analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

message (5).eml

Full analysis: https://app.any.run/tasks/bff9fed9-0534-4b32-80ac-1dd9ab2b034e
Verdict: Malicious activity
Analysis date: October 04, 2022, 22:10:19
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: message/rfc822
File info: RFC 822 mail, ASCII text, with CRLF line terminators
MD5:

503FB70AC62B50B6137DC957B180F864

SHA1:

C27A5A4EED4790CADFD828626F0838CD1709BFCB

SHA256:

D9FE748E836BF2C6E744769E100F76E4E66FEA315F6346C2010F29F08C316F34

SSDEEP:

384:HksvdKZC7aN+Gi9fKSQHGtPXsPc/0DaUuhSloNcwhuvcWUN4uR0gehjz+z27VF:EJI7aN3i9SSQHqfwiaoNcL0rNa7cwr

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads the computer name

      • OUTLOOK.EXE (PID: 328)
    • Checks supported languages

      • OUTLOOK.EXE (PID: 328)
    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 3556)
    • Starts Internet Explorer

      • OUTLOOK.EXE (PID: 328)
    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 328)
    • Searches for installed software

      • OUTLOOK.EXE (PID: 328)
  • INFO

    • Checks supported languages

      • iexplore.exe (PID: 3556)
      • iexplore.exe (PID: 660)
    • Reads the computer name

      • iexplore.exe (PID: 660)
      • iexplore.exe (PID: 3556)
    • Application launched itself

      • iexplore.exe (PID: 660)
    • Changes internet zones settings

      • iexplore.exe (PID: 660)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 3556)
      • iexplore.exe (PID: 660)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3556)
      • iexplore.exe (PID: 660)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3556)
    • Creates files in the user directory

      • iexplore.exe (PID: 3556)
    • Reads Microsoft Office registry keys

      • OUTLOOK.EXE (PID: 328)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.eml | E-Mail message (Var. 5) (100)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start outlook.exe iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
328"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE" /eml "C:\Users\admin\AppData\Local\Temp\message (5).eml"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
14.0.6025.1000
660"C:\Program Files\Internet Explorer\iexplore.exe" https://bonfire-ee84195c3ac3.intercom-attachments-7.com/i/o/591701851/94ea2d89a5d438879b273d87/dsw1.htmC:\Program Files\Internet Explorer\iexplore.exe
OUTLOOK.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
3556"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:660 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Total events
15 084
Read events
14 371
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
15
Text files
28
Unknown types
62

