analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Potential Phish - 2022-06-27T093947.361.eml

Full analysis: https://app.any.run/tasks/4e45897d-2134-4504-818a-d0fd347bff1e
Verdict: Malicious activity
Analysis date: June 27, 2022, 08:49:55
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/plain
File info: multipart/alternative; boundary="===============4065689632319861873==", ASCII text, with very long lines, with CRLF line terminators
MD5:

FFB228412B92A827766EE53EDF603A3C

SHA1:

3A72EC804CA7BA7F173ABD2AB68E611C09B1BEF3

SHA256:

EBD56EA6E53219C3683C13B4B4D0A9F914511FCCC0164999A8EFC84A3021BA79

SSDEEP:

1536:o/hnE5kvpzo66YdrwBkke/BB3rt1FKC6Rl:KnEK6ceSr14C6Rl

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads the computer name

      • OUTLOOK.EXE (PID: 1396)
    • Checks supported languages

      • OUTLOOK.EXE (PID: 1396)
    • Reads Microsoft Outlook installation path

      • OUTLOOK.EXE (PID: 1396)
    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 1396)
    • Searches for installed software

      • OUTLOOK.EXE (PID: 1396)
    • Reads internet explorer settings

      • OUTLOOK.EXE (PID: 1396)
    • Modifies files in Chrome extension folder

      • chrome.exe (PID: 3872)
  • INFO

    • Checks supported languages

      • control.exe (PID: 2548)
      • chrome.exe (PID: 3872)
      • chrome.exe (PID: 2728)
      • chrome.exe (PID: 2780)
      • chrome.exe (PID: 2912)
      • chrome.exe (PID: 3108)
      • chrome.exe (PID: 1992)
      • chrome.exe (PID: 3264)
      • chrome.exe (PID: 3252)
      • chrome.exe (PID: 920)
      • chrome.exe (PID: 3340)
      • chrome.exe (PID: 3672)
      • chrome.exe (PID: 3336)
      • chrome.exe (PID: 2064)
      • chrome.exe (PID: 1368)
      • chrome.exe (PID: 3816)
      • chrome.exe (PID: 1776)
      • chrome.exe (PID: 3864)
    • Manual execution by user

      • control.exe (PID: 2548)
    • Reads the computer name

      • control.exe (PID: 2548)
      • chrome.exe (PID: 3872)
      • chrome.exe (PID: 2780)
      • chrome.exe (PID: 2728)
      • chrome.exe (PID: 3340)
      • chrome.exe (PID: 3672)
      • chrome.exe (PID: 1368)
      • chrome.exe (PID: 3816)
      • chrome.exe (PID: 3864)
    • Reads the hosts file

      • chrome.exe (PID: 3872)
      • chrome.exe (PID: 2780)
    • Application launched itself

      • chrome.exe (PID: 3872)
    • Reads settings of System Certificates

      • chrome.exe (PID: 2780)
    • Reads Microsoft Office registry keys

      • OUTLOOK.EXE (PID: 1396)
    • Reads the date of Windows installation

      • chrome.exe (PID: 3816)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.eml | E-Mail message (Var. 6) (100)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
59
Monitored processes
19
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start outlook.exe control.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1396"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE" /eml "C:\Users\admin\AppData\Local\Temp\Potential Phish - 2022-06-27T093947.361.eml"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
14.0.6025.1000
2548"C:\Windows\system32\control.exe" /name Microsoft.DefaultProgramsC:\Windows\system32\control.exeExplorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Control Panel
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3872"C:\Program Files\Google\Chrome\Application\chrome.exe" --single-argument http://mail.bacsupdates.co.uk/re?l=D0Iytmfz7I9ne1qozI2ITl4whc0p0&s=FGJHFHGFCKAKEOHHC:\Program Files\Google\Chrome\Application\chrome.exe
OUTLOOK.EXE
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
86.0.4240.198
2912"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=86.0.4240.198 --initial-client-data=0xc8,0xcc,0xd0,0x9c,0xd4,0x6edcd988,0x6edcd998,0x6edcd9a4C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
86.0.4240.198
2728"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1052,12571149182876173701,9503528578143003216,131072 --enable-features=PasswordImport --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1064 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
2780"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1052,12571149182876173701,9503528578143003216,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1220 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
86.0.4240.198
3108"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1052,12571149182876173701,9503528578143003216,131072 --enable-features=PasswordImport --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1960 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
86.0.4240.198
3264"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1052,12571149182876173701,9503528578143003216,131072 --enable-features=PasswordImport --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1948 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
1992"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1052,12571149182876173701,9503528578143003216,131072 --enable-features=PasswordImport --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2304 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
3340"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1052,12571149182876173701,9503528578143003216,131072 --enable-features=PasswordImport --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1024 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
86.0.4240.198
Total events
17 941
Read events
17 241
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
140
Text files
133
Unknown types
8

