File name: | 709876765465.exe |
Full analysis: | https://app.any.run/tasks/57c194ad-3520-4b17-a2a8-5c2210f44f4d |
Verdict: | Malicious activity |
Threats: | FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus. |
Analysis date: | August 28, 2024, 10:34:23 |
OS: | Windows 10 Professional (build: 19045, 64 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5: | 439D5A4D54504632D364F1EE9E8ACD43 |
SHA1: | 827DE52F9FE961DC531F0688CA3CF15BA7AC8625 |
SHA256: | 3DB983F5BBEFB35BDCDA7168BD4C17B5D2766A2997C1E67941A8244BC8399B94 |
SSDEEP: | 49152:P2RzhA68pnuXHPZYbVwPcIN/CANKCHykIsb58B9uZzAk7E:+x8SwexNBykIq8B9uZzZ |
.exe | | | Win32 Executable Borland Delphi 7 (89.1) |
---|---|---|
.exe | | | InstallShield setup (5.7) |
.exe | | | Win32 Executable Delphi generic (1.9) |
.scr | | | Windows screen saver (1.7) |
.exe | | | Win32 Executable (generic) (0.6) |
MachineType: | Intel 386 or later, and compatibles |
---|---|
TimeStamp: | 1992:06:19 22:22:17+00:00 |
ImageFileCharacteristics: | Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi |
PEType: | PE32 |
LinkerVersion: | 2.25 |
CodeSize: | 648704 |
InitializedDataSize: | 894464 |
UninitializedDataSize: | - |
EntryPoint: | 0x9f7ec |
OSVersion: | 4 |
ImageVersion: | - |
SubsystemVersion: | 4 |
Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1636 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
2456 | "C:\Users\admin\AppData\Local\Temp\709876765465.exe" | C:\Users\admin\AppData\Local\Temp\709876765465.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
2728 | "C:\Windows\SysWOW64\grpconv.exe" | C:\Windows\SysWOW64\grpconv.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Progman Group Converter Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
Formbook(PID) Process(2728) grpconv.exe C2www.yedurrum.xyz Strings (159)2Be2tATGCTtzPWIA7pd+qq9l q6S8+dYoWPA= uK5f6dq1HPYtHGWLla4T2Aru1w== f0y2nkRZDDIUqVK2 NFayOMjq9FPCowzlhQ== eeIjXH6ipwycRYk= uh2Imj8M8S96OQo= xZhPiUjPjOrXzh7G1c3nJj+mdEtF VWXSEgDMJf4hMMo= pYyMe+LAzJA= 0YyrTsx7DOhedwUolg== tyY75hB1Hn5Jef9jKMnaCVhyzYp7 sxMjfD1YjRx2AZvEG6cSp5fVlEA8 wQI9w1i5hRM+zYMBXAw4rlNX YGAuy/kn2C6hF/MZG48= oerlHcFPvmCV9w6V+7ZN44N7Klc= /qowLWRTihd1y7ZY0U4EsYgcgXY= oRTp99+WR2IQ1b8zm0hCCPu5pgg= xuMnzTUsGIAqwMM/Wg== HAafzSWOPbPA59Rw3dQ= alnO3qI+XjA+w67Qcn0Xg8h0N0g= UCL/N7hhNtbhcGEn9yYT J2nZRqNJivQyK4Dk46s= hfky8gqIvBQwLyK6FChvag== MaDUs1Z67gImIcm/ze98p/BONN8= YtgWk5AHQ8arjUPyIRA= aDA8zfIndWUP99w= bkhPZcwJU/c3OaJUjTE= o0AFgFGJQEGbDmAj0ro= 3sYlF1awQx+56SQiVQ== B1zDaLGYcMy5AQ== tHOReRZZDAN/2g== fhGnCeSAAVtr7uefClFxGZAV ckzYGFJl5n2jKLWszQ== WEYEL4ZWDOJUvo/8a2Q= 6nTUUtgE6MwxASeY Fj1l4KOmRP9PtZiPLFs42VtOS2mi H6/7I5pqnps0eYkS7Q== l9mrCBmenzE70GjROywXxtH/x80= 0ECjd6/SoTI7zrasA7w= wHB+io0VentCoZI= LB7CYEqbtXT9+wHnyDIJ rDyii/5oR4YQRQc= 5jsR3g/3mGutKRG8zYe2AXyZdoM= cGdlW3BD70UdiadEZw== XdVXUlzH4TDWw03DjpxWLaHS mnKaa1ctlKt/na066xeeEE44iQ== dkjj+0NccJg5cg== EjEAKMlbwPSIFkLEm+4ASA== M5CpuYeQJt7rK4E= +DzWVGihmzV/ZYw= 0sHxgG0iZz417NlwBA== T76+3cThDaNaTQ== xSxh5ThEoBZjQEMAPh+3DL66Rw== mJGgyo+jFf2+oYOo M1/ciCI0adaHlQ== ArxkiI+l5kvtVpAU21g= DUaiPYTa3ckCpYc= 2NH61ZGp2x+SLNlbWmZbcf9H qq9tKLqbxHum