analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

FWD Thyssenkrupp-materials Payment_Remit (826 AM 11 Aug 2022) - 45908.msg

Full analysis: https://app.any.run/tasks/db15c5af-e267-4795-a380-cb4a7672e601
Verdict: Malicious activity
Analysis date: August 12, 2022, 18:26:01
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/vnd.ms-outlook
File info: CDFV2 Microsoft Outlook Message
MD5:

03D414736A98060C8D0694B261707930

SHA1:

05049871F3E91A7E05647D37F49EA9EB98C5FB82

SHA256:

CF3F148C58085971E74FB9C5D064C96B4D9515667087F6A7CD5967ACA36A70BE

SSDEEP:

3072:R/8yjq8qrPq8D+97jOvzGlPL2eQ3jqsLci:R5q8q7q8wabwYz

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops executable file immediately after starts

      • chrome.exe (PID: 304)
      • chrome.exe (PID: 3700)
      • chrome.exe (PID: 2880)
  • SUSPICIOUS

    • Modifies files in Chrome extension folder

      • chrome.exe (PID: 304)
    • Executable content was dropped or overwritten

      • chrome.exe (PID: 304)
      • chrome.exe (PID: 3700)
      • chrome.exe (PID: 2880)
    • Drops a file with a compile date too recent

      • chrome.exe (PID: 304)
      • chrome.exe (PID: 3700)
      • chrome.exe (PID: 2880)
  • INFO

    • Checks supported languages

      • control.exe (PID: 560)
      • OUTLOOK.EXE (PID: 300)
      • chrome.exe (PID: 304)
      • chrome.exe (PID: 3164)
      • chrome.exe (PID: 3700)
      • chrome.exe (PID: 2444)
      • chrome.exe (PID: 3416)
      • chrome.exe (PID: 1636)
      • chrome.exe (PID: 3492)
      • chrome.exe (PID: 972)
      • chrome.exe (PID: 2024)
      • chrome.exe (PID: 2496)
      • chrome.exe (PID: 2476)
      • chrome.exe (PID: 332)
      • chrome.exe (PID: 2280)
      • chrome.exe (PID: 1440)
      • chrome.exe (PID: 3788)
      • chrome.exe (PID: 3528)
      • chrome.exe (PID: 1292)
      • chrome.exe (PID: 1592)
      • chrome.exe (PID: 2304)
      • chrome.exe (PID: 3648)
      • chrome.exe (PID: 3852)
      • chrome.exe (PID: 3420)
      • chrome.exe (PID: 3144)
      • chrome.exe (PID: 3716)
      • chrome.exe (PID: 1588)
      • chrome.exe (PID: 1084)
      • chrome.exe (PID: 2280)
      • chrome.exe (PID: 3376)
      • chrome.exe (PID: 408)
      • chrome.exe (PID: 3652)
      • chrome.exe (PID: 2448)
      • chrome.exe (PID: 3184)
      • chrome.exe (PID: 3216)
      • chrome.exe (PID: 2880)
      • chrome.exe (PID: 2184)
      • chrome.exe (PID: 3260)
      • chrome.exe (PID: 2068)
      • chrome.exe (PID: 2260)
      • chrome.exe (PID: 1544)
      • chrome.exe (PID: 1028)
      • chrome.exe (PID: 856)
      • chrome.exe (PID: 2164)
      • chrome.exe (PID: 3800)
      • chrome.exe (PID: 2432)
      • chrome.exe (PID: 2028)
      • chrome.exe (PID: 3220)
      • chrome.exe (PID: 464)
    • Reads the computer name

      • OUTLOOK.EXE (PID: 300)
      • control.exe (PID: 560)
      • chrome.exe (PID: 304)
      • chrome.exe (PID: 3700)
      • chrome.exe (PID: 3492)
      • chrome.exe (PID: 332)
      • chrome.exe (PID: 2476)
      • chrome.exe (PID: 2496)
      • chrome.exe (PID: 3852)
      • chrome.exe (PID: 2304)
      • chrome.exe (PID: 1592)
      • chrome.exe (PID: 408)
      • chrome.exe (PID: 3716)
      • chrome.exe (PID: 2184)
      • chrome.exe (PID: 2260)
    • Reads internet explorer settings

      • OUTLOOK.EXE (PID: 300)
    • Reads Microsoft Outlook installation path

      • OUTLOOK.EXE (PID: 300)
    • Manual execution by user

      • control.exe (PID: 560)
    • Searches for installed software

      • OUTLOOK.EXE (PID: 300)
    • Reads settings of System Certificates

      • chrome.exe (PID: 3700)
      • chrome.exe (PID: 304)
    • Application launched itself