Dropped files

PID
Process
Filename
Type
1396OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVR9570.tmp.cvr
MD5:
SHA256:
1396OUTLOOK.EXEC:\Users\admin\Documents\Outlook Files\Outlook Data File - NoMail.pst
MD5:
SHA256:
1396OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmpgc
MD5:FB16BC84556200A6CB8A04F1FA2D412D
SHA256:08B1E62EADC5C028386960E495F7B1443A7DC641C43DC3EAA31EB52B4F5CFDB2
1396OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\corner-30-black[1].pngimage
MD5:EADF50B1849B8C7BA3A374B56672B89A
SHA256:42022917D5DA63D97203975B7327158A7F2FC7B8F6C151BA0160DC20D7DBAFF7
1396OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\outlook logging\firstrun.logtext
MD5:CCE195A82E2F73510391D48923A63FBB
SHA256:CF4CD66134BA8790FE2D43FBD2587317F9BFEF7E66703D547721B90AA1B4C0B4
1396OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\corner-30-red[1].pngimage
MD5:DB647F8C9533E491F1E7BD8546026BCB
SHA256:C982FA2DD4761CF445D7448A39E3CA4E317EDF8B6D4CAA15039D6D56B6DE81F3
1396OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_TCPrefs_2_32F083B0352A6746ACEDD11F1831987F.datxml
MD5:F194B1FA12F9B6F46A47391FAE8BEEC2
SHA256:FCD8D7E030BE6EA7588E5C6CB568E3F1BDFC263942074B693942A27DF9521A74
1396OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_WorkHours_1_34109CE6E398B64B9EE62D9BBD85391E.datxml
MD5:807EF0FC900FEB3DA82927990083D6E7
SHA256:4411E7DC978011222764943081500FFF0E43CBF7CCD44264BD1AB6306CA68913
1396OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_ContactPrefs_2_2B72D5C5E0F61242883F0FCC42E3304E.datxml
MD5:BBCF400BD7AE536EB03054021D6A6398
SHA256:383020065C1F31F4FB09F448599A6D5E532C390AF4E5B8AF0771FE17A23222AD
1396OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_RssRule_2_7C0E32BD98333344B72465337C884139.datxml
MD5:D8B37ED0410FB241C283F72B76987F18
SHA256:31E68049F6B7F21511E70CD7F2D95B9CF1354CF54603E8F47C1FC40F40B7A114
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
26
TCP/UDP connections
53
DNS requests
25
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1396
OUTLOOK.EXE
GET
200
195.140.186.100:80
http://mail.bacsupdates.co.uk/imgproxy/img/769827202/corner-30-black.png
DE
image
554 b
whitelisted
2780
chrome.exe
GET
302
195.140.186.103:80
http://mail.bacsupdates.co.uk/re?l=D0Iytmfz7I9ne1qozI2ITl4whc0p0&s=FGJHFHGFCKAKEOHH
DE
whitelisted
1396
OUTLOOK.EXE
GET
200
195.140.186.100:80
http://mail.bacsupdates.co.uk/imgproxy/img/769827202/corner-30-black.png
DE
image
554 b
whitelisted
1396
OUTLOOK.EXE
GET
200
195.140.186.100:80
http://mail.bacsupdates.co.uk/imgproxy/img/769827204/corner-30-red.png
DE
image
558 b
whitelisted
1396
OUTLOOK.EXE
GET
200
195.140.186.100:80
http://mail.bacsupdates.co.uk/imgproxy/img/769827210/corner-30-green.png
DE
image
542 b
whitelisted
1396
OUTLOOK.EXE
GET
200
195.140.186.100:80
http://mail.bacsupdates.co.uk/imgproxy/img/769827212/twitter.png
DE
image
1.02 Kb
whitelisted
1396
OUTLOOK.EXE
GET
200
195.140.186.100:80
http://mail.bacsupdates.co.uk/imgproxy/img/769827205/number-black-1.png
DE
image
507 b
whitelisted
1396
OUTLOOK.EXE
GET
200
195.140.186.100:80
http://mail.bacsupdates.co.uk/imgproxy/img/769827208/number-black-4.png
DE
image
524 b
whitelisted
1396
OUTLOOK.EXE
GET
200
195.140.186.100:80
http://mail.bacsupdates.co.uk/imgproxy/img/769827209/number-black-5.png
DE
image
538 b
whitelisted
1396
OUTLOOK.EXE
GET
200
195.140.186.100:80
http://mail.bacsupdates.co.uk/imgproxy/img/769827207/number-black-3.png
DE
image
555 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1396
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted
2780
chrome.exe
142.250.184.238:443
clients2.google.com
Google Inc.
US
whitelisted
195.140.186.100:80
mail.bacsupdates.co.uk
Global Access Internet Services GmbH
DE
suspicious
2780
chrome.exe
142.251.36.131:443
clientservices.googleapis.com
Google Inc.
US
unknown
195.140.186.103:80
mail.bacsupdates.co.uk
Global Access Internet Services GmbH
DE
suspicious
2780
chrome.exe
51.137.183.119:443
bacs.co.uk
Microsoft Corporation
GB
unknown
1396
OUTLOOK.EXE
195.140.186.100:80
mail.bacsupdates.co.uk
Global Access Internet Services GmbH
DE
suspicious
2780
chrome.exe
195.140.186.103:80
mail.bacsupdates.co.uk
Global Access Internet Services GmbH
DE
suspicious
2780
chrome.exe
142.251.36.65:443
clients2.googleusercontent.com
Google Inc.
US
unknown
2780
chrome.exe
152.199.19.160:443
ajax.aspnetcdn.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted
dns.msftncsi.com
  • 131.107.255.255
shared
mail.bacsupdates.co.uk
  • 195.140.186.100
  • 195.140.186.102
  • 195.140.186.101
  • 195.140.186.103
whitelisted
clientservices.googleapis.com
  • 142.251.36.131
whitelisted
accounts.google.com
  • 142.251.37.109
shared
clients2.google.com
  • 142.250.184.238
whitelisted
bacs.co.uk
  • 51.137.183.119
unknown
clients2.googleusercontent.com
  • 142.251.36.65
whitelisted
fonts.googleapis.com
  • 142.251.36.138
whitelisted
cc.cdn.civiccomputing.com
  • 13.224.189.80
  • 13.224.189.13
  • 13.224.189.11
  • 13.224.189.65
shared

Threats

No threats detected
No debug info