analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Contrato de Propriedade.msg

Full analysis: https://app.any.run/tasks/5ec49e3b-1f49-4ee3-9a71-aaf8b8696dd7
Verdict: Malicious activity
Analysis date: November 08, 2019, 17:09:23
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/vnd.ms-outlook
File info: CDFV2 Microsoft Outlook Message
MD5:

86ECEECAD8AFD26CF77FBA36E9BBC3D8

SHA1:

037DCCB04A1778E4C8A2F60E1258821098A87D63

SHA256:

FD1E2E516CB128378A25827D1D270EA11CAE8962A42CA2FF41D0C4B03C808984

SSDEEP:

768:3TH4lM1KUo6tfbD4vdvvDL68cev+3nL18nx3n+Bm6oKw6ulZezBTMQeb4K/s:3AUo6tjD4lLGWvwSeFolcl3I5

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Unusual execution from Microsoft Office

      • OUTLOOK.EXE (PID: 1952)
  • SUSPICIOUS

    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 1952)
    • Reads Internet Cache Settings

      • OUTLOOK.EXE (PID: 1952)
    • Starts Internet Explorer

      • OUTLOOK.EXE (PID: 1952)
  • INFO

    • Changes internet zones settings

      • iexplore.exe (PID: 328)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3300)
      • iexplore.exe (PID: 1524)
    • Creates files in the user directory

      • iexplore.exe (PID: 3300)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3300)
      • iexplore.exe (PID: 1524)
    • Application launched itself

      • iexplore.exe (PID: 328)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 328)
    • Reads Microsoft Office registry keys

      • OUTLOOK.EXE (PID: 1952)
    • Changes settings of System certificates

      • iexplore.exe (PID: 328)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 328)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msg | Outlook Message (58.9)
.oft | Outlook Form Template (34.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start outlook.exe iexplore.exe iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
1952"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\admin\AppData\Local\Temp\Contrato de Propriedade.msg"C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Version:
14.0.6025.1000
328"C:\Program Files\Internet Explorer\iexplore.exe" https://mmjzubbbvhfbc.ml/47Sx4aw40amanaUMzh36afq/[email protected]C:\Program Files\Internet Explorer\iexplore.exe
OUTLOOK.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3300"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:328 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
1524"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:328 CREDAT:6404C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Total events
2 104
Read events
1 462
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
57
Unknown types
4

Dropped files

PID
Process
Filename
Type
1952OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVRA860.tmp.cvr
MD5:
SHA256:
328iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\favicon[1].ico
MD5:
SHA256:
328iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
1952OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\outlook logging\firstrun.logtext
MD5:7052C417E4939CB8E64C245ECDFA7C01
SHA256:AFDF0A0E4B1CE4A7DE2DEB989E500A89178366345B2F2E8CE19BF0C4CE9367A7
1952OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmpgc
MD5:C59A9D9AB2689E3155D8FF06A177A9F3
SHA256:A863237A7CEC5FCB1FD70DB3368B398E2F9A58A4E64844B37AA33864810A8A0A
1952OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\66FE7BDA.datimage
MD5:81DBCDD6467D7F1EE776BD3F59EB51E8
SHA256:63A0A5CC279742D4551E42E665ED7B74674F1D9E1CBCA8FC4702F2EA5A9CE352
3300iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.datdat
MD5:416F433429D5B21940ECEFF875355EC6
SHA256:33BD47A6DA8399C58DC2EEA3546341F4DAB6581E082DCEF736D28457036DC898
3300iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\3GNXYIF1\invalidcert[1]html
MD5:E2817FEBFEDE77B8CC498C4833098742
SHA256:AAB4F5B4BDD02B66B46643B0BBD40761C694B14857E6943F3AC03B692FD08047
1952OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\{06EDCBC4-0135-4571-956D-469AC87C6361}\{1C306CB1-771E-4B4B-A902-86E897877F5B}.pngimage
MD5:7D80C0A7E3849818695EAF4989186A3C
SHA256:72DC527D78A8E99331409803811CC2D287E812C008A1C869A6AEA69D7A44B597
1952OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\mapisvc.inftext
MD5:48DD6CAE43CE26B992C35799FCD76898
SHA256:7BFE1F3691E2B4FB4D61FBF5E9F7782FBE49DA1342DBD32201C2CC8E540DBD1A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
12
DNS requests
4
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1952
OUTLOOK.EXE
GET
64.4.26.155:80
http://config.messenger.msn.com/config/msgrconfig.asmx?op=GetOlcConfig
US
whitelisted
328
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3300
iexplore.exe
5.206.225.48:443
mmjzubbbvhfbc.ml
Dotsi, Unipessoal Lda.
NL
suspicious
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
328
iexplore.exe
5.206.225.48:443
mmjzubbbvhfbc.ml
Dotsi, Unipessoal Lda.
NL
suspicious
1524
iexplore.exe
5.206.225.48:443
mmjzubbbvhfbc.ml
Dotsi, Unipessoal Lda.
NL
suspicious
1952
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted
5.206.225.48:443
mmjzubbbvhfbc.ml
Dotsi, Unipessoal Lda.
NL
suspicious

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted
mmjzubbbvhfbc.ml
  • 5.206.225.48
suspicious
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET INFO DNS Query for Suspicious .ml Domain
3300
iexplore.exe
Potentially Bad Traffic
ET INFO Suspicious Domain (*.ml) in TLS SNI
3300
iexplore.exe
Potentially Bad Traffic
ET INFO Observed Let's Encrypt Certificate for Suspicious TLD (.ga)
328
iexplore.exe
Potentially Bad Traffic
ET INFO Observed Let's Encrypt Certificate for Suspicious TLD (.ga)
1524
iexplore.exe
Potentially Bad Traffic
ET INFO Observed Let's Encrypt Certificate for Suspicious TLD (.ga)
No debug info