analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

FW 4539799P - Bright Home Products Inc .msg

Full analysis: https://app.any.run/tasks/12c083e0-e5f0-4211-b89a-a7d3a671505b
Verdict: Malicious activity
Analysis date: August 13, 2019, 18:57:40
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/vnd.ms-outlook
File info: CDFV2 Microsoft Outlook Message
MD5:

DBECBF359DAA171765ACE72838593665

SHA1:

53DDFB4A42AAFE87AD3A90F5651E00B12FF5109E

SHA256:

E1BB8613E82D12E6EE1F5197DFB03632BE2604BDDC34D097CD961C59455CE634

SSDEEP:

3072:FlyohhTpM7/pM75/B9j5pM7NUL27L2iKB3DKBwuc9Ein4qVNJKvYs47b3yqqPRv2:DcYE6Pb3ZqPNE

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Unusual execution from Microsoft Office

      • OUTLOOK.EXE (PID: 1404)
  • SUSPICIOUS

    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 1404)
    • Starts Internet Explorer

      • OUTLOOK.EXE (PID: 1404)
    • Modifies files in Chrome extension folder

      • chrome.exe (PID: 2596)
    • Reads Internet Cache Settings

      • OUTLOOK.EXE (PID: 1404)
  • INFO

    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3580)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3580)
    • Changes internet zones settings

      • iexplore.exe (PID: 1484)
    • Manual execution by user

      • chrome.exe (PID: 2596)
    • Reads Microsoft Office registry keys

      • OUTLOOK.EXE (PID: 1404)
    • Application launched itself

      • chrome.exe (PID: 2596)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msg | Outlook Message (58.9)
.oft | Outlook Form Template (34.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
69
Monitored processes
32
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start outlook.exe iexplore.exe iexplore.exe chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1404"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\admin\AppData\Local\Temp\FW 4539799P - Bright Home Products Inc .msg"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
14.0.6025.1000
1484"C:\Program Files\Internet Explorer\iexplore.exe" https://nam05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fu6091044.ct.sendgrid.net%2Fwf%2Fclick%3Fupn%3DAGtKAoRoTEaZXZ0WW2qjlEPrTYvtf9VNpA0skwFTYkItAYkznbVyNgXghnV6RTo7g7xAAGI68GnuB6hzfmgbnQ-3D-3D_P-2FJ7xsVHH-2FqU6SiJFx1gFmff1IZwJh2NTGFjZwAVuFtYRG03MiGySBst91jlCRqsuJLtNrBDMb9pitEuiyp28Wg-2BfXHodYjgh347L6UcROZ0lr-2BrwkrcJVPSrgf4MMaHhrANlzW14kjYmPoJcB-2BFveTGNhIqig2Gyy79gOr30nCR-2Bhh0Q1nN9TfMvPzQ-2FGKNasUv1t3KnOQDkcx-2BgEs0w7iT-2FlkN-2Bw-2Fq5tm5fy58Bf5QAV4kG3Ut3Pp9yWFPQSv5jISSWGv7cSPhcZFWXwzgQmKqsLBBEWDVaAhjTgpWoNe1EW2QMi6F0icMnIkPbAdTR-2Bw7pfynR-2FL9A4O-2BKhx6cja9xktgU7C39TcSsiqbxf8FUlOI0vl6pM6ZAGdZGBxnezv0ylF6O5k5o8Uxr5edxp8VrZVFLXlRebOIF85tRk3FzHBz9XpwysMJWjWtoQIaeLDvlA1E3eTvVyvSd03O2NRmGgb6hsCgltb9Ap8-2FIfZkeydFtCo-2Fe9B8O4a5-2FPil2HBYVl7tlvCZx8H18yjpx-2FCBsZZA6c59yaCiGAXpxIK-2FiPfJphOsMWT2u7hkQeM1&data=02%7C01%7Cclhamon%40pekininsurance.com%7C4810a06f551b47588c7708d71f536e82%7Caab19002fe2d4488ae543316324c96c2%7C0%7C0%7C637012315515422315&sdata=Dsb772rVgcoSL8yReKmL4iNsUL%2BjcW9bKo5KgWGrXXM%3D&reserved=0C:\Program Files\Internet Explorer\iexplore.exe
OUTLOOK.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3580"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1484 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2596"C:\Program Files\Google\Chrome\Application\chrome.exe" C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
2908"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x5faea9d0,0x5faea9e0,0x5faea9ecC:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
272"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=2988 --on-initialized-event-handle=312 --parent-handle=316 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
2256"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1040,9043229541271812362,8987602219823049495,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=17583709071354253491 --mojo-platform-channel-handle=1048 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
2760"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1040,9043229541271812362,8987602219823049495,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=9316078836236006102 --mojo-platform-channel-handle=1604 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
3584"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1040,9043229541271812362,8987602219823049495,131072 --enable-features=PasswordImport --lang=en-US --instant-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=11333388003089527997 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2204 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
1020"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1040,9043229541271812362,8987602219823049495,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=8214871344872558664 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2392 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Total events
2 204
Read events
1 656
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
59
Text files
212
Unknown types
13

