analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

RV Aviso de pago de siniestro.msg

Full analysis: https://app.any.run/tasks/7e47fd59-2fa7-42ce-b878-a6d9b9b94824
Verdict: Malicious activity
Analysis date: April 23, 2019, 15:09:55
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/vnd.ms-outlook
File info: CDFV2 Microsoft Outlook Message
MD5:

07AA161EE13F406510278B7CB9AADC41

SHA1:

94A5F92502D11E26DD8559E70F8D423273601765

SHA256:

9A3D364521AB0CEA62CC9A886D022625E5FA3DC78C213AB83034BD932F9AB263

SSDEEP:

768:1u2oejxzggTaFRbActUsKYsKewTuppk9VNv3lVzm+sKi7AN+:SejNrwGkuS3lVl

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Unusual execution from Microsoft Office

      • OUTLOOK.EXE (PID: 3692)
  • SUSPICIOUS

    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 3692)
    • Starts Internet Explorer

      • OUTLOOK.EXE (PID: 3692)
  • INFO

    • Changes internet zones settings

      • iexplore.exe (PID: 2300)
    • Reads Microsoft Office registry keys

      • OUTLOOK.EXE (PID: 3692)
    • Creates files in the user directory

      • iexplore.exe (PID: 1812)
      • iexplore.exe (PID: 2068)
      • iexplore.exe (PID: 2300)
      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 4064)
    • Reads internet explorer settings

      • iexplore.exe (PID: 1812)
      • iexplore.exe (PID: 2068)
      • iexplore.exe (PID: 3244)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2068)
      • iexplore.exe (PID: 1812)
      • iexplore.exe (PID: 3244)
    • Application launched itself

      • iexplore.exe (PID: 2300)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2300)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2300)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2300)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msg | Outlook Message (58.9)
.oft | Outlook Form Template (34.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
42
Monitored processes
6
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start outlook.exe iexplore.exe iexplore.exe iexplore.exe flashutil32_26_0_0_131_activex.exe no specs iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
3692"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\admin\AppData\Local\Temp\RV Aviso de pago de siniestro.msg"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
14.0.6025.1000
2300"C:\Program Files\Internet Explorer\iexplore.exe" http://209.164.220.190/vcontenido/cv?k=b665d86a8a431f3f9de664089d4f72c4C:\Program Files\Internet Explorer\iexplore.exe
OUTLOOK.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
1812"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2300 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2068"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2300 CREDAT:203009C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
4064C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe® Flash® Player Installer/Uninstaller 26.0 r0
Version:
26,0,0,131
3244"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2300 CREDAT:203010C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Total events
2 071
Read events
1 518
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
66
Unknown types
30

