| File name: | obizx.exe |
| Full analysis: | https://app.any.run/tasks/6c462f71-73e9-4a9c-95ee-bff2644ad5b2 |
| Verdict: | Malicious activity |
| Threats: | FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus. |
| Analysis date: | October 24, 2023, 16:55:37 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows |
| MD5: | 2AE5024147F938D7AD4BFA641185B8A2 |
| SHA1: | 57B2354E30DB76B3117A4B66C8F6799B60712898 |
| SHA256: | 2EADBBB63C8C36C588958484AD8D5A044A689F72EA3CC81A9DCF4B1A829FF7E9 |
| SSDEEP: | 12288:MSRpYK2LTwmolPMwpzjCtIb+Jehw938bmibUBE/P4:NuTwhPTjJbk938nbUBEH |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (63.1) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (23.8) |
| .dll | | | Win32 Dynamic Link Library (generic) (5.6) |
| .exe | | | Win32 Executable (generic) (3.8) |
| .exe | | | Generic Win/DOS Executable (1.7) |
| AssemblyVersion: | 0.0.0.0 |
|---|---|
| ProductVersion: | 0.0.0.0 |
| OriginalFileName: | TBZo.exe |
| LegalCopyright: | |
| InternalName: | TBZo.exe |
| FileVersion: | 0.0.0.0 |
| FileDescription: | |
| CharacterSet: | Unicode |
| LanguageCode: | Neutral |
| FileSubtype: | - |
| ObjectFileType: | Executable application |
| FileOS: | Win32 |
| FileFlags: | (none) |
| FileFlagsMask: | 0x003f |
| ProductVersionNumber: | 0.0.0.0 |
| FileVersionNumber: | 0.0.0.0 |
| Subsystem: | Windows GUI |
| SubsystemVersion: | 4 |
| ImageVersion: | - |
| OSVersion: | 4 |
| EntryPoint: | 0xc056e |
| UninitializedDataSize: | - |
| InitializedDataSize: | 8704 |
| CodeSize: | 779776 |
| LinkerVersion: | 48 |
| PEType: | PE32 |
| ImageFileCharacteristics: | Executable, 32-bit |
| TimeStamp: | 2023:10:24 08:45:20+00:00 |
| MachineType: | Intel 386 or later, and compatibles |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 844 | "C:\Users\admin\AppData\Local\Temp\obizx.exe" | C:\Users\admin\AppData\Local\Temp\obizx.exe | — | obizx.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: Exit code: 0 Version: 0.0.0.0 Modules
| |||||||||||||||
| 1944 | C:\Windows\Explorer.EXE | C:\Windows\explorer.exe | — | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2220 | "C:\Users\admin\AppData\Local\Temp\obizx.exe" | C:\Users\admin\AppData\Local\Temp\obizx.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: Exit code: 0 Version: 0.0.0.0 Modules
| |||||||||||||||
| 2444 | /c del "C:\Users\admin\AppData\Local\Temp\obizx.exe" | C:\Windows\SysWOW64\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2448 | "C:\Windows\SysWOW64\cmd.exe" | C:\Windows\SysWOW64\cmd.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
Formbook(PID) Process(2448) cmd.exe C2www.gaoxiba150.com/oy30/ Strings (79)USERNAME LOCALAPPDATA USERPROFILE APPDATA TEMP ProgramFiles CommonProgramFiles ALLUSERSPROFILE /c copy " /c del " \Run \Policies \Explorer \Registry\User \Registry\Machine \SOFTWARE\Microsoft\Windows\CurrentVersion Office\15.0\Outlook\Profiles\Outlook\ NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\ \SOFTWARE\Mozilla\Mozilla \Mozilla Username: Password: formSubmitURL usernameField encryptedUsername encryptedPassword \logins.json \signons.sqlite \Microsoft\Vault\ SELECT encryptedUsername, encryptedPassword, formSubmitURL FROM moz_logins \Google\Chrome\User Data\Default\Login Data SELECT origin_url, username_value, password_value FROM logins .exe .com .scr .pif .cmd .bat ms win gdi mfc vga igfx user help config update regsvc chkdsk systray audiodg certmgr autochk taskhost colorcpl services IconCache ThumbCache Cookies SeDebugPrivilege SeShutdownPrivilege \BaseNamedObjects config.php POST HTTP/1.1 Host: Connection: close Content-Length: Cache-Control: no-cache Origin: http:// User-Agent: Mozilla Firefox/4.0 Content-Type: application/x-www-form-urlencoded Accept: */* Referer: http:// Accept-Language: en-US Accept-Encoding: gzip, deflate