UQELqNQ5GM5dcnMQ+fXNcoxYrEQ= j2+Cegmq4BcWkdc= WLrZp0UVD7F0 MgWwaeMkSyrP1FmoT//xx2Dt pu2jiAwmrPifypepdJw5ww== grpconv.exe cscript.exe at.exe ipconfig.exe typeperf.exe ARP.EXE RmClient.exe dvdplay.exe makecab.exe psr.exe msinfo32.exe dialer.exe kernel32.dll advapi32.dll ws2_32.dll USERNAME LOCALAPPDATA USERPROFILE APPDATA TEMP COMPUTERNAME ProgramFiles /c copy " \Run \Policies \Explorer \Registry\User \Registry\Machine \SOFTWARE\Microsoft\Windows\CurrentVersion Office\15.0\Outlook\Profiles\Outlook\ \SOFTWARE\Mozilla\Mozilla \Mozilla Username: Password: formSubmitURL usernameField encryptedUsername encryptedPassword \logins.json \Mail\ \Foxmail \Storage\ \Accounts\Account.rec0 \Data\AccCfg\Accounts.tdat \Google\Chrome\User Data\Default\Login Data SeShutdownPrivilege \BaseNamedObjects POST HTTP/1.1 Host: Connection: close Content-Length: Cache-Control: Origin: http:// Content-Type: application/x-www-form-urlencoded Accept: Referer: http:// Accept-Language: Accept-Encoding: Set-ExecutionPolicy RemoteSigned -Scope CurrentUser PowerShell.exe \Opera Software\Opera Stable kernel32.dll user32.dll wininet.dll rg.ini Recovery profiles.ini guid Connection: close pass token email login signin account persistent GET GET PUT POST OPTIONS User-Agent: API- MS-W _301 Moved _302 Found InternetOpenA InternetConnectA HttpOpenRequestA HttpSendRequestA InternetReadFile InternetCloseHandle | |||||||||||||||
4552 | C:\WINDOWS\Explorer.EXE | C:\Windows\explorer.exe | — | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Version: 10.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
5556 | C:\Windows\System32\SndVol.exe | C:\Windows\SysWOW64\SndVol.exe | — | 709876765465.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Volume Mixer Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
6156 | C:\WINDOWS\system32\SppExtComObj.exe -Embedding | C:\Windows\System32\SppExtComObj.Exe | — | svchost.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: KMS Connection Broker Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
6812 | "C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEvent | C:\Windows\System32\slui.exe | SppExtComObj.Exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
7104 | "C:\Program Files\Mozilla Firefox\Firefox.exe" | C:\Program Files\Mozilla Firefox\firefox.exe | — | grpconv.exe | |||||||||||
User: admin Company: Mozilla Corporation Integrity Level: MEDIUM Description: Firefox Exit code: 0 Version: 123.0 Modules
|
(PID) Process: | (5556) SndVol.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\3c\52C64B7E |
Operation: | write | Name: | @%SystemRoot%\System32\AudioSrv.Dll,-202 |
Value: System Sounds | |||
(PID) Process: | (2728) grpconv.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
Operation: | write | Name: | CachePrefix |
Value: | |||
(PID) Process: | (2728) grpconv.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
(PID) Process: | (2728) grpconv.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
Operation: | write | Name: | CachePrefix |
Value: Visited: |
PID | Process | Filename | Type | |
---|---|---|---|---|
2728 | grpconv.exe | C:\Users\admin\AppData\Local\Temp\n20vz2H | binary | |