Dropped files

PID
Process
Filename
Type
1404OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVRE71D.tmp.cvr
MD5:
SHA256:
1404OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\msoEB73.tmp
MD5:
SHA256:
1404OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmpgc
MD5:366990A85159756A8F09D115910FFC61
SHA256:37269464B2485231E47E51FF208F8E2AEAA1DDDA873962B6138A52D5013868D0
1404OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FD5CA.datimage
MD5:5490B36DD5BBC972B1250268AFF96CCD
SHA256:B16A7333B37F023BAA441C8618F743EBAE83F9724E164D16C36E2FFCD867C099
1404OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FB8C9BAD.datimage
MD5:EC8BC6FFBE8253A6EBB9DE36DAD96385
SHA256:F188725B6317D213E3B2B1ED0A64B51424987BB04D46154FD29EC6AFDCF4E07E
1484iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\favicon[1].ico
MD5:
SHA256:
1404OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\30B65743.datimage
MD5:03F6BB3776BEC92C2B0C508E421F0DB2
SHA256:DA2E82D028B39C929EC06B0B30514B7A9B7085F2BEB8275A0CC311122645100C
3580iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.datdat
MD5:1A1B5AB8DB3EE148EF9C6C7DC3AEDA91
SHA256:A02B4D460E14CFB4AE6010FE21B538042BD2ED567672E0694657FC5D152004F2
1404OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A5922068.datimage
MD5:53247941A747A3176794BF542DA42E5C
SHA256:119505361611CDFA10C7E82FDEA0B76B59F22CAA0B5430AC9CBE31A0A690F4C7
1404OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CB7D1549.datimage
MD5:35EE2ECBD852B3CBC2852F7B7ED2770E
SHA256:7271BBC351D660F8D64E2BA75179F1A86ACD80CB49C9D2924939AAA792882277
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
45
DNS requests
41
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2760
chrome.exe
GET
302
172.217.22.78:80
http://redirector.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOWVmQUFXS041NV9ZVXlJVWwxbGc5TUM4dw/7519.422.0.3_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx
US
html
516 b
whitelisted
2760
chrome.exe
GET
200
74.125.4.216:80
http://r2---sn-aigzrney.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOWVmQUFXS041NV9ZVXlJVWwxbGc5TUM4dw/7519.422.0.3_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx?cms_redirect=yes&mip=185.183.105.212&mm=28&mn=sn-aigzrney&ms=nvh&mt=1565722644&mv=m&mvi=1&pl=24&shardbypass=yes
US
crx
862 Kb
whitelisted
2760
chrome.exe
GET
200
93.184.221.240:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
US
compressed
56.6 Kb
whitelisted
2760
chrome.exe
GET
200
54.230.93.170:80
http://x.ss2.us/x.cer
US
der
1.27 Kb
whitelisted
1484
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1484
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2760
chrome.exe
172.217.23.163:443
www.gstatic.com
Google Inc.
US
whitelisted
3580
iexplore.exe
104.47.49.28:443
nam05.safelinks.protection.outlook.com
Microsoft Corporation
US
whitelisted
2760
chrome.exe
216.58.208.33:443
clients2.googleusercontent.com
Google Inc.
US
whitelisted
2760
chrome.exe
172.217.18.106:443
fonts.googleapis.com
Google Inc.
US
whitelisted
3580
iexplore.exe
184.168.47.225:443
www.hicksinsurance.com
GoDaddy.com, LLC
US
malicious
1404
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted
2760
chrome.exe
172.217.16.131:443
ssl.gstatic.com
Google Inc.
US
whitelisted
3580
iexplore.exe
167.89.118.35:443
u6091044.ct.sendgrid.net
SendGrid, Inc.
US
suspicious
2760
chrome.exe
172.217.22.78:80
ogs.google.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted
nam05.safelinks.protection.outlook.com
  • 104.47.49.28
  • 104.47.48.28
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
u6091044.ct.sendgrid.net
  • 167.89.118.35
  • 167.89.123.16
malicious
www.hicksinsurance.com
  • 184.168.47.225
malicious
dns.msftncsi.com
  • 131.107.255.255
shared
clientservices.googleapis.com
  • 172.217.21.195
whitelisted
accounts.google.com
  • 172.217.22.109
shared
www.google.com.ua
  • 172.217.21.195
whitelisted
fonts.googleapis.com
  • 172.217.18.106
whitelisted

Threats

No threats detected
No debug info