File name:

Quotation.lzh

Full analysis: https://app.any.run/tasks/da72a43a-3920-48b1-bb78-48d9e29c4471
Verdict: Malicious activity
Threats:

FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus.

Analysis date: October 31, 2024, 12:16:30
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
formbook
stealer
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

0738B8E8CC05B821858062D0349D3644

SHA1:

EB94F9849783C05DF3C515917056A23FCCA9F5FA

SHA256:

19B8F3E726976E0285670A8CB0A227D173A41DAD108DF4BB171D8A8D9A0F63B8

SSDEEP:

49152:rBRXqiOEbEzJhvKo1MtPu6JBqozoxuQWhXPNkvmg/g/xhUY5H8FeeihrV:fqiOEkFytPu6JBhoxz40EjPV

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 5220)
    • Connects to the CnC server

      • WinRAR.exe (PID: 5220)
    • FORMBOOK has been detected (SURICATA)

      • WinRAR.exe (PID: 5220)
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • Quotation.exe (PID: 6680)
    • Executable content was dropped or overwritten

      • Quotation.exe (PID: 6680)
    • Application launched itself

      • Quotation.exe (PID: 6680)
    • Suspicious use of NETSH.EXE

      • WinRAR.exe (PID: 5220)
    • Contacting a server suspected of hosting an CnC

      • WinRAR.exe (PID: 5220)
  • INFO

    • Manual execution by a user

      • Quotation.exe (PID: 6680)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)

EXIF

ZIP

FileVersion: RAR v5
CompressedSize: 1101662
UncompressedSize: 1203880
OperatingSystem: Win32
ArchivedFileName: Quotation.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #FORMBOOK winrar.exe quotation.exe quotation.exe netsh.exe no specs firefox.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
824"C:\Users\admin\Desktop\Quotation.exe" C:\Users\admin\Desktop\Quotation.exe
Quotation.exe
User:
admin
Integrity Level:
MEDIUM
Description:
screamer slounge
Exit code:
0
Modules
Images
c:\windows\syswow64\mshtml.dll
c:\users\admin\desktop\quotation.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
5220"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\Quotation.lzh.rarC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6332"C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exenetsh.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
123.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
c:\program files\mozilla firefox\vcruntime140_1.dll
c:\windows\system32\crypt32.dll
6396"C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Network Command Shell
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\netsh.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\oleaut32.dll
6680"C:\Users\admin\Desktop\Quotation.exe" C:\Users\admin\Desktop\Quotation.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
screamer slounge
Exit code:
0
Modules
Images
c:\users\admin\desktop\quotation.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
Total events
15 238
Read events
14 903
Write events
335
Delete events
0

