analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Плаќање на нарачката.zip

Full analysis: https://app.any.run/tasks/9fd382b5-6d15-46c6-ba5a-ab55f82c37e1
Verdict: Malicious activity
Threats:

FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus.

Analysis date: October 20, 2020, 09:03:00
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
formbook
stealer
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

F075C4D54815972E0EFD57FAC60A990F

SHA1:

1946BBF5C8281BFA650910FB5C893365986E2B29

SHA256:

14B71307278A520704F0E50768138DB6A8EEEC9093BD058451456E09285FB9B5

SSDEEP:

12288:p+bR2p8zKACuit3pQNfkOlLi6pspjrfGWfvaySk:p+bAp9APq5wfkOlLfmvG0va9k

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Payment of the order.exe (PID: 2104)
    • Connects to CnC server

      • explorer.exe (PID: 392)
    • FORMBOOK was detected

      • explorer.exe (PID: 392)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2728)
    • Reads Internet Cache Settings

      • Payment of the order.exe (PID: 2104)
    • Creates files in the user directory

      • Payment of the order.exe (PID: 2104)
    • Starts CMD.EXE for commands execution

      • wininit.exe (PID: 2628)
  • INFO

    • Manual execution by user

      • wininit.exe (PID: 2628)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: Payment of the order.exe
ZipUncompressedSize: 983560
ZipCompressedSize: 456541
ZipCRC: 0x0b00def1
ZipModifyDate: 2020:10:19 08:29:08
ZipCompression: Deflated
ZipBitFlag: 0x0808
ZipRequiredVersion: 20
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
6
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start winrar.exe payment of the order.exe tapiunattend.exe no specs wininit.exe no specs cmd.exe no specs #FORMBOOK explorer.exe

Process information

PID
CMD
Path
Indicators
Parent process
2728"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Плаќање на нарачката.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
2104"C:\Users\admin\AppData\Local\Temp\Rar$EXa2728.43572\Payment of the order.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2728.43572\Payment of the order.exe
WinRAR.exe
User:
admin
Company:
Sysinternals - www.sysinternals.com
Integrity Level:
MEDIUM
Description:
Sysinternals Process Explorer
Exit code:
0
Version:
16.21
1084C:\Windows\System32\TapiUnattend.exeC:\Windows\System32\TapiUnattend.exePayment of the order.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Windows(TM) Telephony Unattend Action
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2628"C:\Windows\System32\wininit.exe"C:\Windows\System32\wininit.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Start-Up Application
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2868/c del "C:\Windows\System32\TapiUnattend.exe"C:\Windows\System32\cmd.exewininit.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
392C:\Windows\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
500
Read events
465
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
7
Text files
2
Unknown types
3

