File name:

709876765465.exe

Full analysis: https://app.any.run/tasks/57c194ad-3520-4b17-a2a8-5c2210f44f4d
Verdict: Malicious activity
Threats:

FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus.

Analysis date: August 28, 2024, 10:34:23
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
fileshare
formbook
xloader
stealer
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

439D5A4D54504632D364F1EE9E8ACD43

SHA1:

827DE52F9FE961DC531F0688CA3CF15BA7AC8625

SHA256:

3DB983F5BBEFB35BDCDA7168BD4C17B5D2766A2997C1E67941A8244BC8399B94

SSDEEP:

49152:P2RzhA68pnuXHPZYbVwPcIN/CANKCHykIsb58B9uZzAk7E:+x8SwexNBykIq8B9uZzZ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • FORMBOOK has been detected (YARA)

      • grpconv.exe (PID: 2728)
    • Actions looks like stealing of personal data

      • grpconv.exe (PID: 2728)
    • Stealers network behavior

      • explorer.exe (PID: 4552)
    • FORMBOOK has been detected (SURICATA)

      • explorer.exe (PID: 4552)
    • Connects to the CnC server

      • explorer.exe (PID: 4552)
  • SUSPICIOUS

    • Drops the executable file immediately after the start

      • 709876765465.exe (PID: 2456)
    • Reads security settings of Internet Explorer

      • 709876765465.exe (PID: 2456)
    • There is functionality for taking screenshot (YARA)

      • 709876765465.exe (PID: 2456)
    • Contacting a server suspected of hosting an CnC

      • explorer.exe (PID: 4552)
  • INFO

    • Reads the computer name

      • 709876765465.exe (PID: 2456)
    • Reads the machine GUID from the registry

      • 709876765465.exe (PID: 2456)
    • Attempting to use file storage service

      • 709876765465.exe (PID: 2456)
    • Checks supported languages

      • 709876765465.exe (PID: 2456)
    • Checks proxy server information

      • 709876765465.exe (PID: 2456)
    • Reads the software policy settings

      • 709876765465.exe (PID: 2456)
      • slui.exe (PID: 6812)
    • Reads security settings of Internet Explorer

      • grpconv.exe (PID: 2728)
    • Manual execution by a user

      • grpconv.exe (PID: 2728)
    • Create files in a temporary directory

      • grpconv.exe (PID: 2728)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Formbook