MD5:A45465CDCDC6CB30C8906F3DA4EC114C | SHA256:4412319EF944EBCCA9581CBACB1D4E1DC614C348D1DFC5D2FAAAAD863D300209 | |||
4552 | explorer.exe | C:\Users\admin\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.dat | binary | |
MD5:E49C56350AEDF784BFE00E444B879672 | SHA256:A8BD235303668981563DFB5AAE338CB802817C4060E2C199B7C84901D57B7E1E |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
6592 | SIHClient.exe | GET | 200 | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
2032 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
4552 | explorer.exe | GET | 200 | 15.197.148.33:80 | http://www.onemuslimmentors.xyz/3ay4/?5MlcX=PuBQ/hOdVJANNwUQzzdTEa+zkfApgSPKgEqDhBASYMURWxyMHIenPOgyajIMF/2zFWCzDmFiAIipEGyvhu7lGIZ3uwKKI5hn/osEOZl7WYEWFX1qFNsVx3O0uQfdTiGVfqlqZ/M=&UL=LYn3etab | unknown | — | — | whitelisted |
4552 | explorer.exe | POST | 404 | 162.0.213.72:80 | http://www.hawalaz.xyz/ercr/ | unknown | — | — | — |
4552 | explorer.exe | POST | 404 | 162.0.213.72:80 | http://www.hawalaz.xyz/ercr/ | unknown | — | — | — |
4552 | explorer.exe | POST | 404 | 162.0.213.72:80 | http://www.hawalaz.xyz/ercr/ | unknown | — | — | — |
6592 | SIHClient.exe | GET | 200 | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
4552 | explorer.exe | POST | 404 | 162.0.213.72:80 | http://www.hawalaz.xyz/ercr/ | unknown | — | — | — |
4552 | explorer.exe | POST | 404 | 162.0.213.72:80 | http://www.hawalaz.xyz/ercr/ | unknown | — | — | — |
4552 | explorer.exe | GET | 404 | 162.0.213.72:80 | http://www.hawalaz.xyz/ercr/?5MlcX=MSINn22QncKT0sdefUNeJjHPJv4lmk6ZQ+eYCiR8SH8EueCYvtnhwzQH0TyPiANX6bqGZKwq9sS8LmmoRu0orcgQeqMqVuiTVqmfHt+Sxzz1gLMhFITNWmQPzi7RQgnRMgrGLn0=&UL=LYn3etab | unknown | — | — | — |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1404 | RUXIMICS.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2120 | MoUsoCoreWorker.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6224 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6224 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2456 | 709876765465.exe | 13.107.139.11:443 | onedrive.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | shared |
2456 | 709876765465.exe | 13.107.42.12:443 | phky3a.bn.files.1drv.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
3260 | svchost.exe | 40.115.3.253:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
2120 | MoUsoCoreWorker.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2032 | svchost.exe | 40.126.29.8:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
onedrive.live.com |
| shared |
phky3a.bn.files.1drv.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Not Suspicious Traffic | INFO [ANY.RUN] Downloading from a file sharing service is observed |
— | — | Malware Command and Control Activity Detected | ET MALWARE FormBook CnC Checkin (GET) M5 |
— | — | A Network Trojan was detected | STEALER [ANY.RUN] Formbook HTTP Header |
— | — | A Network Trojan was detected | STEALER [ANY.RUN] Formbook HTTP Header |
— | — | A Network Trojan was detected | STEALER [ANY.RUN] Formbook HTTP Header |
— | — | Malware Command and Control Activity Detected | ET MALWARE FormBook CnC Checkin (GET) M5 |