| File name: | newfbb.exe |
| Full analysis: | https://app.any.run/tasks/a3a6f03d-4fc8-44f7-a0b1-0e9b0db0fd00 |
| Verdict: | Malicious activity |
| Threats: | FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus. |
| Analysis date: | August 24, 2020, 05:05:34 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows |
| MD5: | 0AE0383021C3B664265DE1CD7E84C634 |
| SHA1: | 668BE035C8D8052A74487921316225693D91CBA5 |
| SHA256: | 266173912D87D7F018591EC2793855E2828C8E1951BBDAAEA1189DA8E0BF58A1 |
| SSDEEP: | 12288:9AQzKhk2QYteJjqdSbJWEjSzl/oYa7TbsT6u9y5jWJd4w6G:uQzNBqiIEjSzto+euWyJOwN |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (72.2) |
|---|---|---|
| .scr | | | Windows screen saver (12.9) |
| .dll | | | Win32 Dynamic Link Library (generic) (6.4) |
| .exe | | | Win32 Executable (generic) (4.4) |
| .exe | | | Generic Win/DOS Executable (1.9) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2020:08:23 13:03:50+02:00 |
| PEType: | PE32 |
| LinkerVersion: | 8 |
| CodeSize: | 572416 |
| InitializedDataSize: | 1024 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x8db7e |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 23-Aug-2020 11:03:50 |
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x00000080 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 3 |
| Time date stamp: | 23-Aug-2020 11:03:50 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00002000 | 0x0008BB84 | 0x0008BC00 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.86543 |
.rsrc | 0x0008E000 | 0x00000010 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 0.0203931 |
.reloc | 0x00090000 | 0x0000000C | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.10191 |
mscoree.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 352 | C:\Windows\Explorer.EXE | C:\Windows\explorer.exe | — | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1672 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | — | newfbb.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET Assembly Registration Utility Exit code: 0 Version: 4.7.3062.0 built by: NET472REL1 Modules
| |||||||||||||||
| 2280 | /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" | C:\Windows\System32\cmd.exe | — | rdpclip.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2552 | "C:\Program Files\Mozilla Firefox\Firefox.exe" | C:\Program Files\Mozilla Firefox\Firefox.exe | rdpclip.exe | ||||||||||||
User: admin Company: Mozilla Corporation Integrity Level: MEDIUM Description: Firefox Exit code: 0 Version: 68.0.1 Modules
| |||||||||||||||
| 2900 | C:\Windows\system32\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09} | C:\Windows\system32\DllHost.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: COM Surrogate Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3088 | "C:\Users\admin\AppData\Local\Temp\newfbb.exe" | C:\Users\admin\AppData\Local\Temp\newfbb.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 3220 | "C:\Program Files\M_df4an\helprnw.exe" | C:\Program Files\M_df4an\helprnw.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET Assembly Registration Utility Exit code: 0 Version: 4.7.3062.0 built by: NET472REL1 Modules
| |||||||||||||||
| 3420 | "C:\Windows\System32\rdpclip.exe" | C:\Windows\System32\rdpclip.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: RDP Clip Monitor Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (3420) rdpclip.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | HBCLANLPB0P |
Value: C:\Program Files\M_df4an\helprnw.exe | |||
| (PID) Process: | (3420) rdpclip.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (3420) rdpclip.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (3420) rdpclip.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (352) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count |
| Operation: | write | Name: | {7P5N40RS-N0SO-4OSP-874N-P0S2R0O9SN8R}\Z_qs4na\uryceaj.rkr |
Value: 0000000000000000000000006D000000000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BFFFFFFFFF000000000000000000000000 | |||
| (PID) Process: | (352) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count |
| Operation: | write | Name: | HRZR_PGYFRFFVBA |
Value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| |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3420 | rdpclip.exe | C:\Users\admin\AppData\Roaming\N58BBOB9\N58logrc.ini | binary | |
MD5:— | SHA256:— | |||
| 3420 | rdpclip.exe | C:\Users\admin\AppData\Roaming\N58BBOB9\N58logim.jpeg | image | |
MD5:— | SHA256:— | |||
| 2552 | Firefox.exe | C:\Users\admin\AppData\Roaming\N58BBOB9\N58logrf.ini | binary | |
MD5:— | SHA256:— | |||