Dropped files

PID
Process
Filename
Type
2104Payment of the order.exeC:\Users\admin\AppData\Local\Temp\TarD6CE.tmp
MD5:
SHA256:
2104Payment of the order.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6AF4EE75E3A4ABA658C0087EB9A0BB5B_F80805103A05D4F74523519C6EAD8FC0binary
MD5:DA3CDE25C720630516425F0C71531EEF
SHA256:D250D9928F169D481E2B2590D6A45D508B3B74A318A9AFC8BBE74186D8E927C6
2104Payment of the order.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\WWRY52G0.txttext
MD5:42F20AE9D796F62CE0E3EF2C8F39C01C
SHA256:1172BF3410F67298D834222F75106A7BA757BF32367D691E95D2AA5AB3E74B8F
2104Payment of the order.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_979AB563CEB98F2581C14ED89B8957D4binary
MD5:8EC10336E17B588A76DAFE1691E53588
SHA256:CDE6FDBA1B23A91CFDF36EDD61FD2F21050C11FB780D81AD9B1F7C1DB9099EF9
2104Payment of the order.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\64DCC9872C5635B1B7891B30665E0558_5552C20A2631357820903FD38A8C0F9Fbinary
MD5:08E0C582F18F9E039984C46AC556F61A
SHA256:CA43BEEFEBA1880AA903C7EE047CE24208458E3E05593B2A309C89CE3A02F5D3
2104Payment of the order.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\64DCC9872C5635B1B7891B30665E0558_5552C20A2631357820903FD38A8C0F9Fder
MD5:3DD59AA4C6648D46393B4D6317AA43A3
SHA256:6266E6ED3B79BACEDD2FFF6AA5F3A65373A56B0B03BE3FB0540EC18C1866B3A1
2728WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2728.43572\Payment of the order.exeexecutable
MD5:8B2B400D37FDC9121B819EBD2BEEF307
SHA256:7A8468CF315B63BC201F82A3318B39481BBA571FDC30B601728FAA1BD048DFFD
2104Payment of the order.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_979AB563CEB98F2581C14ED89B8957D4der
MD5:5526A018D7E0F4C72BDC813F5889545A
SHA256:4CBE2D0591CBE5F0CCECC656DEBA55753E8F83E3FC819434E2320C7FF58D9C25
2104Payment of the order.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6AF4EE75E3A4ABA658C0087EB9A0BB5B_F80805103A05D4F74523519C6EAD8FC0der
MD5:ED776854FF321B955275E762A09129C6
SHA256:48CC443DCA5A765AA97F5AA74AF7831C060DA2481650CB0FEAAB2C5CBF2C9039
2104Payment of the order.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\Cfabbbb[1]text
MD5:B25821BC4351D8DB9A4A098F4AD6BD64
SHA256:DB0BA8958D5B9BEEE890D000BDA6B23595526D3D67A03EFE825A705D49E59F2B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
12
DNS requests
12
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
392
explorer.exe
GET
49.156.179.92:80
http://www.5yg7lidmzsj9gw.xyz/m3px/?1b0l=M/L2CxeXfQ9uCPhwF2iOpdLlAOIrHulaftlfvPNPk+mcu9y4+KuFF2qp61Wvr9FqJWgjAw==&4hD=uDzxV4Ux-27x5Pi
JP
malicious
392
explorer.exe
GET
301
184.168.131.241:80
http://www.militaryhomedecisions.com/m3px/?1b0l=Azg8whItreoVKK3pHw/p3xAQsUof+k6iKzJRyf/ew2+zE/0Cnsv/aEhb7JaDUlmGf8Y+wg==&4hD=uDzxV4Ux-27x5Pi
US
malicious
2104
Payment of the order.exe
GET
200
151.139.128.14:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEBblhnjgcJQ5S9%2FbTvymO98%3D
US
der
471 b
whitelisted
392
explorer.exe
GET
403
34.102.136.180:80
http://www.erotichypnotheapist.com/m3px/?1b0l=odazrgnMKT5oLEGvhfCK74iR1pKRj0c/jb7buhBrEkByqu5/qG/9Wv/izJZgXNsQlBT00Q==&4hD=uDzxV4Ux-27x5Pi
US
html
275 b
whitelisted
392
explorer.exe
GET
403
34.102.136.180:80
http://www.useae.com/m3px/?1b0l=oDKLHSUM9/RFTVhgcLaNFx49hQzKuAGOdb7EnICeqxRvRkGQ0aTFRQdDlweRKXxP/hWeog==&4hD=uDzxV4Ux-27x5Pi
US
html
275 b
whitelisted
392
explorer.exe
GET
403
34.102.136.180:80
http://www.wiscoed.com/m3px/?1b0l=JdaMrUsBsDNiP7lidk3lG7bFf6pED3ud+ifqRIlrQwrtfXAbc/Y2888vm28gWujWJLEhoA==&4hD=uDzxV4Ux-27x5Pi
US
html
275 b
whitelisted
392
explorer.exe
GET
403
34.102.136.180:80
http://www.kvtlawyers.net/m3px/?1b0l=OuKuNjxbJmXzrAbYb5ePnb1TwpR+6zf5ab1W/6jpGt2Bd29/YTDVCu2bg4LIP6s6yRMp9A==&4hD=uDzxV4Ux-27x5Pi
US
html
275 b
whitelisted
2104
Payment of the order.exe
GET
200
151.139.128.14:80
http://ocsp.comodoca4.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrJdiQ%2Ficg9B19asFe73bPYs%2BreAQUdXGnGUgZvJ2d6kFH35TESHeZ03kCEFslzmkHxCZVZtM5DJmpVK0%3D
US
der
314 b
whitelisted
2104
Payment of the order.exe
GET
200
151.139.128.14:80
http://ocsp.comodoca4.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTOpjOEf6LG1z52jqAxwDlTxoaOCgQUQAlhZ%2FC8g3FP3hIILG%2FU1Ct2PZYCEDJAnJQUGG0bwuno3m2vDJ8%3D
US
der
278 b
whitelisted
392
explorer.exe
GET
403
34.102.136.180:80
http://www.watchdoglogistics.com/m3px/?1b0l=wVwQk1jBEX18feWJFYfDdlG9aKclO+LavpqocmEZ2rB6cEzVz0BKRa1+VXNPTcUYZdmzxw==&4hD=uDzxV4Ux-27x5Pi
US
html
275 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
Payment of the order.exe
162.159.135.233:443
cdn.discordapp.com
Cloudflare Inc
shared
392
explorer.exe
184.168.131.241:80
www.militaryhomedecisions.com
GoDaddy.com, LLC
US
shared
2104
Payment of the order.exe
151.139.128.14:80
ocsp.comodoca.com
Highwinds Network Group, Inc.
US
suspicious
392
explorer.exe
34.102.136.180:80
www.erotichypnotheapist.com
US
whitelisted
23.210.249.93:443
www.microsoft.com
Akamai International B.V.
NL
whitelisted
392
explorer.exe
49.156.179.92:80
www.5yg7lidmzsj9gw.xyz
Ace, Inc.
JP
malicious
34.102.136.180:80
www.erotichypnotheapist.com
US
whitelisted
392
explorer.exe
5.182.210.249:80
www.nibblemirror.com
malicious