      • chrome.exe (PID: 304)
      • chrome.exe (PID: 2304)
      • chrome.exe (PID: 1592)
    • Reads Microsoft Office registry keys

      • OUTLOOK.EXE (PID: 300)
    • Reads the date of Windows installation

      • chrome.exe (PID: 408)
    • Checks Windows Trust Settings

      • chrome.exe (PID: 304)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msg | Outlook Message (58.9)
.oft | Outlook Form Template (34.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
90
Monitored processes
49
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start outlook.exe control.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
300"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\admin\AppData\Local\Temp\FWD Thyssenkrupp-materials Payment_Remit (826 AM 11 Aug 2022) - 45908.msg"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
14.0.6025.1000
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\microsoft office\office14\outlook.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
560"C:\Windows\system32\control.exe" /name Microsoft.DefaultProgramsC:\Windows\system32\control.exeExplorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Control Panel
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
304"C:\Program Files\Google\Chrome\Application\chrome.exe" --single-argument https://eur06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurepubads.g.doubleclick.net%2Fpcs%2Fview%3Fadurl%3Dhttps%253a%252f%252fqf0ej2.codesandbox.io%3Fdg%3DY2hyaXN0aW5lLnphaGFyYUB0aHlzc2Vua3J1cHAtbWF0ZXJpYWxzLmNvbQ%3D%3D&data=05%7C01%7Cchristine.zahara%40thyssenkrupp-materials.com%7C76f56b4914dd4faa2f6708da7bbe9310%7C7370fc8f4ead4668a3a4ffb467f9374a%7C0%7C0%7C637958356475547799%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=N0kQ5Y4zJjO9MbWE33Ca3w1UuBTpi6zdh%2FbXziaSb1M%3D&reserved=0C:\Program Files\Google\Chrome\Application\chrome.exe
OUTLOOK.EXE
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
86.0.4240.198
3164"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=86.0.4240.198 --initial-client-data=0xc8,0xcc,0xd0,0x9c,0xd4,0x5dd8d988,0x5dd8d998,0x5dd8d9a4C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
86.0.4240.198
3492"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1028,16770244024439564237,9692596036464310552,131072 --enable-features=PasswordImport --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1048 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
3700"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1028,16770244024439564237,9692596036464310552,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1432 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
86.0.4240.198
3416"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1028,16770244024439564237,9692596036464310552,131072 --enable-features=PasswordImport --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1916 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
2444"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1028,16770244024439564237,9692596036464310552,131072 --enable-features=PasswordImport --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1924 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
1636"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1028,16770244024439564237,9692596036464310552,131072 --enable-features=PasswordImport --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2288 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
332"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1028,16770244024439564237,9692596036464310552,131072 --enable-features=PasswordImport --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2700 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
86.0.4240.198
Total events
23 378
Read events
22 582
Write events
0
Delete events
0