Dropped files

PID
Process
Filename
Type
328OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVRDDE9.tmp.cvr
MD5:
SHA256:
328OUTLOOK.EXEC:\Users\admin\Documents\Outlook Files\Outlook Data File - NoMail.pst
MD5:
SHA256:
328OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmpgc
MD5:5900A34FF17BF28880E14B5C4F121690
SHA256:C6C7F6CE46193D9282719FBECF8194BAE4197FAF385B17436C0E3465DB2E1E59
3556iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:13E6823C27D8BF935598D8812516BB79
SHA256:79E0F28423FDAB2DA41A4975FE4D343D5F474CC19DEF3A9CC6DF0C5BC58CF532
660iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442binary
MD5:CF90ADE9F52D17EC61442D965BC723E7
SHA256:BF416F0F9296A2E078F0E7869EB26AD9180A70546E9D8D121E187B8B141AA6AF
328OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\outlook logging\firstrun.logtext
MD5:8BBC77E6BE12EEA38CAEEEA7780D1F72
SHA256:16E78E56DFBD31AFEE5DCE16735B54615FC5D7C411260E6696CE222CB3A316F5
660iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442der
MD5:B8BDA0B382A7D056A4241B388338B778
SHA256:7BAA967F6686CCE471826B20FFA5CB7FEB4BF3C5C0BF43F51F08E84EB5850DD2
3556iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6A2279C2CA42EBEE26F14589F0736E50der
MD5:F1443597FCFF43E98CF17EB8F9B1093A
SHA256:B822350AA6B79E19042217701C714CFC02B80E404C85B158724C516849BD7137
3556iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6A2279C2CA42EBEE26F14589F0736E50binary
MD5:07BBBB5B703DEFC36FC34F09CD63EBFE
SHA256:2DDC19E44A2755A72C5DC878E1A8BFDD965EBA59DDE19A99E1E268B2DC2007D2
328OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_WorkHours_1_77F5FF9B31F37746A6DD9483C18CB2D6.datxml
MD5:807EF0FC900FEB3DA82927990083D6E7
SHA256:4411E7DC978011222764943081500FFF0E43CBF7CCD44264BD1AB6306CA68913
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
15
TCP/UDP connections
48
DNS requests
25
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
328
OUTLOOK.EXE
GET
64.4.26.155:80
http://config.messenger.msn.com/config/msgrconfig.asmx?op=GetOlcConfig
US
whitelisted
3556
iexplore.exe
GET
200
8.238.191.126:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?65420842d452265b
US
compressed
4.70 Kb
whitelisted
3556
iexplore.exe
GET
200
13.225.84.145:80
http://ocsp.rootg2.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBSIfaREXmfqfJR3TkMYnD7O5MhzEgQUnF8A36oB1zArOIiiuG1KnPIRkYMCEwZ%2FlEoqJ83z%2BsKuKwH5CO65xMY%3D
US
der
1.51 Kb
whitelisted
3556
iexplore.exe
GET
200
108.156.13.49:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwZ%2FlFeFh%2Bisd96yUzJbvJmLVg0%3D
US
der
1.39 Kb
shared
660
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2BnRyLFPYjID1ie%2Bx%2BdSjo%3D
US
der
1.47 Kb
whitelisted
3556
iexplore.exe
GET
200
13.225.84.53:80
http://s.ss2.us/r.crl
US
der
434 b
whitelisted
3556
iexplore.exe
GET
200
142.250.184.131:80
http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQDcThR%2BKEYP2BK026EbsM6F
US
der
472 b
whitelisted
3556
iexplore.exe
GET
200
142.250.184.131:80
http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEEc4up%2BNtymgEltg731LHBw%3D
US
der
471 b
whitelisted
3556
iexplore.exe
GET
200
142.250.184.131:80
http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEGOlwNI5ZtyUEgHpNAgRyd0%3D
US
der
471 b
whitelisted
3556
iexplore.exe
GET
200
13.225.84.68:80
http://o.ss2.us//MEowSDBGMEQwQjAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCCQCnDkpMNIK3fw%3D%3D
US
der
1.70 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
328
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
3556
iexplore.exe
8.238.191.126:80
ctldl.windowsupdate.com
LEVEL3
US
suspicious
660
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
EDGECAST
GB
whitelisted
3556
iexplore.exe
13.225.84.42:80
o.ss2.us
AMAZON-02
US
unknown
3556
iexplore.exe
13.224.189.21:443
bonfire-ee84195c3ac3.intercom-attachments-7.com
AMAZON-02
US
suspicious
660
iexplore.exe
204.79.197.200:443
www.bing.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
3556
iexplore.exe
13.225.84.145:80
ocsp.rootg2.amazontrust.com
AMAZON-02
US
whitelisted
3556
iexplore.exe
18.66.112.49:443
static.intercomassets.com
AMAZON-02
US
unknown
3556
iexplore.exe
13.225.84.53:80
s.ss2.us
AMAZON-02
US
unknown
3556
iexplore.exe
54.84.194.187:443
downloads.intercomcdn.com
AMAZON-AES
US
unknown

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted
bonfire-ee84195c3ac3.intercom-attachments-7.com
  • 13.224.189.21
  • 13.224.189.46
  • 13.224.189.96
  • 13.224.189.25
suspicious
ctldl.windowsupdate.com
  • 8.238.191.126
  • 8.248.141.254
  • 8.253.95.121
  • 8.238.190.126
  • 8.241.11.126
whitelisted
o.ss2.us
  • 13.225.84.42
  • 13.225.84.68
  • 13.225.84.97
  • 13.225.84.66
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
s.ss2.us
  • 13.225.84.53
  • 13.225.84.50
  • 13.225.84.92
  • 13.225.84.172
whitelisted
ocsp.rootg2.amazontrust.com
  • 13.225.84.145
  • 13.225.84.49
  • 13.225.84.175
  • 13.225.84.13
whitelisted
ocsp.rootca1.amazontrust.com
  • 108.156.13.49
  • 108.156.13.75
  • 108.156.13.103
  • 108.156.13.217
shared

Threats

No threats detected
No debug info