analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

1585589597-142fb317bb544d0001-zrBnoB.eml

Full analysis: https://app.any.run/tasks/1df75942-80fa-4bf9-b0c2-e668cb7e11b3
Verdict: Malicious activity
Analysis date: March 30, 2020, 19:02:40
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
phishing
phish-amex
Indicators:
MIME: text/plain
File info: ASCII text, with CRLF line terminators
MD5:

F8F24AB94BB4018ACA5A0BF26BAFEA7F

SHA1:

464022E812CF770D05B704DC1E9FA8880D47B701

SHA256:

BA56A732C7E6B5F04902E64FD863584045F4E42E1DCDFC18452012129B434FDD

SSDEEP:

3072:dHcZsRyYva+Oa2TgjSj1nPy6eIyU7tE92GtPSFxDVa:dOsJa+Oau6d4Y2WSk

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Outlook phishing page detected

      • iexplore.exe (PID: 2824)
  • SUSPICIOUS

    • Starts Internet Explorer

      • AcroRd32.exe (PID: 3912)
    • Reads Internet Cache Settings

      • OUTLOOK.EXE (PID: 2784)
    • Changes IE settings (feature browser emulation)

      • AcroRd32.exe (PID: 3912)
    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 2784)
    • Creates files in the program directory

      • AdobeARM.exe (PID: 2820)
  • INFO

    • Reads the hosts file

      • RdrCEF.exe (PID: 2756)
    • Application launched itself

      • iexplore.exe (PID: 1412)
      • RdrCEF.exe (PID: 2756)
    • Changes internet zones settings

      • iexplore.exe (PID: 1412)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2824)
      • AcroRd32.exe (PID: 3028)
      • iexplore.exe (PID: 1412)
      • AcroRd32.exe (PID: 3912)
    • Reads Microsoft Office registry keys

      • OUTLOOK.EXE (PID: 2784)
    • Creates files in the user directory

      • iexplore.exe (PID: 2824)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2824)
    • Reads settings of System Certificates

      • AcroRd32.exe (PID: 3912)
      • iexplore.exe (PID: 2824)
      • iexplore.exe (PID: 1412)
    • Changes settings of System certificates

      • iexplore.exe (PID: 1412)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 1412)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.eml | E-Mail message (Var. 3) (100)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
45
Monitored processes
10
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start outlook.exe acrord32.exe acrord32.exe no specs rdrcef.exe no specs rdrcef.exe no specs rdrcef.exe no specs iexplore.exe iexplore.exe adobearm.exe no specs reader_sl.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2784"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE" /eml "C:\Users\admin\AppData\Local\Temp\1585589597-142fb317bb544d0001-zrBnoB.eml"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
14.0.6025.1000
3912"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\TFSM1H4Y\american express 03 30 2020.pdf"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
OUTLOOK.EXE
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe Acrobat Reader DC
Version:
15.23.20070.215641
3028"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" --type=renderer "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\TFSM1H4Y\american express 03 30 2020.pdf"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeAcroRd32.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe Acrobat Reader DC
Version:
15.23.20070.215641
2756"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16448250C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeAcroRd32.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe RdrCEF
Version:
15.23.20053.211670
2440"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-3d-apis --disable-databases --disable-direct-npapi-requests --disable-file-system --disable-notifications --disable-shared-workers --disable-direct-write --lang=en-US --lang=en-US --log-severity=disable --product-version="ReaderServices/15.23.20053 Chrome/45.0.2454.85" --device-scale-factor=1 --enable-delegated-renderer --num-raster-threads=2 --gpu-rasterization-msaa-sample-count=8 --content-image-texture-target=3553 --video-image-texture-target=3553 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --channel="2756.0.48852870\1433681330" --allow-no-sandbox-job /prefetch:673131151C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeRdrCEF.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe RdrCEF
Version:
15.23.20053.211670
3188"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-3d-apis --disable-databases --disable-direct-npapi-requests --disable-file-system --disable-notifications --disable-shared-workers --disable-direct-write --lang=en-US --lang=en-US --log-severity=disable --product-version="ReaderServices/15.23.20053 Chrome/45.0.2454.85" --device-scale-factor=1 --enable-delegated-renderer --num-raster-threads=2 --gpu-rasterization-msaa-sample-count=8 --content-image-texture-target=3553 --video-image-texture-target=3553 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --channel="2756.1.1043387656\1430810892" --allow-no-sandbox-job /prefetch:673131151C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeRdrCEF.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe RdrCEF
Version:
15.23.20053.211670
1412"C:\Program Files\Internet Explorer\iexplore.exe" http://measure.mo.s3-website.us-east-2.amazonaws.com/C:\Program Files\Internet Explorer\iexplore.exe
AcroRd32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
2824"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1412 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
2820"C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" /PRODUCT:Reader /VERSION:15.0 /MODE:3C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exeAcroRd32.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe Reader and Acrobat Manager
Version:
1.824.27.2646
3500"C:\Program Files\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe" C:\Program Files\Adobe\Acrobat Reader DC\Reader\Reader_sl.exeAdobeARM.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe Acrobat SpeedLauncher
Exit code:
0
Version:
15.23.20053.211670
Total events
4 784
Read events
2 656
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
14
Text files
53
Unknown types
27

