File name:

2bd00e0d7cb7e741f8736ede2f6b354c7190e983bc38ca8326f8135b81256055

Full analysis: https://app.any.run/tasks/c065685e-fd2f-4395-b125-f126105908e1
Verdict: Malicious activity
Threats:

FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus.

Analysis date: January 10, 2025, 21:48:09
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
amsi-bypass
formbook
xloader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

3AF13FB92C445D73E1CE763D1400D39C

SHA1:

CF6BD2BE897EB2C40308543F2409F0D26DD84D58

SHA256:

2BD00E0D7CB7E741F8736EDE2F6B354C7190E983BC38CA8326F8135B81256055

SSDEEP:

24576:92Co6S8ypewO8iRQGslEwOSsQEuBEvC+Oa/pr2IJczZa2Oqxlb:92Co6S8ypewO8iZKEwOSsQ3BEvZOa/p0

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Uses Task Scheduler to run other applications

      • 2bd00e0d7cb7e741f8736ede2f6b354c7190e983bc38ca8326f8135b81256055.exe (PID: 6292)
    • FORMBOOK has been detected (YARA)

      • 2bd00e0d7cb7e741f8736ede2f6b354c7190e983bc38ca8326f8135b81256055.exe (PID: 6872)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • 2bd00e0d7cb7e741f8736ede2f6b354c7190e983bc38ca8326f8135b81256055.exe (PID: 6292)
    • Executable content was dropped or overwritten

      • 2bd00e0d7cb7e741f8736ede2f6b354c7190e983bc38ca8326f8135b81256055.exe (PID: 6292)
    • Application launched itself

      • 2bd00e0d7cb7e741f8736ede2f6b354c7190e983bc38ca8326f8135b81256055.exe (PID: 6292)
    • Executes application which crashes

      • 2bd00e0d7cb7e741f8736ede2f6b354c7190e983bc38ca8326f8135b81256055.exe (PID: 6872)
    • Possibly patching Antimalware Scan Interface function (YARA)

      • 2bd00e0d7cb7e741f8736ede2f6b354c7190e983bc38ca8326f8135b81256055.exe (PID: 6292)
  • INFO

    • Creates files or folders in the user directory

      • 2bd00e0d7cb7e741f8736ede2f6b354c7190e983bc38ca8326f8135b81256055.exe (PID: 6292)
    • Checks supported languages

      • 2bd00e0d7cb7e741f8736ede2f6b354c7190e983bc38ca8326f8135b81256055.exe (PID: 6292)
    • Reads the machine GUID from the registry

      • 2bd00e0d7cb7e741f8736ede2f6b354c7190e983bc38ca8326f8135b81256055.exe (PID: 6292)
    • Reads the computer name

      • 2bd00e0d7cb7e741f8736ede2f6b354c7190e983bc38ca8326f8135b81256055.exe (PID: 6292)
    • Reads the software policy settings

      • WerFault.exe (PID: 3144)
    • Create files in a temporary directory

      • 2bd00e0d7cb7e741f8736ede2f6b354c7190e983bc38ca8326f8135b81256055.exe (PID: 6292)
    • Checks proxy server information

      • WerFault.exe (PID: 3144)
    • Process checks computer location settings

      • 2bd00e0d7cb7e741f8736ede2f6b354c7190e983bc38ca8326f8135b81256055.exe (PID: 6292)
    • The process uses the downloaded file

      • 2bd00e0d7cb7e741f8736ede2f6b354c7190e983bc38ca8326f8135b81256055.exe (PID: 6292)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (72.2)
.scr | Windows screen saver (12.9)
.dll | Win32 Dynamic Link Library (generic) (6.4)
.exe | Win32 Executable (generic) (4.4)
.exe | Generic Win/DOS Executable (1.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2055:12:28 05:18:15+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 48
CodeSize: 1007616
InitializedDataSize: 2048
UninitializedDataSize: -
EntryPoint: 0xf7f1e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: Microsoft
FileDescription: EasterIn Corfu
FileVersion: 1.0.0.0
InternalName: EJBjR.exe
LegalCopyright: Copyright © 2024
LegalTrademarks: -
OriginalFileName: EJBjR.exe
ProductName: EasterIn Corfu
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
5
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 2bd00e0d7cb7e741f8736ede2f6b354c7190e983bc38ca8326f8135b81256055.exe schtasks.exe no specs conhost.exe no specs #FORMBOOK 2bd00e0d7cb7e741f8736ede2f6b354c7190e983bc38ca8326f8135b81256055.exe werfault.exe

