analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

guyraf4x.eml

Full analysis: https://app.any.run/tasks/c7554bc2-9673-4cf3-9520-9e3fd152cc56
Verdict: Malicious activity
Analysis date: January 24, 2022, 15:27:21
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: message/rfc822
File info: RFC 822 mail, ASCII text, with very long lines, with CRLF line terminators
MD5:

39BFD3DEF04C4D32D225C0C85F705433

SHA1:

35B754764FABCD3BD0FFD1E312E2462D42AAF55A

SHA256:

B5E189C08581B8E3843C4ADD0678FF310D7353BA103A0267CDA1D3A497182A33

SSDEEP:

768:BIfWE2wVSIphRFwTi9JwZl8bO0ptxIvW8KK:6fWEtVZRN1txIvW8KK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Checks supported languages

      • OUTLOOK.EXE (PID: 3148)
    • Starts Internet Explorer

      • OUTLOOK.EXE (PID: 3148)
    • Searches for installed software

      • OUTLOOK.EXE (PID: 3148)
    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 3148)
    • Reads the computer name

      • OUTLOOK.EXE (PID: 3148)
    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 1388)
  • INFO

    • Checks supported languages

      • iexplore.exe (PID: 2828)
      • iexplore.exe (PID: 1388)
    • Reads the computer name

      • iexplore.exe (PID: 2828)
      • iexplore.exe (PID: 1388)
    • Changes internet zones settings

      • iexplore.exe (PID: 2828)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 1388)
      • iexplore.exe (PID: 2828)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 1388)
      • iexplore.exe (PID: 2828)
    • Application launched itself

      • iexplore.exe (PID: 2828)
    • Reads internet explorer settings

      • iexplore.exe (PID: 1388)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2828)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2828)
    • Creates files in the user directory

      • iexplore.exe (PID: 2828)
    • Reads Microsoft Office registry keys

      • OUTLOOK.EXE (PID: 3148)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.eml | E-Mail message (Var. 5) (100)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start outlook.exe iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
3148"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE" /eml "C:\Users\admin\AppData\Local\Temp\guyraf4x.eml"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
14.0.6025.1000
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\microsoft office\office14\outlook.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2828"C:\Program Files\Internet Explorer\iexplore.exe" https://community.interact-intranet.com/Interact/Pages/Content/Document.aspx?id=9894C:\Program Files\Internet Explorer\iexplore.exe
OUTLOOK.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\version.dll
c:\windows\system32\sechost.dll
1388"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2828 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\iertutil.dll
Total events
13 892
Read events
13 180
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
11
Text files
27
Unknown types
8