Dropped files

PID
Process
Filename
Type
2784OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVR6A7A.tmp.cvr
MD5:
SHA256:
2784OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\TFSM1H4Y\american express 03 30 2020 (2).pdf\:Zone.Identifier:$DATA
MD5:
SHA256:
3028AcroRd32.exeC:\Users\admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
MD5:
SHA256:
2784OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmpgc
MD5:F7717B6187C9F8255F9183D9E20D4AC0
SHA256:E1A96865DB36C24D6B7BB08E095503B94BFC1E3FA5D0D8AADE509AD189155D23
2784OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\outlook logging\firstrun.logtext
MD5:C9A70223123FB8E94A25C9A9BE8CDB12
SHA256:DFC22D414CCB3507CB9926204680EC749604149A52832744F704C53E470FFE14
2784OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\TFSM1H4Y\american express 03 30 2020 (2).pdfpdf
MD5:ADE8B2CC4616FF60BE3397BE6599BE60
SHA256:FAEFFB5AAFFD01CB0E9BF8CC35BFA1BD8A5855C92D349040701400C035894C1E
2784OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\TFSM1H4Y\american express 03 30 2020.pdfpdf
MD5:ADE8B2CC4616FF60BE3397BE6599BE60
SHA256:FAEFFB5AAFFD01CB0E9BF8CC35BFA1BD8A5855C92D349040701400C035894C1E
3028AcroRd32.exeC:\Users\admin\AppData\Local\Temp\acrord32_sbx\A9Rayk1j1_eaoo95_2c4.tmp
MD5:
SHA256:
3028AcroRd32.exeC:\Users\admin\AppData\Local\Temp\acrord32_sbx\A9R17941ep_eaoo94_2c4.tmp
MD5:
SHA256:
3028AcroRd32.exeC:\Users\admin\AppData\Local\Temp\acrord32_sbx\A9Rwfmozt_eaoo97_2c4.tmp
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
24
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2824
iexplore.exe
GET
301
52.219.84.99:80
http://measure.mo.s3-website.us-east-2.amazonaws.com/
US
shared
3912
AcroRd32.exe
GET
304
23.55.161.48:80
http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/280_15_23_20070.zip
US
whitelisted
3912
AcroRd32.exe
GET
304
23.55.161.48:80
http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/277_15_23_20070.zip
US
whitelisted
2784
OUTLOOK.EXE
GET
64.4.26.155:80
http://config.messenger.msn.com/config/msgrconfig.asmx?op=GetOlcConfig
US
whitelisted
3912
AcroRd32.exe
GET
304
23.55.161.48:80
http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/281_15_23_20070.zip
US
whitelisted
3912
AcroRd32.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAH9o%2BtuynXIiEOLckvPvJE%3D
US
der
471 b
whitelisted
3912
AcroRd32.exe
GET
304
23.55.161.48:80
http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/278_15_23_20070.zip
US
whitelisted
3912
AcroRd32.exe
GET
200
23.55.161.48:80
http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/message.zip
US
compressed
9.54 Kb
whitelisted
1412
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
2824
iexplore.exe
GET
200
2.20.189.244:80
http://ocsp.int-x3.letsencrypt.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBR%2B5mrncpqz%2FPiiIGRsFqEtYHEIXQQUqEpqYwR93brm0Tm3pkVl7%2FOo7KECEgOCX1LzHx96KpW4%2F0hrYcgGIA%3D%3D
unknown
der
527 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2784
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted
3912
AcroRd32.exe
23.210.248.251:443
armmf.adobe.com
Akamai International B.V.
NL
whitelisted
1412
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3912
AcroRd32.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2824
iexplore.exe
2.20.190.11:80
isrg.trustid.ocsp.identrust.com
Akamai International B.V.
whitelisted
2824
iexplore.exe
2.20.189.244:80
ocsp.int-x3.letsencrypt.org
Akamai International B.V.
whitelisted
23.210.248.251:443
armmf.adobe.com
Akamai International B.V.
NL
whitelisted
2824
iexplore.exe
109.228.48.181:443
divaapprenticeships.com
1&1 Internet SE
GB
unknown
2824
iexplore.exe
52.219.84.99:80
measure.mo.s3-website.us-east-2.amazonaws.com
Amazon.com, Inc.
US
shared
72.247.224.199:443
ardownload2.adobe.com
Akamai Technologies, Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted
measure.mo.s3-website.us-east-2.amazonaws.com
  • 52.219.84.99
shared
acroipm2.adobe.com
  • 23.55.161.48
  • 23.55.161.60
whitelisted
armmf.adobe.com
  • 23.210.248.251
whitelisted
divaapprenticeships.com
  • 109.228.48.181
unknown
ocsp.digicert.com
  • 93.184.220.29
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ardownload2.adobe.com
  • 72.247.224.199
whitelisted
isrg.trustid.ocsp.identrust.com
  • 2.20.190.11
  • 2.20.189.204
whitelisted

Threats

No threats detected
No debug info