dat= f-start f-end Decoy C2 (64)rfc234.top danielcavalari.com elperegrinocabo.com aryor.info surelistening.com premium-numero-telf.buzz orlynyml.click tennislovers-ro.com holdmytracker.com eewapay.com jaimesinstallglass.com damactrade.net swapspecialities.com perfumesrffd.today salesfactory.pro supportive-solutions.com naiol.com khoyr.com kalendeargpt44.com web-tech-spb.store lodjireal.online ultraflooringmore.com iwantbundles.com theroofer.lat qwxry.fun faserfreunde.com body-for-living.com welnessfit.com clublucky.store nlast.cyou gkoders.com okxmttwa.click nodesofty.com alemania-paredes.com travel-insuranceprice.shop thechaay.com formulavsupplements.com gstringtheory.com ruopenai.com evi-based.com danleugers.com lojinhaevelyn.com denzaimivsem.buzz izmn2vd8.click asliy.top kawitrack.com brandiai.com ssssne.com asianewsgood.online proloop.work dhikaedwina.com onemarinallc.com realmpabq.com boswells.biz jpxiaoxi.top ishirink.com thundershorts.com rainydayroofs.com atatra.com hftroi.xyz fundamentplus.com gsvaedpzugtdn.com mic-reform.info vacuumbagsuppliers.com | |||||||||||||||
| (PID) Process: | (1944) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{01979c6a-42fa-414c-b8aa-eee2c8202018}.check.100 |
| Operation: | write | Name: | CheckSetting |
Value: 01000000D08C9DDF0115D1118C7A00C04FC297EB01000000088AF72B0747534094337F63DE35C94A00000000020000000000106600000001000020000000AED9F7A034803824C8B1E828E6ACF7A63C03C62037EFED43278AD26DABE640A1000000000E8000000002000020000000AB5403F7CEBF10DFE341ABEBBEE1A84444EBC55972843D61F9FD20F3F0EABE92B0000000FC067D59D0357C58872FB611AE92F67CAF2B1FDF280A6E076A7077808FDF9D6902A616185711F2BC394A2B6D44B08968CB658980494D87797413D932F0415C59BCEE2F408C91017ECA1A09CFF46B78A1DDEB7B1A1E3900CE68E46CBA92E3449C11FF6689058BD2FEA4CC617DA5D154EC67F4E85B3C7D41EDD704426CE486FED6952A1CDA27E0F58502A85DA834FC59F375E4A11757B352567CADFEF8F2BB497E437086EEA56B957D31DAA98C7F678CCB4000000048300250278A78A5D4898CA43F5197F9B50DF81CBC35B6CAA716E6F42642EECD0299AF2C0B69703D12B9CACBDB5AD7A7001D20D662BA32D05CD6D99A1234653A | |||
| (PID) Process: | (1944) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0 |
| Operation: | write | Name: | CheckSetting |
Value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| |||
| (PID) Process: | (1944) explorer.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\156\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1944 | explorer.exe | GET | — | 43.228.76.51:80 | http://www.gaoxiba150.com/oy30/?BZR8IL=3psgububiWTTQunP4gRCFhBDvSuk2GZQgU9iWNF+aDcrgxeN3AJ9p0zfG/CNzlPYsuhlRQ==&VRKh=vBZtYF2pqZPtGB | unknown | — | — | unknown |
1944 | explorer.exe | GET | 301 | 172.67.148.168:80 | http://www.perfumesrffd.today/oy30/?BZR8IL=e+vA4+Bu8AyNm/CUMTDf2HLyVoOJsRW85VAlDIz1zCcs9wFx6UomqqUjaFUZxrmTnOiDuQ==&VRKh=vBZtYF2pqZPtGB | unknown | — | — | unknown |
1944 | explorer.exe | GET | 301 | 23.21.157.88:80 | http://www.atatra.com/oy30/?BZR8IL=paQ8EKup3yowvW8lSCI4JbC3pAjW3e+Ya2ilda1fS7U31g9G0G69nmEaF2xsiXSQ69BwcA==&VRKh=vBZtYF2pqZPtGB | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1956 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
324 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
1944 | explorer.exe | 43.228.76.51:80 | www.gaoxiba150.com | CHINANET Yunnan province IDC1 network | CN | malicious |
1944 | explorer.exe | 172.67.148.168:80 | www.perfumesrffd.today | CLOUDFLARENET | US | unknown |
1944 | explorer.exe | 23.21.157.88:80 | www.atatra.com | AMAZON-AES | US | unknown |
Domain | IP | Reputation |
|---|---|---|
www.gaoxiba150.com |
| unknown |
www.perfumesrffd.today |
| unknown |
www.atatra.com |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
1944 | explorer.exe | Malware Command and Control Activity Detected | ET MALWARE FormBook CnC Checkin (GET) |