analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Confirm Unsubscribe%3A removed from our lists NOW(1).eml

Full analysis: https://app.any.run/tasks/21ada6eb-0929-4498-bb69-2283256d5996
Verdict: Malicious activity
Analysis date: November 15, 2018, 16:27:18
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: message/rfc822
File info: RFC 822 mail, ASCII text, with very long lines, with CRLF line terminators
MD5:

9A70CD9CE8E973577A3A1DE36862AE2F

SHA1:

9DD5F68A01AAC5531EF44266242BED050FD24031

SHA256:

FC87D84D1FE3EAA9ADE44A45080DBE2F6BE0AA68625C9CD56CD45CC70A87B462

SSDEEP:

96:sT/Rm/5+FR//ZoOz/e+/wB9mThUAMueOLQmLbhLbf6Vf+EAeDqTjgk4Ncz1KlC2T:sTo/y/F/Bo+TRXdYw8zczUlC31gyS

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Application launched itself

      • OUTLOOK.EXE (PID: 3428)
    • Starts Microsoft Office Application

      • OUTLOOK.EXE (PID: 3428)
    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 3428)
    • Reads internet explorer settings

      • CLVIEW.EXE (PID: 3212)
    • Reads Internet Cache Settings

      • CLVIEW.EXE (PID: 3212)
  • INFO

    • Reads Microsoft Office registry keys

      • OUTLOOK.EXE (PID: 3292)
      • OUTLOOK.EXE (PID: 3428)
      • CLVIEW.EXE (PID: 3212)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.eml | E-Mail message (Var. 5) (100)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start outlook.exe outlook.exe no specs clview.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3428"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE" /eml "C:\Users\admin\AppData\Local\Temp\045f7ca8-f417-4224-945e-8b1d83eff112.eml"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
14.0.6025.1000
3292"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE" -c IPM.Note /m "mailto:[email protected]?subject=Confirm&body=please%20unsubscribe%20me%20from%20your%20list"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXEOUTLOOK.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Exit code:
0
Version:
14.0.6025.1000
3212"C:\Program Files\Microsoft Office\Office14\CLVIEW.EXE" "OUTLOOK" "Microsoft Outlook"C:\Program Files\Microsoft Office\Office14\CLVIEW.EXEOUTLOOK.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Office Help Viewer
Version:
14.0.6015.1000
Total events
1 611
Read events
1 151
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
4
Text files
97
Unknown types
2

Dropped files

PID
Process
Filename
Type
3428OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVR9769.tmp.cvr
MD5:
SHA256:
3292OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVRFFD7.tmp.cvr
MD5:
SHA256:
3212CLVIEW.EXEC:\Users\admin\AppData\Local\Temp\IMT6EBF.tmp
MD5:
SHA256:
3212CLVIEW.EXEC:\Users\admin\AppData\Local\Temp\IMT6EC0.tmp
MD5:
SHA256:
3212CLVIEW.EXEC:\Users\admin\AppData\Local\Temp\IMT6ED1.tmp
MD5:
SHA256:
3212CLVIEW.EXEC:\Users\admin\AppData\Local\Temp\IMT6ED2.tmp
MD5:
SHA256:
3212CLVIEW.EXEC:\Users\admin\AppData\Local\Temp\IMT6ED3.tmp
MD5:
SHA256:
3212CLVIEW.EXEC:\Users\admin\AppData\Local\Temp\IMT6EE3.tmp
MD5:
SHA256:
3212CLVIEW.EXEC:\Users\admin\AppData\Local\Temp\IMT6EE4.tmp
MD5:
SHA256:
3212CLVIEW.EXEC:\Users\admin\AppData\Local\Temp\IMT6EE5.tmp
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3428
OUTLOOK.EXE
GET
64.4.26.155:80
http://config.messenger.msn.com/config/msgrconfig.asmx?op=GetOlcConfig
US
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3428
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted

Threats

No threats detected
No debug info