analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Help with your upcoming event.msg

Full analysis: https://app.any.run/tasks/5937417c-e049-44fc-898e-3f90b696fa77
Verdict: Malicious activity
Analysis date: July 11, 2019, 19:57:54
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/vnd.ms-outlook
File info: CDFV2 Microsoft Outlook Message
MD5:

F91C55399346A05AAD33BF89A1722674

SHA1:

A58900C29BA1A335995B5F706A297BDBD5D925C0

SHA256:

CB3ACC854E1B15313E1DB8B55E931715BD235E4ED4D8257EEFB27CFF5B05BC01

SSDEEP:

768:ftj/1O7eCM0gXsKTsK3YaOIkNV3XNeTA9PsKTsKXKcLElrkt0RE70lqLTBMrH4Nk:fX7gaOPd7ScLEl9qjk

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Unusual execution from Microsoft Office

      • OUTLOOK.EXE (PID: 3116)
  • SUSPICIOUS

    • Starts Internet Explorer

      • OUTLOOK.EXE (PID: 3116)
    • Executed via COM

      • DllHost.exe (PID: 3648)
      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 1808)
      • DllHost.exe (PID: 2160)
    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 3116)
    • Reads Internet Cache Settings

      • OUTLOOK.EXE (PID: 3116)
  • INFO

    • Reads Microsoft Office registry keys

      • OUTLOOK.EXE (PID: 3116)
    • Creates files in the user directory

      • iexplore.exe (PID: 4060)
      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 1808)
      • iexplore.exe (PID: 3428)
      • iexplore.exe (PID: 2364)
      • iexplore.exe (PID: 2304)
    • Changes internet zones settings

      • iexplore.exe (PID: 2304)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 4060)
      • iexplore.exe (PID: 3428)
      • iexplore.exe (PID: 2364)
    • Dropped object may contain Bitcoin addresses

      • iexplore.exe (PID: 4060)
      • iexplore.exe (PID: 3428)
      • iexplore.exe (PID: 2364)
    • Reads internet explorer settings

      • iexplore.exe (PID: 4060)
      • iexplore.exe (PID: 3428)
      • iexplore.exe (PID: 2364)
    • Application launched itself

      • iexplore.exe (PID: 2304)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2304)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2304)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msg | Outlook Message (58.9)
.oft | Outlook Form Template (34.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
43
Monitored processes
8
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start outlook.exe PhotoViewer.dll no specs iexplore.exe iexplore.exe flashutil32_26_0_0_131_activex.exe no specs iexplore.exe iexplore.exe PhotoViewer.dll no specs

Process information

PID
CMD
Path
Indicators
Parent process
3116"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\admin\AppData\Local\Temp\Help with your upcoming event.msg"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
14.0.6025.1000
3648C:\Windows\system32\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}C:\Windows\system32\DllHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2304"C:\Program Files\Internet Explorer\iexplore.exe" https://manager.bidr.co/?utm_source=Mandrill_108a&utm_medium=Email&utm_campaign=FB_CreateEvent&utm_source=ses_blast_click&utm_medium=email&utm_campaign=help_with_your_upcoming_eventC:\Program Files\Internet Explorer\iexplore.exe
OUTLOOK.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
4060"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2304 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
1808C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe® Flash® Player Installer/Uninstaller 26.0 r0
Exit code:
0
Version:
26,0,0,131
3428"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2304 CREDAT:6404C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2364"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2304 CREDAT:6408C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2160C:\Windows\system32\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}C:\Windows\system32\DllHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
COM Surrogate
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
2 608
Read events
2 033
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
19
Text files
155
Unknown types
32

Dropped files

PID
Process
Filename
Type
3116OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVRDA87.tmp.cvr
MD5:
SHA256:
3116OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\PKEH1XBN\NewBidrEvents.jpg
MD5:
SHA256:
3116OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\PKEH1XBN\NewBidrEvents (2).jpg\:Zone.Identifier:$DATA
MD5:
SHA256:
2304iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\favicon[1].ico
MD5:
SHA256:
2304iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
4060iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab7158.tmp
MD5:
SHA256:
4060iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar7159.tmp
MD5:
SHA256:
4060iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab7198.tmp
MD5:
SHA256:
4060iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar7199.tmp
MD5:
SHA256:
4060iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab7275.tmp
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
86
DNS requests
31
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2364
iexplore.exe
GET
301
3.84.138.147:80
http://www.bidr.co/?&utm_source=ses_blast_click&utm_medium=email&utm_campaign=help_with_your_upcoming_event
US
suspicious
3428
iexplore.exe
GET
200
34.233.227.170:80
http://bidr.co/admin/mybidr/update_styles.css
US
text
1.32 Kb
suspicious
2304
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
4060
iexplore.exe
GET
200
2.16.186.72:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
unknown
compressed
56.3 Kb
whitelisted
2364
iexplore.exe
GET
200
205.185.216.42:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/47BEABC922EAE80E78783462A79F45C254FDE68B.crt
US
der
969 b
whitelisted
4060
iexplore.exe
GET
200
13.224.197.19:80
http://x.ss2.us/x.cer
US
der
1.27 Kb
whitelisted
2304
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3116
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted
4060
iexplore.exe
2.16.186.72:80
www.download.windowsupdate.com
Akamai International B.V.
whitelisted
4060
iexplore.exe
13.224.197.19:80
x.ss2.us
US
unknown
2304
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
4060
iexplore.exe
13.224.196.85:443
manager.bidr.co
US
malicious
4060
iexplore.exe
104.16.123.175:443
unpkg.com
Cloudflare Inc
US
shared
4060
iexplore.exe
52.216.139.29:443
s3.amazonaws.com
Amazon.com, Inc.
US
unknown
4060
iexplore.exe
172.217.16.163:443
fonts.gstatic.com
Google Inc.
US
whitelisted
4060
iexplore.exe
172.217.16.170:443
maps.googleapis.com
Google Inc.
US
whitelisted
4060
iexplore.exe
13.224.196.21:443
assets.bidr.co
US
suspicious

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted
dns.msftncsi.com
  • 131.107.255.255
shared
manager.bidr.co
  • 13.224.196.85
  • 13.224.196.66
  • 13.224.196.16
  • 13.224.196.115
malicious
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
x.ss2.us
  • 13.224.197.19
  • 13.224.197.157
  • 13.224.197.208
  • 13.224.197.167
whitelisted
www.download.windowsupdate.com
  • 2.16.186.72
  • 2.16.186.66
  • 2.16.186.81
  • 2.16.186.97
  • 2.16.186.56
  • 2.16.186.105
  • 205.185.216.42
  • 205.185.216.10
whitelisted
s3.amazonaws.com
  • 52.216.139.29
shared
maps.googleapis.com
  • 172.217.16.202
  • 172.217.18.106
  • 172.217.23.170
  • 172.217.21.202
  • 216.58.205.234
  • 172.217.22.10
  • 172.217.18.10
  • 172.217.18.170
  • 172.217.23.138
  • 216.58.206.10
  • 172.217.16.170
  • 216.58.208.42
  • 172.217.16.138
  • 172.217.22.42
  • 172.217.22.74
whitelisted
unpkg.com
  • 104.16.123.175
  • 104.16.126.175
  • 104.16.122.175
  • 104.16.125.175
  • 104.16.124.175
whitelisted
js.stripe.com
  • 151.101.0.176
  • 151.101.64.176
  • 151.101.128.176
  • 151.101.192.176
shared

Threats

No threats detected
No debug info