| 3420 | rdpclip.exe | C:\Users\admin\AppData\Roaming\N58BBOB9\N58logrv.ini | binary | |
MD5:BA3B6BC807D4F76794C4B81B09BB9BA5 | SHA256:6EEBF968962745B2E9DE2CA969AF7C424916D4E3FE3CC0BB9B3D414ABFCE9507 | |||
| 2900 | DllHost.exe | C:\Program Files\M_df4an\helprnw.exe | executable | |
MD5:B58B926C3574D28D5B7FDD2CA3EC30D5 | SHA256:6E70B56D748C4CCAB13CC8A055D3795EA0DD95FE3B70568D7D3AC0C6621140A3 | |||
| 352 | explorer.exe | C:\Users\admin\AppData\Local\Temp\M_df4an\helprnw.exe | executable | |
MD5:B58B926C3574D28D5B7FDD2CA3EC30D5 | SHA256:6E70B56D748C4CCAB13CC8A055D3795EA0DD95FE3B70568D7D3AC0C6621140A3 | |||
| 3420 | rdpclip.exe | C:\Users\admin\AppData\Roaming\N58BBOB9\N58logri.ini | binary | |
MD5:D63A82E5D81E02E399090AF26DB0B9CB | SHA256:EAECE2EBA6310253249603033C744DD5914089B0BB26BDE6685EC9813611BAAE | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
352 | explorer.exe | GET | 302 | 103.224.212.219:80 | http://www.megaszafa.com/pw4/?4h=YwlOD/FODBPAUlss7hWJl532i1W526Wzy5OkTg4XpM7zGRtYnSxGHUTaD94hwEscFA2Lkw==&svf=lx4pYz9H0Vstrtj | AU | — | — | malicious |
352 | explorer.exe | GET | — | 154.220.64.37:80 | http://www.tdapic.com/pw4/?4h=Qb4ZjZu7j/+Hpv2zC6MzyIs3bnLw/Z7PAFyolGSlU3wUJF5Nk2Pc72h4a6TM7UHJOyB7pw==&svf=lx4pYz9H0Vstrtj&sql=1 | US | — | — | malicious |
352 | explorer.exe | GET | 301 | 66.34.165.5:80 | http://www.tellerenergy.com/pw4/?4h=G1AhYH86nzlQpypio8eoKi+ko6SyKYblDd4arxndiKjLyI0YwZzPBcD/8HHD0Ib3hoINig==&svf=lx4pYz9H0Vstrtj&sql=1 | US | — | — | malicious |
352 | explorer.exe | GET | — | 207.148.248.143:80 | http://www.happyconstruction.com/pw4/?4h=eTCVewnnEvA0Cv2qYse7fJjyb/GfoMjNgKe7yvUQzoqNCyU3OMocLKsK8291c2UQsehh9g==&svf=lx4pYz9H0Vstrtj&sql=1 | US | — | — | malicious |
352 | explorer.exe | GET | — | 102.38.205.236:80 | http://www.shwodan.com/pw4/?4h=g6/YdrsyDnHC7kt/kOWhqm1PDx5G/2yW0wdcplCMa4h9Yi5o07oSDrVsNfDOoLNAYMoYFA==&svf=lx4pYz9H0Vstrtj&sql=1 | unknown | — | — | malicious |
352 | explorer.exe | POST | — | 154.220.64.37:80 | http://www.tdapic.com/pw4/ | US | — | — | malicious |
352 | explorer.exe | POST | — | 154.220.64.37:80 | http://www.tdapic.com/pw4/ | US | — | — | malicious |
352 | explorer.exe | POST | — | 154.220.64.37:80 | http://www.tdapic.com/pw4/ | US | — | — | malicious |
352 | explorer.exe | POST | — | 66.34.165.5:80 | http://www.tellerenergy.com/pw4/ | US | — | — | malicious |
352 | explorer.exe | POST | — | 66.34.165.5:80 | http://www.tellerenergy.com/pw4/ | US | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
352 | explorer.exe | 103.224.212.219:80 | www.megaszafa.com | Trellian Pty. Limited | AU | malicious |
352 | explorer.exe | 154.220.64.37:80 | www.tdapic.com | MULTACOM CORPORATION | US | malicious |
352 | explorer.exe | 66.34.165.5:80 | www.tellerenergy.com | CoreSpace, Inc. | US | malicious |
352 | explorer.exe | 207.148.248.143:80 | www.happyconstruction.com | The Endurance International Group, Inc. | US | malicious |
352 | explorer.exe | 102.38.205.236:80 | www.shwodan.com | — | — | malicious |
352 | explorer.exe | 51.222.40.119:80 | www.northdallasdigitalservices.com | — | GB | malicious |
352 | explorer.exe | 66.235.172.244:80 | www.survivalassist.info | HopOne Internet Corporation | US | malicious |
— | — | 66.235.172.244:80 | www.survivalassist.info | HopOne Internet Corporation | US | malicious |
Domain | IP | Reputation |
|---|---|---|
www.countryluvindoodles.com |
| unknown |
www.mhlcqt.men |
| unknown |
www.sapatoexpress.com |
| unknown |
www.torrent-games24.com |
| unknown |
www.retirewithequis.com |
| unknown |
www.megaszafa.com |
| malicious |
www.tdapic.com |
| malicious |
www.tellerenergy.com |
| malicious |
www.happyconstruction.com |
| malicious |
www.northdallasdigitalservices.com |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
352 | explorer.exe | A Network Trojan was detected | SPYWARE [PTsecurity] FormBook |
352 | explorer.exe | A Network Trojan was detected | SPYWARE [PTsecurity] FormBook |
352 | explorer.exe | A Network Trojan was detected | SPYWARE [PTsecurity] FormBook |
352 | explorer.exe | A Network Trojan was detected | SPYWARE [PTsecurity] FormBook |
352 | explorer.exe | A Network Trojan was detected | SPYWARE [PTsecurity] FormBook |
352 | explorer.exe | A Network Trojan was detected | SPYWARE [PTsecurity] FormBook |
352 | explorer.exe | A Network Trojan was detected | SPYWARE [PTsecurity] FormBook |
352 | explorer.exe | A Network Trojan was detected | SPYWARE [PTsecurity] FormBook |
352 | explorer.exe | A Network Trojan was detected | SPYWARE [PTsecurity] FormBook |
352 | explorer.exe | A Network Trojan was detected | SPYWARE [PTsecurity] FormBook |