Dropped files

PID
Process
Filename
Type
3148OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVRE8DC.tmp.cvr
MD5:
SHA256:
3148OUTLOOK.EXEC:\Users\admin\Documents\Outlook Files\Outlook Data File - NoMail.pst
MD5:
SHA256:
1388iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:2011272E84C01CCCBA1117EA5F345AA5
SHA256:BDAC72775ACF04D1975E26A00E860A293C352772AA2642540BCD7698F75BDFD8
3148OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmpgc
MD5:D1DE5384EB8D839A26AC4D3BCDE24B22
SHA256:A76A3F82C0618005E50FBBF763A4C1A02DE0E45105EE06E8DD4DBAB05399F68C
1388iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4Fder
MD5:CC0C289EA7D427477ACE1B0A0DB02D54
SHA256:A7A7E062E466C1F51B146C74B9C252AF0BCAC6D9DE256E85384A972BA13BE432
1388iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894der
MD5:0DC75DE287CD67628F7B2FA021B969BC
SHA256:0CD440EE17E151352466EF4AE984B62D380819BEFEE212F21B65B7E67A712FC9
1388iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FC5A820A001B41D68902E051F36A5282_7C36A2C75A7A199F7578F46DB98EBA1Fder
MD5:43BF69478AEB123F41F3C54CF8E1DF3C
SHA256:E730FCBCE6A518F0C0F0ECD1385D2DB806B8F029B65B34ECBA7B9868DE5A1323
1388iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894binary
MD5:4447AE6C761DEAB36BC658544EEC923D
SHA256:5855143C867B13A6B07BFDD0AF6FD557AF9927EBC0A1A1F2B3C47CB59BF680AC
3148OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_ContactPrefs_2_62EF35BE61DD934AA5B39079C482A83C.datxml
MD5:BBCF400BD7AE536EB03054021D6A6398
SHA256:383020065C1F31F4FB09F448599A6D5E532C390AF4E5B8AF0771FE17A23222AD
3148OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_RssRule_2_80CC8EFDF11D5049B4340799CED6216B.datxml
MD5:D8B37ED0410FB241C283F72B76987F18
SHA256:31E68049F6B7F21511E70CD7F2D95B9CF1354CF54603E8F47C1FC40F40B7A114
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
27
DNS requests
19
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1388
iexplore.exe
GET
200
143.204.101.190:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwZ%2FlFeFh%2Bisd96yUzJbvJmLVg0%3D
US
der
1.39 Kb
shared
2828
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
1388
iexplore.exe
GET
200
108.156.253.168:80
http://ocsp.sca1b.amazontrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQz9arGHWbnBV0DFzpNHz4YcTiFDQQUWaRmBlKge5WSPKOUByeWdFv5PdACEAwegwtspBzoIF99ZpmJNnA%3D
US
der
471 b
whitelisted
2828
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
1388
iexplore.exe
GET
200
143.204.101.177:80
http://o.ss2.us//MEowSDBGMEQwQjAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCCQCnDkpMNIK3fw%3D%3D
US
der
1.70 Kb
whitelisted
1388
iexplore.exe
GET
200
143.204.101.124:80
http://ocsp.rootg2.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBSIfaREXmfqfJR3TkMYnD7O5MhzEgQUnF8A36oB1zArOIiiuG1KnPIRkYMCEwZ%2FlEoqJ83z%2BsKuKwH5CO65xMY%3D
US
der
1.51 Kb
whitelisted
2828
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA177el9ggmWelJjG4vdGL0%3D
US
der
471 b
whitelisted
1388
iexplore.exe
GET
200
2.16.106.163:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?be988fd59a2b0f66
unknown
compressed
4.70 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3148
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted
1388
iexplore.exe
143.204.101.177:80
o.ss2.us
US
suspicious
54.170.98.87:443
community.interact-intranet.com
Amazon.com, Inc.
IE
unknown
1388
iexplore.exe
54.170.98.87:443
community.interact-intranet.com
Amazon.com, Inc.
IE
unknown
1388
iexplore.exe
2.16.106.163:80
ctldl.windowsupdate.com
Akamai International B.V.
whitelisted
1388
iexplore.exe
143.204.101.124:80
ocsp.rootg2.amazontrust.com
US
whitelisted
1388
iexplore.exe
143.204.101.190:80
ocsp.rootg2.amazontrust.com
US
whitelisted
2828
iexplore.exe
131.253.33.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
2828
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
1388
iexplore.exe
108.156.253.168:80
ocsp.sca1b.amazontrust.com
US
whitelisted

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted
community.interact-intranet.com
  • 54.170.98.87
  • 52.210.82.46
unknown
ctldl.windowsupdate.com
  • 2.16.106.163
  • 2.16.106.233
  • 2.16.106.178
whitelisted
o.ss2.us
  • 143.204.101.177
  • 143.204.101.99
  • 143.204.101.195
  • 143.204.101.123
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 131.253.33.200
  • 13.107.22.200
whitelisted
ocsp.rootg2.amazontrust.com
  • 143.204.101.124
  • 143.204.101.74
  • 143.204.101.190
  • 143.204.101.42
whitelisted
ocsp.rootca1.amazontrust.com
  • 143.204.101.190
  • 143.204.101.124
  • 143.204.101.42
  • 143.204.101.74
shared
ocsp.sca1b.amazontrust.com
  • 108.156.253.168
  • 108.156.253.92
  • 108.156.253.141
  • 108.156.253.131
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted

Threats

No threats detected
No debug info