File name:

3292e1e7d47f2ed5373710b82bf753da5b09a778c5461a0ce504b2a189475670.exe

Full analysis: https://app.any.run/tasks/d1a7f33d-a610-4e1a-bb39-07b3b8c80b5a
Verdict: Malicious activity
Threats:

FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus.

Analysis date: April 29, 2025, 00:33:44
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto
stealer
formbook
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, 3 sections
MD5:

BE0DFBAF4315140770D06EDA7C63B713

SHA1:

CAA7CCBA0B4394A8ED5D40D4BFEEA683CB7BDA2D

SHA256:

3292E1E7D47F2ED5373710B82BF753DA5B09A778C5461A0CE504B2A189475670

SSDEEP:

24576:tHlMd5NJ7WRR/ezNwvsMDOSAeqO8g7Pqot1/CC4JM7bk1ilHM7EEccN:RlMd5NJ7WRR/eksMDOSAeqO8g7PqOJCL

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • FORMBOOK has been found (auto)

      • 3292e1e7d47f2ed5373710b82bf753da5b09a778c5461a0ce504b2a189475670.exe (PID: 4652)
  • SUSPICIOUS

    • Executes application which crashes

      • 3292e1e7d47f2ed5373710b82bf753da5b09a778c5461a0ce504b2a189475670.exe (PID: 4652)
  • INFO

    • The sample compiled with english language support

      • 3292e1e7d47f2ed5373710b82bf753da5b09a778c5461a0ce504b2a189475670.exe (PID: 4652)
    • Checks supported languages

      • 3292e1e7d47f2ed5373710b82bf753da5b09a778c5461a0ce504b2a189475670.exe (PID: 4652)
    • Reads mouse settings

      • 3292e1e7d47f2ed5373710b82bf753da5b09a778c5461a0ce504b2a189475670.exe (PID: 4652)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 4008)
    • Create files in a temporary directory

      • 3292e1e7d47f2ed5373710b82bf753da5b09a778c5461a0ce504b2a189475670.exe (PID: 4652)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (39.3)
.exe | Win32 EXE Yoda's Crypter (38.6)
.dll | Win32 Dynamic Link Library (generic) (9.5)
.exe | Win32 Executable (generic) (6.5)
.exe | Generic Win/DOS Executable (2.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:03:11 05:52:55+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 12
CodeSize: 352256
InitializedDataSize: 372736
UninitializedDataSize: 901120
EntryPoint: 0x132a10
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (British)
CharacterSet: Unicode
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
135
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 3292e1e7d47f2ed5373710b82bf753da5b09a778c5461a0ce504b2a189475670.exe svchost.exe no specs werfault.exe no specs sppextcomobj.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4008C:\WINDOWS\SysWOW64\WerFault.exe -u -p 4652 -s 796C:\Windows\SysWOW64\WerFault.exe3292e1e7d47f2ed5373710b82bf753da5b09a778c5461a0ce504b2a189475670.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
4652"C:\Users\admin\AppData\Local\Temp\3292e1e7d47f2ed5373710b82bf753da5b09a778c5461a0ce504b2a189475670.exe" C:\Users\admin\AppData\Local\Temp\3292e1e7d47f2ed5373710b82bf753da5b09a778c5461a0ce504b2a189475670.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\appdata\local\temp\3292e1e7d47f2ed5373710b82bf753da5b09a778c5461a0ce504b2a189475670.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
5972C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
6028"C:\Users\admin\AppData\Local\Temp\3292e1e7d47f2ed5373710b82bf753da5b09a778c5461a0ce504b2a189475670.exe" C:\Windows\SysWOW64\svchost.exe3292e1e7d47f2ed5373710b82bf753da5b09a778c5461a0ce504b2a189475670.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
6436"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
1 781
Read events
1 781
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
4
Text files
1
Unknown types
1

Dropped files

PID
Process
Filename
Type
4008WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_3292e1e7d47f2ed5_18667447ffed8619b4ee1ca4e36f3ce4e4d9a6_3305f655_23235fdc-8596-48d0-9194-d14578fc04f9\Report.wer
MD5:
SHA256:
4008WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERD294.tmp.dmpdmp
MD5:3FE8D90C4401421082F52CB1A8A848A2
SHA256:B83B10270B6CA2A001EA792EA523AAF325553278460A7784C1116D0353239FFD
46523292e1e7d47f2ed5373710b82bf753da5b09a778c5461a0ce504b2a189475670.exeC:\Users\admin\AppData\Local\Temp\autBDB4.tmpbinary
MD5:E8952852F3CAB95357DF33B79EB9E8A6
SHA256:9155998B8946FDC30F6858B3EF303D887B253802C3E1736BF169818701BF75C7
4008WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERD3FC.tmp.WERInternalMetadata.xmlbinary
MD5:C63C4AB5396CCBE7F7E49AE170140EA8
SHA256:BC17F085C31384FB1456C5537C9AA06BD65C4562AAD1FD876D286F1C8D24A8DA
46523292e1e7d47f2ed5373710b82bf753da5b09a778c5461a0ce504b2a189475670.exeC:\Users\admin\AppData\Local\Temp\unrosinedbinary
MD5:E8952852F3CAB95357DF33B79EB9E8A6
SHA256:9155998B8946FDC30F6858B3EF303D887B253802C3E1736BF169818701BF75C7
4008WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERD43C.tmp.xmlxml
MD5:40A9FDC55414423269C2E370E53E2FCB
SHA256:DC861DF0C02DF63557AF639BDB37C9AFE2C50FAB4897BF3E9063B65034C30FE5
4008WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\3292e1e7d47f2ed5373710b82bf753da5b09a778c5461a0ce504b2a189475670.exe.4652.dmpbinary
MD5:5DEED5E5CF009919445B7B1553634993
SHA256:4EBE4AC3EAA8A75ED58B6E36AEE059EF2DA7E5D907FF66A5E80F60B65FE2F9C5
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
18
DNS requests
12
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.20.245.137:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3096
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
3096
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
2.20.245.137:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.32.74:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
3096
SIHClient.exe
172.202.163.200:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
GB
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.46
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 2.20.245.137
  • 2.20.245.139
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 40.126.32.74
  • 20.190.160.67
  • 20.190.160.17
  • 20.190.160.2
  • 20.190.160.132
  • 40.126.32.140
  • 20.190.160.66
  • 20.190.160.65
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted

Threats

No threats detected
No debug info