Process information

PID
CMD
Path
Indicators
Parent process
6292"C:\Users\admin\AppData\Local\Temp\2bd00e0d7cb7e741f8736ede2f6b354c7190e983bc38ca8326f8135b81256055.exe" C:\Users\admin\AppData\Local\Temp\2bd00e0d7cb7e741f8736ede2f6b354c7190e983bc38ca8326f8135b81256055.exe
explorer.exe
User:
admin
Company:
Microsoft
Integrity Level:
MEDIUM
Description:
EasterIn Corfu
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\2bd00e0d7cb7e741f8736ede2f6b354c7190e983bc38ca8326f8135b81256055.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
6808"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ydRhqlPsLsIczR" /XML "C:\Users\admin\AppData\Local\Temp\tmp9A6E.tmp"C:\Windows\SysWOW64\schtasks.exe2bd00e0d7cb7e741f8736ede2f6b354c7190e983bc38ca8326f8135b81256055.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
6816\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeschtasks.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6872"C:\Users\admin\AppData\Local\Temp\2bd00e0d7cb7e741f8736ede2f6b354c7190e983bc38ca8326f8135b81256055.exe"C:\Users\admin\AppData\Local\Temp\2bd00e0d7cb7e741f8736ede2f6b354c7190e983bc38ca8326f8135b81256055.exe
2bd00e0d7cb7e741f8736ede2f6b354c7190e983bc38ca8326f8135b81256055.exe
User:
admin
Company:
Microsoft
Integrity Level:
MEDIUM
Description:
EasterIn Corfu
Exit code:
3221225477
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\2bd00e0d7cb7e741f8736ede2f6b354c7190e983bc38ca8326f8135b81256055.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
3144C:\WINDOWS\SysWOW64\WerFault.exe -u -p 6872 -s 228C:\Windows\SysWOW64\WerFault.exe
2bd00e0d7cb7e741f8736ede2f6b354c7190e983bc38ca8326f8135b81256055.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
Total events
3 561
Read events
3 561
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
6
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
3144WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_2bd00e0d7cb7e741_499c2ef95d99616417ae338c2ee557edcafd622_d23d8256_680698e7-3ba2-4996-afd9-1786dbd03b66\Report.wer
MD5:
SHA256:
3144WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\21253908F3CB05D51B1C2DA8B681A785binary
MD5:F6F53CD09A41E968C363419B279D3112
SHA256:6D2BB01CC7A9BADE2113B219CAC1BDA86B2733196B7E1BD0C807CE1E396B1892
3144WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\37C951188967C8EB88D99893D9D191FEbinary
MD5:FA84E4BCC92AA5DB735AB50711040CDE
SHA256:6D7205E794FDE4219A62D9692ECDDF612663A5CF20399E79BE87B851FCA4CA33
3144WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\21253908F3CB05D51B1C2DA8B681A785binary
MD5:ED8F45DC9AE03EC328C4DD182ECCF860
SHA256:0A306193933338EAA817722A5062A2F6EDDF1D8E85B6B34E72757A58EF7AD6B7
3144WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERFBDA.tmp.xmlxml
MD5:3B5E81B6BE0DDF6CDD0B1807FD4DE86E
SHA256:B05706EACAA61B50DEDED385A21B0AD28A4E3D9F60D60B655BD7B9D7A5860C4E
3144WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERFBAA.tmp.WERInternalMetadata.xmlxml
MD5:E303257DC1EC121B8C143923663A48F6
SHA256:9375FFDA39879E9978882A30CEE57B3D586DE7C566E5DC30DA2408C0484E79B0
3144WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERFB6A.tmp.dmpbinary
MD5:DC8AB800106C0F07882FC02DB28AA611
SHA256:E31246A1897DECC883B2A4456F7089AA5F62EFFAACF00285BBFF35D2DD7B1840
3144WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FEbinary
MD5:CC4540ACDA79063E2926CA17924361B5
SHA256:7F9D11187F7A4E7EEA9BA27A117925A8DE3CBEF6EA5AC3DAF20841DD033AAFBA
62922bd00e0d7cb7e741f8736ede2f6b354c7190e983bc38ca8326f8135b81256055.exeC:\Users\admin\AppData\Local\Temp\tmp9A6E.tmpxml
MD5:8604064ACB5A05D2365D07480C18CC30
SHA256:592D56E405BEA58C272479797A74C6B0734D26FEAC080E450D0ABCA604F5C200
3144WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\2bd00e0d7cb7e741f8736ede2f6b354c7190e983bc38ca8326f8135b81256055.exe.6872.dmpbinary
MD5:A49B11FF5040ABB3618C4452239A869D
SHA256:DA8771A9FB7FE647FCA9FA8FC680F0EF7AE02F7E5D7E6259501AFBFCBA6212B8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
36
DNS requests
20
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1488
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
3144
WerFault.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6392
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
1488
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
3144
WerFault.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5448
svchost.exe
GET
200
23.48.23.194:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5448
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5064
SearchApp.exe
104.126.37.179:443
www.bing.com
Akamai International B.V.
DE
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
648
RUXIMICS.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5448
svchost.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1176
svchost.exe
20.190.159.23:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1176
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
1076
svchost.exe
23.35.238.131:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.78
whitelisted
www.bing.com
  • 104.126.37.179
  • 104.126.37.154
  • 104.126.37.130
  • 104.126.37.152
  • 104.126.37.176
  • 104.126.37.177
  • 104.126.37.128
  • 104.126.37.147
  • 104.126.37.146
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.159.23
  • 20.190.159.68
  • 40.126.31.69
  • 20.190.159.2
  • 20.190.159.75
  • 40.126.31.71
  • 20.190.159.0
  • 20.190.159.64
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.48.23.194
  • 23.48.23.173
  • 23.48.23.156
  • 23.48.23.176
  • 23.48.23.180
  • 23.48.23.166
  • 23.48.23.145
  • 23.48.23.167
  • 23.48.23.164
  • 23.48.23.143
  • 23.48.23.147
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
fd.api.iris.microsoft.com
  • 20.223.36.55
whitelisted

Threats

No threats detected
No debug info