analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Ƥaߌmၔnt Rၔtⴗrnၔd PAccounting Wires09 July 2019-Wires.pdf.msg

Full analysis: https://app.any.run/tasks/78759abd-649c-433c-badf-15220cee26d8
Verdict: Malicious activity
Analysis date: July 11, 2019, 19:18:04
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/vnd.ms-outlook
File info: CDFV2 Microsoft Outlook Message
MD5:

304AD41D465750C840C11616DE72B223

SHA1:

C6D541FC50D6387B1D771E4308CAFD1BE1F35340

SHA256:

DF2085986A4BA38630E40CB2A97058426E9E9FABAA3EC58AE502EAC9606A2D1C

SSDEEP:

1536:lU5i7ZKvr3UewQanh+7V/aVVLqqEfFgmRtMz:l6i7ECnCkWfFg

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Unusual execution from Microsoft Office

      • OUTLOOK.EXE (PID: 2888)
  • SUSPICIOUS

    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 2888)
      • vlc.exe (PID: 3484)
    • Reads Internet Cache Settings

      • OUTLOOK.EXE (PID: 2888)
    • Starts Internet Explorer

      • OUTLOOK.EXE (PID: 2888)
  • INFO

    • Reads Microsoft Office registry keys

      • OUTLOOK.EXE (PID: 2888)
    • Application launched itself

      • iexplore.exe (PID: 2280)
      • iexplore.exe (PID: 3636)
      • iexplore.exe (PID: 1600)
    • Creates files in the user directory

      • iexplore.exe (PID: 3076)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3076)
      • iexplore.exe (PID: 3816)
      • iexplore.exe (PID: 2416)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3076)
      • iexplore.exe (PID: 3816)
      • iexplore.exe (PID: 2416)
    • Changes internet zones settings

      • iexplore.exe (PID: 2280)
      • iexplore.exe (PID: 3636)
      • iexplore.exe (PID: 1600)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msg | Outlook Message (58.9)
.oft | Outlook Form Template (34.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
43
Monitored processes
8
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start outlook.exe iexplore.exe iexplore.exe vlc.exe iexplore.exe iexplore.exe iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
2888"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\admin\AppData\Local\Temp\Ƥaߌmၔnt Rၔtⴗrnၔd PAccounting Wires09 July 2019-Wires.pdf.msg"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
14.0.6025.1000
2280"C:\Program Files\Internet Explorer\iexplore.exe" https://heretheybecome.com/[email protected]C:\Program Files\Internet Explorer\iexplore.exe
OUTLOOK.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3076"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2280 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3484"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\2VBLNBNA\VoiceMessage.wav"C:\Program Files\VideoLAN\VLC\vlc.exe
OUTLOOK.EXE
User:
admin
Company:
VideoLAN
Integrity Level:
MEDIUM
Description:
VLC media player
Version:
2.2.6
3636"C:\Program Files\Internet Explorer\iexplore.exe" https://heretheybecome.com/[email protected]C:\Program Files\Internet Explorer\iexplore.exe
OUTLOOK.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3816"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3636 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
1600"C:\Program Files\Internet Explorer\iexplore.exe" https://heretheybecome.com/[email protected]C:\Program Files\Internet Explorer\iexplore.exe
OUTLOOK.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2416"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1600 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Total events
2 999
Read events
2 449
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
7
Text files
69
Unknown types
5

Dropped files

PID
Process
Filename
Type
2888OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVR367B.tmp.cvr
MD5:
SHA256:
2280iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\favicon[1].ico
MD5:
SHA256:
2888OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmpgc
MD5:C323DC5820527CC1C851686185A0D607
SHA256:ED5B743E3DAE7FFC7582E047B40E74C43FF3CB49086B72515A086C982A4EB390
2280iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2888OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C0836819.datimage
MD5:FEC475840A885BAFBD1AA40DD8C3A252
SHA256:91ABF269E335527D426EEABB67B91E57B32F1E83D1EBE118A3AC9C367F78C51E
3076iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.datdat
MD5:3D9FF32C795C44E814B85EDD2D91C6F8
SHA256:1B9FA194B5C1F698E1BCABCCC4A0C638465C4B916AF661FAD59F3A254C929DB7
2888OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_Calendar_2_4B606382DF75484B96E841C1B87C1E2A.datxml
MD5:B21ED3BD946332FF6EBC41A87776C6BB
SHA256:B1AAC4E817CD10670B785EF8E5523C4A883F44138E50486987DC73054A46F6F4
2888OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_ConversationPrefs_2_061954F7C090164DAFBA5BF421666C2D.datxml
MD5:57F30B1BCA811C2FCB81F4C13F6A927B
SHA256:612BAD93621991CB09C347FF01EC600B46617247D5C041311FF459E247D8C2D3
2888OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_WorkHours_1_C270C7D2E1586846A9186813EE9CF566.datxml
MD5:807EF0FC900FEB3DA82927990083D6E7
SHA256:4411E7DC978011222764943081500FFF0E43CBF7CCD44264BD1AB6306CA68913
2888OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_TCPrefs_2_88156CF5AE753D429F8832D21A010113.datxml
MD5:F194B1FA12F9B6F46A47391FAE8BEEC2
SHA256:FCD8D7E030BE6EA7588E5C6CB568E3F1BDFC263942074B693942A27DF9521A74
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
17
DNS requests
6
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2888
OUTLOOK.EXE
GET
64.4.26.155:80
http://config.messenger.msn.com/config/msgrconfig.asmx?op=GetOlcConfig
US
whitelisted
2280
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
3636
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
1600
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2280
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3076
iexplore.exe
216.87.170.39:443
heretheybecome.com
Affinity Internet, Inc
US
unknown
216.87.170.39:443
heretheybecome.com
Affinity Internet, Inc
US
unknown
3816
iexplore.exe
216.87.170.39:443
heretheybecome.com
Affinity Internet, Inc
US
unknown
3636
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2888
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted
1600
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2416
iexplore.exe
216.87.170.39:443
heretheybecome.com
Affinity Internet, Inc
US
unknown

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted
heretheybecome.com
  • 216.87.170.39
unknown
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted

Threats

No threats detected
Process
Message
vlc.exe
core libvlc: one instance mode ENABLED
vlc.exe
core libvlc: Running vlc with the default interface. Use 'cvlc' to use vlc without interface.
vlc.exe
core stream error: cannot pre fill buffer
vlc.exe
core stream error: cannot pre fill buffer
vlc.exe
core stream error: cannot pre fill buffer
vlc.exe
core stream error: cannot pre fill buffer
vlc.exe
core stream error: cannot pre fill buffer
vlc.exe
core stream error: cannot pre fill buffer