File name:

FedEx Express AWB#5305323204643 - Information is required.vbs

Full analysis: https://app.any.run/tasks/47e61187-d037-4705-9b39-affb7869cb24
Verdict: Malicious activity
Threats:

FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus.

Analysis date: November 26, 2024, 08:11:57
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
formbook
xloader
Indicators:
MIME: text/plain
File info: ASCII text, with very long lines (65287), with CRLF line terminators
MD5:

DDF35C4472B8ADD31D5B2E68A6BC6BA3

SHA1:

846510AF6FB0C8988D2B710ED84DE4B3FC9AB66A

SHA256:

02E991F1EC08B5AA5B6E7F93EE4C3B4284E5F25A09133ADA194920F1FE35F391

SSDEEP:

24576:5eG+FOnSGbxeQYDCrudI+HZIsaLXJZcKXY5+zvm8lJMERZ+WNx82RREc46IIsDBP:c

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Uses base64 encoding (SCRIPT)

      • wscript.exe (PID: 3836)
    • Detects the decoding of a binary file from Base64 (SCRIPT)

      • wscript.exe (PID: 3836)
    • Uses sleep, probably for evasion detection (SCRIPT)

      • wscript.exe (PID: 3836)
    • Deletes a file (SCRIPT)

      • wscript.exe (PID: 3836)
    • FORMBOOK has been detected (YARA)

      • RegAsm.exe (PID: 6732)
  • SUSPICIOUS

    • Sets XML DOM element text (SCRIPT)

      • wscript.exe (PID: 3836)
    • Creates a Stream, which may work with files, input/output devices, pipes, or TCP/IP sockets (SCRIPT)

      • wscript.exe (PID: 3836)
    • Writes binary data to a Stream object (SCRIPT)

      • wscript.exe (PID: 3836)
    • Creates FileSystem object to access computer's file system (SCRIPT)

      • wscript.exe (PID: 3836)
    • Executable content was dropped or overwritten

      • wscript.exe (PID: 3836)
    • Saves data to a binary file (SCRIPT)

      • wscript.exe (PID: 3836)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 3836)
  • INFO

    • Checks supported languages

      • temp_phR3o.exe (PID: 6696)
      • RegAsm.exe (PID: 6732)
    • Reads the computer name

      • temp_phR3o.exe (PID: 6696)
    • Reads the machine GUID from the registry

      • temp_phR3o.exe (PID: 6696)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
129
Monitored processes
3
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start wscript.exe temp_phr3o.exe no specs #FORMBOOK regasm.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3836"C:\WINDOWS\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\FedEx Express AWB#5305323204643 - Information is required.vbs"C:\Windows\System32\wscript.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6696"C:\Users\admin\AppData\Local\Temp\temp_phR3o.exe" C:\Users\admin\AppData\Local\Temp\temp_phR3o.exewscript.exe
User:
admin
Integrity Level:
MEDIUM
Description:
XZC44445
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\temp_phr3o.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
6732"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
temp_phR3o.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Assembly Registration Utility
Exit code:
0
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\regasm.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
Total events
599
Read events
599
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
0
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
3836wscript.exeC:\Users\admin\AppData\Local\Temp\temp_phR3o.exeexecutable
MD5:A04DAE341F12336009172509EF7153ED
SHA256:8BB1239148213FA079FC23C2E80DB46A36F11D12247F76033A7579928AD0B176
3836wscript.exeC:\Users\admin\AppData\Local\Temp\log_ZhPRY.logtext
MD5:594042EB86F847C6FEA9122E9D1202CE
SHA256:4CBFC7A2D56717AB14BC4BCD50A42A6D720C405CDFCBCC12B624FB819D066DA7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
33
DNS requests
18
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7084
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
3688
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
7084
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1752
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5064
SearchApp.exe
92.123.104.24:443
www.bing.com
Akamai International B.V.
DE
whitelisted
1176
svchost.exe
20.190.159.68:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1176
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.124.78.146
whitelisted
google.com
  • 142.250.185.78
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 95.101.149.131
whitelisted
www.bing.com
  • 92.123.104.24
  • 92.123.104.18
  • 92.123.104.20
  • 92.123.104.19
  • 92.123.104.26
  • 92.123.104.25
  • 92.123.104.17
  • 92.123.104.21
  • 92.123.104.22
whitelisted
login.live.com
  • 20.190.159.68
  • 20.190.159.2
  • 40.126.31.69
  • 20.190.159.75
  • 20.190.159.73
  • 20.190.159.0
  • 20.190.159.64
  • 20.190.159.4
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 23.213.166.81
whitelisted
arc.msn.com
  • 20.199.58.43
whitelisted
fd.api.iris.microsoft.com
  • 20.223.35.26
whitelisted

Threats

No threats detected
No debug info