(PID) Process(2728) grpconv.exe
C2www.yedurrum.xyz
Strings (159)2Be2tATGCTtzPWIA7pd+qq9l
q6S8+dYoWPA=
uK5f6dq1HPYtHGWLla4T2Aru1w==
f0y2nkRZDDIUqVK2
NFayOMjq9FPCowzlhQ==
eeIjXH6ipwycRYk=
uh2Imj8M8S96OQo=
xZhPiUjPjOrXzh7G1c3nJj+mdEtF
VWXSEgDMJf4hMMo=
pYyMe+LAzJA=
0YyrTsx7DOhedwUolg==
tyY75hB1Hn5Jef9jKMnaCVhyzYp7
sxMjfD1YjRx2AZvEG6cSp5fVlEA8
wQI9w1i5hRM+zYMBXAw4rlNX
YGAuy/kn2C6hF/MZG48=
oerlHcFPvmCV9w6V+7ZN44N7Klc=
/qowLWRTihd1y7ZY0U4EsYgcgXY=
oRTp99+WR2IQ1b8zm0hCCPu5pgg=
xuMnzTUsGIAqwMM/Wg==
HAafzSWOPbPA59Rw3dQ=
alnO3qI+XjA+w67Qcn0Xg8h0N0g=
UCL/N7hhNtbhcGEn9yYT
J2nZRqNJivQyK4Dk46s=
hfky8gqIvBQwLyK6FChvag==
MaDUs1Z67gImIcm/ze98p/BONN8=
YtgWk5AHQ8arjUPyIRA=
aDA8zfIndWUP99w=
bkhPZcwJU/c3OaJUjTE=
o0AFgFGJQEGbDmAj0ro=
3sYlF1awQx+56SQiVQ==
B1zDaLGYcMy5AQ==
tHOReRZZDAN/2g==
fhGnCeSAAVtr7uefClFxGZAV
ckzYGFJl5n2jKLWszQ==
WEYEL4ZWDOJUvo/8a2Q=
6nTUUtgE6MwxASeY
Fj1l4KOmRP9PtZiPLFs42VtOS2mi
H6/7I5pqnps0eYkS7Q==
l9mrCBmenzE70GjROywXxtH/x80=
0ECjd6/SoTI7zrasA7w=
wHB+io0VentCoZI=
LB7CYEqbtXT9+wHnyDIJ
rDyii/5oR4YQRQc=
5jsR3g/3mGutKRG8zYe2AXyZdoM=
cGdlW3BD70UdiadEZw==
XdVXUlzH4TDWw03DjpxWLaHS
mnKaa1ctlKt/na066xeeEE44iQ==
dkjj+0NccJg5cg==
EjEAKMlbwPSIFkLEm+4ASA==
M5CpuYeQJt7rK4E=
+DzWVGihmzV/ZYw=
0sHxgG0iZz417NlwBA==
T76+3cThDaNaTQ==
xSxh5ThEoBZjQEMAPh+3DL66Rw==
mJGgyo+jFf2+oYOo
M1/ciCI0adaHlQ==
ArxkiI+l5kvtVpAU21g=
DUaiPYTa3ckCpYc=
2NH61ZGp2x+SLNlbWmZbcf9H
qq9tKLqbxHum
UQELqNQ5GM5dcnMQ+fXNcoxYrEQ=
j2+Cegmq4BcWkdc=
WLrZp0UVD7F0
MgWwaeMkSyrP1FmoT//xx2Dt
pu2jiAwmrPifypepdJw5ww==
grpconv.exe
cscript.exe
at.exe
ipconfig.exe
typeperf.exe
ARP.EXE
RmClient.exe
dvdplay.exe
makecab.exe
psr.exe
msinfo32.exe
dialer.exe
kernel32.dll
advapi32.dll
ws2_32.dll
USERNAME
LOCALAPPDATA
USERPROFILE
APPDATA
TEMP
COMPUTERNAME
ProgramFiles
/c copy "
\Run
\Policies
\Explorer
\Registry\User
\Registry\Machine
\SOFTWARE\Microsoft\Windows\CurrentVersion
Office\15.0\Outlook\Profiles\Outlook\
\SOFTWARE\Mozilla\Mozilla
\Mozilla
Username:
Password:
formSubmitURL
usernameField
encryptedUsername
encryptedPassword
\logins.json
\Mail\
\Foxmail
\Storage\
\Accounts\Account.rec0
\Data\AccCfg\Accounts.tdat
\Google\Chrome\User Data\Default\Login Data
SeShutdownPrivilege
\BaseNamedObjects
POST
HTTP/1.1
Host:
Connection: close
Content-Length:
Cache-Control:
Origin: http://
Content-Type: application/x-www-form-urlencoded
Accept:
Referer: http://
Accept-Language:
Accept-Encoding:
Set-ExecutionPolicy RemoteSigned -Scope CurrentUser
PowerShell.exe
\Opera Software\Opera Stable
kernel32.dll
user32.dll
wininet.dll
rg.ini
Recovery
profiles.ini
guid
Connection: close
pass
token
email
login
signin
account
persistent
GET
GET
PUT
POST
OPTIONS
User-Agent:
API-
MS-W
_301 Moved
_302 Found
InternetOpenA
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetReadFile
InternetCloseHandle
No Malware configuration.