Modification events

(PID) Process:(5220) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(5220) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Quotation.lzh.rar
(PID) Process:(5220) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(5220) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(5220) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(5220) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6680) Quotation.exeKey:HKEY_CURRENT_USER\Zoofulvin68\Uninstall\brevbrere
Operation:writeName:aircondition
Value:
1
(PID) Process:(5220) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:name
Value:
256
(PID) Process:(5220) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(5220) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:psize
Value:
80
Executable files
1
Suspicious files
18
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
6680Quotation.exeC:\Users\admin\overlays\besvangredes\Politistyrkers.Karbinary
MD5:DB64FF2EF3FD12FB023360EA842AB6A3
SHA256:14D27F563BA4A187BDE159B8D5540F7211961A05E737DFB6EA5209A771A21F2E
6680Quotation.exeC:\Users\admin\overlays\besvangredes\Billigudgavens.Cusbinary
MD5:C8294E0EC7F0506E2CEF87F454073DC2
SHA256:AC38CD1CF8C08207F418E1CD4CD36B3F7CEEAFFF307B1BC78DA87616E37DF5A0
6680Quotation.exeC:\Users\admin\overlays\besvangredes\Trikstanks.prabinary
MD5:49BE0E06F2E4F0CCFFB46426EE262642
SHA256:A55DAC07FB586D4B64F0DDF812087A2EEEC6F5286D9BC73AD648ED3220ABDD3A
6680Quotation.exeC:\Users\admin\overlays\besvangredes\boyaus.rombinary
MD5:F130EC3095DBECEDC791D8C58A59040C
SHA256:A56351ED69A301F5D9D89B6530280B7A85F998A806E1648911C37B6983BA9426
6680Quotation.exeC:\Users\admin\overlays\besvangredes\pilaued\jagtfalk.illbinary
MD5:169115C751DDA5E021E8C86E8454B26D
SHA256:ACCD4911D88E808AED4A2AA27394628C62574810B0B47977B7103A246FDF2A10
6680Quotation.exeC:\Users\admin\overlays\besvangredes\pilaued\regill.fulbinary
MD5:B4FB425BAF217F31E91AAB39ABF66DCD
SHA256:4BC57A47B82B63EC20B393F65F3585EB81FE3F7748229CD19DEC8FE8A41D67C3
6680Quotation.exeC:\Users\admin\Music\antithetic.initext
MD5:58AC0B5E1D49D0EE1AED2FE13FAE6C7A
SHA256:624F49944CB84ED51FECABCD549AE3B47152F9A20C4A95E93C8B007AEFE9FEAB
6680Quotation.exeC:\Users\admin\overlays\besvangredes\Emmens.udkbinary
MD5:1D099F6122F4B7C8A78925726B59E5C3
SHA256:1B6DC1EAD079DB05B998725B154E803E6E1504E7E5B49C5611D55E018CD45E6D
6680Quotation.exeC:\Users\admin\overlays\besvangredes\Proprietrer.betbinary
MD5:0B62328C4966F6B879B3C13B7FBD9C0D
SHA256:645C325F62AF720972466322B09A7E396E46D8E640B138D582374B68D763A3A7
6680Quotation.exeC:\Users\admin\overlays\besvangredes\pilaued\sortlistningens.txttext
MD5:46003C65AA12A0EBE55662F0141186DC
SHA256:2EA079DEDE1B356842C5F5E0751B5E2B6565FDED65DAFB59A73D170C002ABB27
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
18
TCP/UDP connections
57
DNS requests
30
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4360
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
23.32.238.107:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1552
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6936
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
3676
SIHClient.exe
GET
200
23.32.185.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
3676
SIHClient.exe
GET
200
23.32.185.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
824
Quotation.exe
GET
200
142.250.184.195:80
http://c.pki.goog/r/r1.crl
unknown
whitelisted
824
Quotation.exe
GET
200
142.250.184.227:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
whitelisted
824
Quotation.exe
GET
200
142.250.184.227:80
http://o.pki.goog/wr2/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRTQtSEi8EX%2BbYUTXd8%2ByMxD3s1zQQU3hse7XkV1D43JMMhu%2Bw0OW1CsjACEQDzySkSNBgXtBKLijHUmMxR
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6944
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
104.126.37.171:443
www.bing.com
Akamai International B.V.
DE
whitelisted
1752
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5488
MoUsoCoreWorker.exe
23.32.238.107:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5488
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4020
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
816
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
whitelisted
www.bing.com
  • 104.126.37.171
  • 104.126.37.136
  • 104.126.37.178
  • 104.126.37.131
  • 104.126.37.137
  • 104.126.37.139
  • 104.126.37.185
  • 104.126.37.179
  • 104.126.37.130
whitelisted
crl.microsoft.com
  • 23.32.238.107
  • 23.32.238.112
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 23.32.185.131
whitelisted
google.com
  • 142.250.186.174
whitelisted
login.live.com
  • 40.126.31.69
  • 20.190.159.2
  • 20.190.159.68
  • 40.126.31.67
  • 20.190.159.75
  • 20.190.159.4
  • 20.190.159.73
  • 20.190.159.71
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
th.bing.com
  • 104.126.37.170
  • 104.126.37.179
  • 104.126.37.178
  • 104.126.37.185
  • 104.126.37.131
  • 104.126.37.171
  • 104.126.37.130
  • 104.126.37.136
  • 104.126.37.163
whitelisted
go.microsoft.com
  • 23.218.210.69
whitelisted
arc.msn.com
  • 20.199.58.43
whitelisted

Threats

PID
Process
Class
Message
5220
WinRAR.exe
Malware Command and Control Activity Detected
ET MALWARE FormBook CnC Checkin (GET) M5
5220
WinRAR.exe
A Network Trojan was detected
STEALER [ANY.RUN] Formbook HTTP Header
5220
WinRAR.exe
A Network Trojan was detected
STEALER [ANY.RUN] Formbook HTTP Header
5220
WinRAR.exe
A Network Trojan was detected
STEALER [ANY.RUN] Formbook HTTP Header
5220
WinRAR.exe
Malware Command and Control Activity Detected
ET MALWARE FormBook CnC Checkin (GET) M5
2 ETPRO signatures available at the full report
No debug info