DNS requests

Domain
IP
Reputation
www.microsoft.com
  • 23.210.249.93
whitelisted
cdn.discordapp.com
  • 162.159.135.233
  • 162.159.133.233
  • 162.159.129.233
  • 162.159.134.233
  • 162.159.130.233
shared
ocsp.comodoca.com
  • 151.139.128.14
whitelisted
ocsp.comodoca4.com
  • 151.139.128.14
whitelisted
www.erotichypnotheapist.com
  • 34.102.136.180
whitelisted
www.watchdoglogistics.com
  • 34.102.136.180
whitelisted
www.5yg7lidmzsj9gw.xyz
  • 49.156.179.92
malicious
www.useae.com
  • 34.102.136.180
  • 35.167.228.82
whitelisted
www.wiscoed.com
  • 34.102.136.180
whitelisted
www.nibblemirror.com
  • 5.182.210.249
malicious

Threats

PID
Process
Class
Message
392
explorer.exe
A Network Trojan was detected
SPYWARE [PTsecurity] FormBook
392
explorer.exe
A Network Trojan was detected
SPYWARE [PTsecurity] FormBook
392
explorer.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 3
392
explorer.exe
A Network Trojan was detected
SPYWARE [PTsecurity] FormBook
392
explorer.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
392
explorer.exe
A Network Trojan was detected
SPYWARE [PTsecurity] FormBook
392
explorer.exe
A Network Trojan was detected
SPYWARE [PTsecurity] FormBook
392
explorer.exe
A Network Trojan was detected
SPYWARE [PTsecurity] FormBook
392
explorer.exe
A Network Trojan was detected
SPYWARE [PTsecurity] FormBook
392
explorer.exe
A Network Trojan was detected
SPYWARE [PTsecurity] FormBook
8 ETPRO signatures available at the full report
No debug info