TRiD

.exe | Win32 Executable Borland Delphi 7 (89.1)
.exe | InstallShield setup (5.7)
.exe | Win32 Executable Delphi generic (1.9)
.scr | Windows screen saver (1.7)
.exe | Win32 Executable (generic) (0.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1992:06:19 22:22:17+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 648704
InitializedDataSize: 894464
UninitializedDataSize: -
EntryPoint: 0x9f7ec
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
8
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start THREAT 709876765465.exe sndvol.exe no specs sppextcomobj.exe no specs slui.exe #FORMBOOK grpconv.exe slui.exe no specs #FORMBOOK explorer.exe firefox.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1636C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2456"C:\Users\admin\AppData\Local\Temp\709876765465.exe" C:\Users\admin\AppData\Local\Temp\709876765465.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\709876765465.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
2728"C:\Windows\SysWOW64\grpconv.exe"C:\Windows\SysWOW64\grpconv.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Progman Group Converter
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\grpconv.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
Formbook
(PID) Process(2728) grpconv.exe
C2www.yedurrum.xyz
Strings (159)2Be2tATGCTtzPWIA7pd+qq9l
q6S8+dYoWPA=
uK5f6dq1HPYtHGWLla4T2Aru1w==
f0y2nkRZDDIUqVK2
NFayOMjq9FPCowzlhQ==
eeIjXH6ipwycRYk=
uh2Imj8M8S96OQo=
xZhPiUjPjOrXzh7G1c3nJj+mdEtF
VWXSEgDMJf4hMMo=
pYyMe+LAzJA=
0YyrTsx7DOhedwUolg==
tyY75hB1Hn5Jef9jKMnaCVhyzYp7
sxMjfD1YjRx2AZvEG6cSp5fVlEA8
wQI9w1i5hRM+zYMBXAw4rlNX
YGAuy/kn2C6hF/MZG48=
oerlHcFPvmCV9w6V+7ZN44N7Klc=
/qowLWRTihd1y7ZY0U4EsYgcgXY=
oRTp99+WR2IQ1b8zm0hCCPu5pgg=
xuMnzTUsGIAqwMM/Wg==
HAafzSWOPbPA59Rw3dQ=
alnO3qI+XjA+w67Qcn0Xg8h0N0g=
UCL/N7hhNtbhcGEn9yYT
J2nZRqNJivQyK4Dk46s=
hfky8gqIvBQwLyK6FChvag==
MaDUs1Z67gImIcm/ze98p/BONN8=
YtgWk5AHQ8arjUPyIRA=
aDA8zfIndWUP99w=
bkhPZcwJU/c3OaJUjTE=
o0AFgFGJQEGbDmAj0ro=
3sYlF1awQx+56SQiVQ==
B1zDaLGYcMy5AQ==
tHOReRZZDAN/2g==
fhGnCeSAAVtr7uefClFxGZAV
ckzYGFJl5n2jKLWszQ==
WEYEL4ZWDOJUvo/8a2Q=
6nTUUtgE6MwxASeY
Fj1l4KOmRP9PtZiPLFs42VtOS2mi
H6/7I5pqnps0eYkS7Q==
l9mrCBmenzE70GjROywXxtH/x80=
0ECjd6/SoTI7zrasA7w=
wHB+io0VentCoZI=
LB7CYEqbtXT9+wHnyDIJ
rDyii/5oR4YQRQc=
5jsR3g/3mGutKRG8zYe2AXyZdoM=
cGdlW3BD70UdiadEZw==
XdVXUlzH4TDWw03DjpxWLaHS
mnKaa1ctlKt/na066xeeEE44iQ==
dkjj+0NccJg5cg==
EjEAKMlbwPSIFkLEm+4ASA==
M5CpuYeQJt7rK4E=
+DzWVGihmzV/ZYw=
0sHxgG0iZz417NlwBA==
T76+3cThDaNaTQ==
xSxh5ThEoBZjQEMAPh+3DL66Rw==
mJGgyo+jFf2+oYOo
M1/ciCI0adaHlQ==
ArxkiI+l5kvtVpAU21g=
DUaiPYTa3ckCpYc=
2NH61ZGp2x+SLNlbWmZbcf9H
qq9tKLqbxHum
UQELqNQ5GM5dcnMQ+fXNcoxYrEQ=
j2+Cegmq4BcWkdc=
WLrZp0UVD7F0
MgWwaeMkSyrP1FmoT//xx2Dt
pu2jiAwmrPifypepdJw5ww==
grpconv.exe
cscript.exe
at.exe
ipconfig.exe
typeperf.exe
ARP.EXE
RmClient.exe
dvdplay.exe
makecab.exe
psr.exe
msinfo32.exe
dialer.exe
kernel32.dll
advapi32.dll
ws2_32.dll
USERNAME
LOCALAPPDATA
USERPROFILE
APPDATA
TEMP
COMPUTERNAME
ProgramFiles
/c copy "
\Run
\Policies
\Explorer
\Registry\User
\Registry\Machine
\SOFTWARE\Microsoft\Windows\CurrentVersion
Office\15.0\Outlook\Profiles\Outlook\
\SOFTWARE\Mozilla\Mozilla
\Mozilla
Username:
Password:
formSubmitURL
usernameField
encryptedUsername
encryptedPassword
\logins.json
\Mail\
\Foxmail
\Storage\
\Accounts\Account.rec0
\Data\AccCfg\Accounts.tdat
\Google\Chrome\User Data\Default\Login Data
SeShutdownPrivilege
\BaseNamedObjects
POST
HTTP/1.1
Host:
Connection: close
Content-Length:
Cache-Control:
Origin: http://
Content-Type: application/x-www-form-urlencoded
Accept:
Referer: http://
Accept-Language:
Accept-Encoding:
Set-ExecutionPolicy RemoteSigned -Scope CurrentUser
PowerShell.exe
\Opera Software\Opera Stable
kernel32.dll
user32.dll
wininet.dll
rg.ini
Recovery
profiles.ini
guid
Connection: close
pass
token
email
login
signin
account
persistent
GET
GET
PUT
POST
OPTIONS
User-Agent:
API-
MS-W
_301 Moved
_302 Found
InternetOpenA
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetReadFile
InternetCloseHandle
4552C:\WINDOWS\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\aepic.dll
c:\windows\system32\oleaut32.dll
5556C:\Windows\System32\SndVol.exeC:\Windows\SysWOW64\SndVol.exe709876765465.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Volume Mixer
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\sndvol.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\gdi32.dll
6156C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
6812"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7104"C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exegrpconv.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
123.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\bcrypt.dll
c:\program files\mozilla firefox\vcruntime140.dll
c:\program files\mozilla firefox\vcruntime140_1.dll
Total events
3 140
Read events
3 136
Write events
4
Delete events
0