Modification events

No data
Executable files
5
Suspicious files
171
Text files
194
Unknown types
10

Dropped files

PID
Process
Filename
Type
300OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVR4251.tmp.cvr
MD5:
SHA256:
300OUTLOOK.EXEC:\Users\admin\Documents\Outlook Files\Outlook Data File - NoMail.pst
MD5:
SHA256:
304chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-62F69B68-130.pma
MD5:
SHA256:
300OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmpgc
MD5:6E4E5FBE47EF649A369CD476C4E7D9A8
SHA256:BC233FDEF1C110AF39623DEC53C6CE8FAA1398B4FF86E1FF22D083815906EAD7
300OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\outlook logging\firstrun.logtext
MD5:BE722751E84161DC85B307D9718E8A35
SHA256:B560387B96D0F72EF1F12BB8B1C12F38D52D24D33673FBF00342129CE9A15BB6
300OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9AF3F8F.datimage
MD5:E3ABFD43253E17A6BE62231B67BDE15D
SHA256:A0AD2D7F86638E3D9A38FD04C34A79CEA14023CAF14DBB8C74EC790B1967F434
300OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\{62176AD2-854F-4CF3-A88E-C22D03A05521}\{1C306CB1-771E-4B4B-A902-86E897877F5B}.pngimage
MD5:4C61C12EDBC453D7AE184976E95258E1
SHA256:296526F9A716C1AA91BA5D6F69F0EB92FDF79C2CB2CFCF0CEB22B7CCBC27035F
304chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Last Versiontext
MD5:00046F773EFDD3C8F8F6D0F87A2B93DC
SHA256:593EDE11D17AF7F016828068BCA2E93CF240417563FB06DC8A579110AEF81731
300OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_AvailabilityOptions_2_8CF77EC47AA9394698D69ADB2CD63265.datxml
MD5:EEAA832C12F20DE6AAAA9C7B77626E72
SHA256:C4C9A90F2C961D9EE79CF08FBEE647ED7DE0202288E876C7BAAD00F4CA29CA16
304chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old~RF12e68f.TMPtext
MD5:936EB7280DA791E6DD28EF3A9B46D39C
SHA256:CBAF2AFD831B32F6D1C12337EE5D2F090D6AE1F4DCB40B08BEF49BF52AD9721F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
37
TCP/UDP connections
48
DNS requests
25
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3700
chrome.exe
GET
204
142.250.186.131:80
http://www.gstatic.com/generate_204
US
whitelisted
892
svchost.exe
HEAD
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acym664js5xux6kw2viy4atw4uda_2022.8.8.1144/ggkkehgbnfjpeggfpleeakpidbkibbmn_2022.8.8.1144_all_olesxce7qq7cy7sctjkoeb4tce.crx3
US
whitelisted
300
OUTLOOK.EXE
GET
64.4.26.155:80
http://config.messenger.msn.com/config/msgrconfig.asmx?op=GetOlcConfig
US
whitelisted
892
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvZjE0QUFYTUR2NXNIakJsbE5jbXNrUkdfQQ/4.10.2391.0_oimompecagnajdejgnnjijobebaeigek.crx
US
binary
440 Kb
whitelisted
892
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acym664js5xux6kw2viy4atw4uda_2022.8.8.1144/ggkkehgbnfjpeggfpleeakpidbkibbmn_2022.8.8.1144_all_olesxce7qq7cy7sctjkoeb4tce.crx3
US
binary
5.63 Kb
whitelisted
892
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acym664js5xux6kw2viy4atw4uda_2022.8.8.1144/ggkkehgbnfjpeggfpleeakpidbkibbmn_2022.8.8.1144_all_olesxce7qq7cy7sctjkoeb4tce.crx3
US
binary
3.01 Kb
whitelisted
892
svchost.exe
HEAD
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvZjE0QUFYTUR2NXNIakJsbE5jbXNrUkdfQQ/4.10.2391.0_oimompecagnajdejgnnjijobebaeigek.crx
US
binary
3.01 Kb
whitelisted
892
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvZjE0QUFYTUR2NXNIakJsbE5jbXNrUkdfQQ/4.10.2391.0_oimompecagnajdejgnnjijobebaeigek.crx
US
pgc
1.41 Mb
whitelisted
892
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvZjE0QUFYTUR2NXNIakJsbE5jbXNrUkdfQQ/4.10.2391.0_oimompecagnajdejgnnjijobebaeigek.crx
US
binary
43.4 Kb
whitelisted
892
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvZjE0QUFYTUR2NXNIakJsbE5jbXNrUkdfQQ/4.10.2391.0_oimompecagnajdejgnnjijobebaeigek.crx
US
binary
5.63 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3700
chrome.exe
142.250.186.142:443
clients2.google.com
Google Inc.
US
whitelisted
3700
chrome.exe
142.250.184.195:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
3700
chrome.exe
142.250.185.98:443
securepubads.g.doubleclick.net
Google Inc.
US
shared
3700
chrome.exe
104.18.43.17:443
qf0ej2.codesandbox.io
Cloudflare Inc
US
shared
3700
chrome.exe
172.64.144.239:443
qf0ej2.codesandbox.io
US
suspicious
3700
chrome.exe
172.217.18.13:443
accounts.google.com
Google Inc.
US
whitelisted
3700
chrome.exe
104.47.22.156:443
eur06.safelinks.protection.outlook.com
Microsoft Corporation
US
unknown
3700
chrome.exe
142.250.184.193:443
clients2.googleusercontent.com
Google Inc.
US
whitelisted
3700
chrome.exe
172.64.156.26:443
static.cloudflareinsights.com
US
unknown
3700
chrome.exe
89.44.9.185:443
mso.trimarkusa.us
RO
unknown

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted
eur06.safelinks.protection.outlook.com
  • 104.47.22.156
  • 104.47.18.156
whitelisted
clientservices.googleapis.com
  • 142.250.184.195
whitelisted
clients2.google.com
  • 142.250.186.142
whitelisted
accounts.google.com
  • 172.217.18.13
shared
clients2.googleusercontent.com
  • 142.250.184.193
whitelisted
securepubads.g.doubleclick.net
  • 142.250.185.98
whitelisted
qf0ej2.codesandbox.io
  • 172.64.144.239
  • 104.18.43.17
suspicious
codesandbox.io
  • 104.18.43.17
  • 172.64.144.239
whitelisted
static.cloudflareinsights.com
  • 172.64.156.26
  • 104.18.47.230
whitelisted

Threats

No threats detected
No debug info