File name:

PO240145.exe

Full analysis: https://app.any.run/tasks/04be572f-4cf4-49e2-980a-4f77e583d699
Verdict: Malicious activity
Threats:

FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus.

Analysis date: March 02, 2025, 08:57:29
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
auto
formbook
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

7066331EE1A237844FDAC807D3ED1DCE

SHA1:

692C6494A4652E1C531DCB1BD8B748DF454357FC

SHA256:

19FC80B4EC579881EF74A5CE4EF4770223E179252573376F75D9E4F8135F2FF1

SSDEEP:

49152:AHlGAXWQkC2R/QORBt7QjFtmcaTH/vU4do9Pcjq1GvXB1sgPR8N32+Rr181vWDZg:RAGQX21RBt7QjTmcaTH/vU4do9Pcjq1T

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • STEALER has been found (auto)

      • PO240145.exe (PID: 5324)
  • SUSPICIOUS

    • Executes application which crashes

      • PO240145.exe (PID: 5324)
  • INFO

    • Reads mouse settings

      • PO240145.exe (PID: 5324)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 6944)
    • The sample compiled with english language support

      • PO240145.exe (PID: 5324)
    • Create files in a temporary directory

      • PO240145.exe (PID: 5324)
    • Reads the software policy settings

      • slui.exe (PID: 7400)
    • Checks supported languages

      • PO240145.exe (PID: 5324)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:02:17 00:18:12+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 12
CodeSize: 581120
InitializedDataSize: 937472
UninitializedDataSize: -
EntryPoint: 0x27dcd
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (British)
CharacterSet: Unicode
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
142
Monitored processes
6
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start po240145.exe svchost.exe no specs werfault.exe no specs sppextcomobj.exe no specs slui.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
5164C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5324"C:\Users\admin\AppData\Local\Temp\PO240145.exe" C:\Users\admin\AppData\Local\Temp\PO240145.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\appdata\local\temp\po240145.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
6944C:\WINDOWS\SysWOW64\WerFault.exe -u -p 5324 -s 800C:\Windows\SysWOW64\WerFault.exePO240145.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
7000"C:\Users\admin\AppData\Local\Temp\PO240145.exe" C:\Windows\SysWOW64\svchost.exePO240145.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
7368C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7400"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
2 223
Read events
2 223
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
6
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
6944WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_PO240145.exe_9229a2223155604a8b39b834605dea3d345e8c1a_21e17b0f_0d200b26-4f71-4f33-89a2-896007b430c5\Report.wer
MD5:
SHA256:
6944WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERCCE8.tmp.WERInternalMetadata.xmlbinary
MD5:57ACFB75CA353641967A4939E7BF6C00
SHA256:171E4FD8A7A3133B7D5C2549B557FB7EDCBF3543F6C826D48936721BB69951A6
6944WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERCD37.tmp.xmlxml
MD5:AF263249CC4BB8869EE00837E5D9D2D3
SHA256:7A7680B768B302958F80CD5C46C4A66C6297B30ADE4C801C7C17A65F460F6D7E
5324PO240145.exeC:\Users\admin\AppData\Local\Temp\definitizationtext
MD5:6F00951C157D67DA16E42785607D6941
SHA256:C216910D188C5E7F79A9B3CF82D1EA524874AC661BF9D2973132D9E01A51C591
6944WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\PO240145.exe.5324.dmpbinary
MD5:9FD493C41E4D1A7F42A7040A98AAE0CF
SHA256:AFDE7BBF31F4196D8F5946A0F0E7F2C9936914B7F14D5D7E841F5CB03B2E6197
5324PO240145.exeC:\Users\admin\AppData\Local\Temp\harrowmentbinary
MD5:75390F544D2FB14C31DB016DE0879D6C
SHA256:7482DE9C6B4D5C2D64E0336C28AB219B8114042577781754B0A9DF84A4019DD9
6944WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERC073.tmp.dmpbinary
MD5:D0F41238607415864F404DD537DA3B34
SHA256:8DE93BE13E91ACAB44352E39A585D357990027F59017EC8362B41AF0EFA1D786
5324PO240145.exeC:\Users\admin\AppData\Local\Temp\autB94F.tmpbinary
MD5:75390F544D2FB14C31DB016DE0879D6C
SHA256:7482DE9C6B4D5C2D64E0336C28AB219B8114042577781754B0A9DF84A4019DD9
5324PO240145.exeC:\Users\admin\AppData\Local\Temp\autB97F.tmpbinary
MD5:1CD7661EEAEA22F651EAC29704DC1834
SHA256:DF159720542F5A0CAC32FED8C76A1D24896A9BB467ADE1496343F40E78EF14B3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
23
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
8060
SIHClient.exe
GET
200
23.218.209.163:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
8060
SIHClient.exe
GET
200
23.218.209.163:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
20.190.159.75:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
40.113.103.199:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3008
backgroundTaskHost.exe
2.23.227.215:443
www.bing.com
Ooredoo Q.S.C.
QA
whitelisted
2040
backgroundTaskHost.exe
20.74.47.205:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
2040
backgroundTaskHost.exe
20.31.169.57:443
fd.api.iris.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2112
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7248
backgroundTaskHost.exe
20.74.47.205:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
whitelisted
google.com
  • 142.250.184.206
whitelisted
login.live.com
  • 20.190.159.75
  • 40.126.31.130
  • 40.126.31.73
  • 20.190.159.2
  • 20.190.159.68
  • 40.126.31.67
  • 40.126.31.3
  • 40.126.31.131
whitelisted
client.wns.windows.com
  • 40.113.103.199
whitelisted
www.bing.com
  • 2.23.227.215
  • 2.23.227.208
whitelisted
arc.msn.com
  • 20.74.47.205
whitelisted
fd.api.iris.microsoft.com
  • 20.31.169.57
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
www.microsoft.com
  • 23.218.209.163
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted

Threats

No threats detected
No debug info