Modification events

(PID) Process:(5556) SndVol.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\3c\52C64B7E
Operation:writeName:@%SystemRoot%\System32\AudioSrv.Dll,-202
Value:
System Sounds
(PID) Process:(2728) grpconv.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2728) grpconv.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2728) grpconv.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
0
Suspicious files
2
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
2728grpconv.exeC:\Users\admin\AppData\Local\Temp\n20vz2Hbinary
MD5:A45465CDCDC6CB30C8906F3DA4EC114C
SHA256:4412319EF944EBCCA9581CBACB1D4E1DC614C348D1DFC5D2FAAAAD863D300209
4552explorer.exeC:\Users\admin\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.datbinary
MD5:E49C56350AEDF784BFE00E444B879672
SHA256:A8BD235303668981563DFB5AAE338CB802817C4060E2C199B7C84901D57B7E1E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
37
DNS requests
23
Threats
8

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6592
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2032
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4552
explorer.exe
GET
200
15.197.148.33:80
http://www.onemuslimmentors.xyz/3ay4/?5MlcX=PuBQ/hOdVJANNwUQzzdTEa+zkfApgSPKgEqDhBASYMURWxyMHIenPOgyajIMF/2zFWCzDmFiAIipEGyvhu7lGIZ3uwKKI5hn/osEOZl7WYEWFX1qFNsVx3O0uQfdTiGVfqlqZ/M=&UL=LYn3etab
unknown
whitelisted
4552
explorer.exe
POST
404
162.0.213.72:80
http://www.hawalaz.xyz/ercr/
unknown
4552
explorer.exe
POST
404
162.0.213.72:80
http://www.hawalaz.xyz/ercr/
unknown
4552
explorer.exe
POST
404
162.0.213.72:80
http://www.hawalaz.xyz/ercr/
unknown
6592
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
4552
explorer.exe
POST
404
162.0.213.72:80
http://www.hawalaz.xyz/ercr/
unknown
4552
explorer.exe
POST
404
162.0.213.72:80
http://www.hawalaz.xyz/ercr/
unknown
4552
explorer.exe
GET
404
162.0.213.72:80
http://www.hawalaz.xyz/ercr/?5MlcX=MSINn22QncKT0sdefUNeJjHPJv4lmk6ZQ+eYCiR8SH8EueCYvtnhwzQH0TyPiANX6bqGZKwq9sS8LmmoRu0orcgQeqMqVuiTVqmfHt+Sxzz1gLMhFITNWmQPzi7RQgnRMgrGLn0=&UL=LYn3etab
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
1404
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2120
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6224
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6224
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2456
709876765465.exe
13.107.139.11:443
onedrive.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
shared
2456
709876765465.exe
13.107.42.12:443
phky3a.bn.files.1drv.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
3260
svchost.exe
40.115.3.253:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2120
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2032
svchost.exe
40.126.29.8:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
  • 52.183.220.149
whitelisted
google.com
  • 142.250.185.142
whitelisted
onedrive.live.com
  • 13.107.139.11
  • 13.107.137.11
shared
phky3a.bn.files.1drv.com
  • 13.107.42.12
whitelisted
client.wns.windows.com
  • 40.115.3.253
  • 40.113.103.199
whitelisted
login.live.com
  • 40.126.29.8
  • 20.190.157.11
  • 40.126.29.13
  • 40.126.29.15
  • 40.126.29.9
  • 40.126.29.14
  • 40.126.29.6
  • 40.126.29.12
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
slscr.update.microsoft.com
  • 40.68.123.157
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted

Threats

PID
Process
Class
Message
Not Suspicious Traffic
INFO [ANY.RUN] Downloading from a file sharing service is observed
Malware Command and Control Activity Detected
ET MALWARE FormBook CnC Checkin (GET) M5
A Network Trojan was detected
STEALER [ANY.RUN] Formbook HTTP Header
A Network Trojan was detected
STEALER [ANY.RUN] Formbook HTTP Header
A Network Trojan was detected
STEALER [ANY.RUN] Formbook HTTP Header
Malware Command and Control Activity Detected
ET MALWARE FormBook CnC Checkin (GET) M5
2 ETPRO signatures available at the full report
No debug info