu.mimecast.com
Mimecast Services Limited
GB
suspicious
136.147.42.81:443
southco.my.salesforce.com
Salesforce.com, Inc.
US
unknown

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted
protect-eu.mimecast.com
  • 195.130.217.187
  • 91.220.42.63
  • 91.220.42.215
  • 91.220.42.235
  • 195.130.217.73
  • 195.130.217.180
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
www.download.windowsupdate.com
  • 205.185.216.10
  • 205.185.216.42
whitelisted
southco.my.salesforce.com
  • 136.147.42.81
  • 136.147.40.209
  • 136.147.40.81
unknown

Threats

No threats detected
No debug info