Dropped files

PID
Process
Filename
Type
3692OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVR5CE1.tmp.cvr
MD5:
SHA256:
3692OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BDC1B5A.datimage
MD5:65713F5497F678FC904CCFC20DDEABE7
SHA256:6F513535E39F87D4362D8AF866021D1622A3D231879727FE9163719E75092E08
3692OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\EB36E6C.datimage
MD5:2093E0A0706C1D798CEA4BB087D00AD7
SHA256:E69714B9A7B986DB6B60A377DC5786F0F8B9DC2900D7C8500F78458C35DA340A
3692OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5A7A37D.datimage
MD5:846F0D466345A968A1E45E5B1994A6EC
SHA256:BC9FCCA04F2681447B334CA728F21CF4FC2EB42A18663D841D9AD631E911BA76
3692OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmpgc
MD5:4EB9BACD1A74C71F3978898268CC503C
SHA256:43A930D2FA46DAA36967AEB5908E566332EC8F99570D030E638EAAF77BE8B79B
3692OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F8DD3F93.datimage
MD5:592BFD057076A98E34F2A7F3A45A54CB
SHA256:39AEC11747A41DC80CBFB495052B0396624A91816CD45B856A6EC6219ECE8C32
3692OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\mapisvc.inftext
MD5:877AED1F82C5AFEF850A8DEC8C09AAA3
SHA256:691274552F1FCB730BD18B4BFACF82EB88DFFEB89331ABDAE8719B79B6317BD1
1812iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\1N70PVOU\cv[1].txt
MD5:
SHA256:
1812iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\desktop.iniini
MD5:4A3DEB274BB5F0212C2419D3D8D08612
SHA256:2842973D15A14323E08598BE1DFB87E54BF88A76BE8C7BC94C56B079446EDF38
3692OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_Calendar_2_095D7587CAF0D5458155F67D07631FE0.datxml
MD5:B21ED3BD946332FF6EBC41A87776C6BB
SHA256:B1AAC4E817CD10670B785EF8E5523C4A883F44138E50486987DC73054A46F6F4
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
17
TCP/UDP connections
23
DNS requests
7
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3692
OUTLOOK.EXE
GET
64.4.26.155:80
http://config.messenger.msn.com/config/msgrconfig.asmx?op=GetOlcConfig
US
whitelisted
1812
iexplore.exe
GET
200
209.164.220.176:80
http://www2.metlife.cl/campanas/2017/20170417-closing/images/closing-04.jpg
US
image
5.30 Kb
unknown
1812
iexplore.exe
GET
200
209.164.220.190:80
http://209.164.220.190/vcontenido/cv?k=b665d86a8a431f3f9de664089d4f72c4
US
html
12.7 Kb
unknown
1812
iexplore.exe
GET
304
209.164.220.176:80
http://www2.metlife.cl/campanas/2017/20170717-renovacion-poliza/images/Renovacion_Reembolso_03.jpg
US
unknown
1812
iexplore.exe
GET
304
209.164.220.176:80
http://www2.metlife.cl/campanas/2017/20170417-closing/images/closing-04.jpg
US
unknown
1812
iexplore.exe
GET
200
209.164.220.190:80
http://209.164.220.190/vcontenido/cv?k=b665d86a8a431f3f9de664089d4f72c4&i=i.png
US
html
12.7 Kb
unknown
1812
iexplore.exe
GET
304
209.164.220.176:80
http://www2.metlife.cl/campanas/2017/20170717-renovacion-poliza/images/Renovacion_Reembolso_07.jpg
US
unknown
2300
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
2300
iexplore.exe
GET
404
209.164.220.190:80
http://209.164.220.190/favicon.ico
US
text
130 b
unknown
1812
iexplore.exe
GET
200
209.164.220.190:80
http://209.164.220.190/vcontenido/cv?k=b665d86a8a431f3f9de664089d4f72c4&i=i.png
US
html
12.7 Kb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1812
iexplore.exe
209.164.220.190:80
MetLife
US
unknown
2300
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2068
iexplore.exe
108.175.108.78:443
surveys.masterbase.com
Master Base SA
US
unknown
2300
iexplore.exe
209.164.220.190:80
MetLife
US
unknown
1812
iexplore.exe
209.164.220.176:80
www2.metlife.cl
MetLife
US
unknown
3692
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted
2300
iexplore.exe
108.175.108.78:443
surveys.masterbase.com
Master Base SA
US
unknown
184.30.219.164:443
w3.metlife.cl
Akamai International B.V.
NL
whitelisted
2068
iexplore.exe
108.175.108.241:443
imgsslscl.masterbase.com
Master Base SA
US
unknown
3244
iexplore.exe
209.164.220.174:80
www.metlife.cl
MetLife
US
unknown

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted
www2.metlife.cl
  • 209.164.220.176
unknown
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
surveys.masterbase.com
  • 108.175.108.78
unknown
imgsslscl.masterbase.com
  • 108.175.108.241
unknown
www.metlife.cl
  • 209.164.220.174
unknown
w3.metlife.cl
  • 184.30.219.164
unknown

Threats

No threats detected
No debug info