analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

45d353abf3ef14452ab0233a253c8adf711e3573daaaf17a7a767e4c5dd7742f.doc

Full analysis: https://app.any.run/tasks/0aad9619-acd7-424c-80f4-9c14928673c8
Verdict: Malicious activity
Threats:

FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus.

Analysis date: November 08, 2018, 06:20:34
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
exploit
CVE-2017-11882
trojan
formbook
stealer
Indicators:
MIME: text/plain
File info: ASCII text, with very long lines, with CRLF, CR line terminators, with escape sequences
MD5:

492F933A46820FFDF19E5301547FADB3

SHA1:

7B4A43B8F44D65633DD48B27F91128D1E3ECDC00

SHA256:

45D353ABF3EF14452AB0233A253C8ADF711E3573DAAAF17A7A767E4C5DD7742F

SSDEEP:

768:vmfcmfKmfdmfdmfQmfQmfQmfQmfQmfQmfQmfhmfcmfcmfcmf6ubyWBbNRISzrmyq:QANAWnvyQkmS

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • 1.exe (PID: 2824)
      • 1.exe (PID: 4004)
    • Suspicious connection from the Equation Editor

      • EQNEDT32.EXE (PID: 3448)
    • Equation Editor starts application (CVE-2017-11882)

      • EQNEDT32.EXE (PID: 3448)
    • Changes the autorun value in the registry

      • netsh.exe (PID: 2488)
    • Connects to CnC server

      • explorer.exe (PID: 1772)
    • Formbook was detected

      • netsh.exe (PID: 2488)
      • Firefox.exe (PID: 1012)
    • FORMBOOK was detected

      • explorer.exe (PID: 1772)
    • Actions looks like stealing of personal data

      • netsh.exe (PID: 2488)
    • Stealing of credential data

      • netsh.exe (PID: 2488)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • EQNEDT32.EXE (PID: 3448)
    • Application launched itself

      • 1.exe (PID: 2824)
    • Creates files in the user directory

      • EQNEDT32.EXE (PID: 3448)
      • netsh.exe (PID: 2488)
    • Uses NETSH.EXE for network configuration

      • explorer.exe (PID: 1772)
    • Starts CMD.EXE for commands execution

      • netsh.exe (PID: 2488)
    • Loads DLL from Mozilla Firefox

      • netsh.exe (PID: 2488)
  • INFO

    • Creates files in the user directory

      • WINWORD.EXE (PID: 3556)
      • Firefox.exe (PID: 1012)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 3556)
    • Starts Microsoft Office Application

      • explorer.exe (PID: 1772)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
8
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start winword.exe no specs eqnedt32.exe 1.exe no specs 1.exe no specs #FORMBOOK netsh.exe cmd.exe no specs #FORMBOOK explorer.exe #FORMBOOK firefox.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3556"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\45d353abf3ef14452ab0233a253c8adf711e3573daaaf17a7a767e4c5dd7742f.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
3448"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -EmbeddingC:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
svchost.exe
User:
admin
Company:
Design Science, Inc.
Integrity Level:
MEDIUM
Description:
Microsoft Equation Editor
Exit code:
0
Version:
00110900
2824C:\Users\admin\AppData\Local\Temp\1.exeC:\Users\admin\AppData\Local\Temp\1.exeEQNEDT32.EXE
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
4004C:\Users\admin\AppData\Local\Temp\1.exeC:\Users\admin\AppData\Local\Temp\1.exe1.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
2488"C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Network Command Shell
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2996/c del "C:\Users\admin\AppData\Local\Temp\1.exe"C:\Windows\System32\cmd.exenetsh.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
1772C:\Windows\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1012"C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe
netsh.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
61.0.2
Total events
1 229
Read events
857
Write events
367
Delete events
5

Modification events

(PID) Process:(1772) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
Operation:writeName:CheckSetting
Value:
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
(PID) Process:(3556) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation:writeName:*9&
Value:
2A392600E40D0000010000000000000000000000
(PID) Process:(3556) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
Off
(PID) Process:(3556) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
On
(PID) Process:(3556) WINWORD.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
Operation:writeName:WORDFiles
Value:
1298661393
(PID) Process:(3556) WINWORD.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
Operation:writeName:ProductFiles
Value:
1298661508
(PID) Process:(3556) WINWORD.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
Operation:writeName:ProductFiles
Value:
1298661509
(PID) Process:(3556) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
Operation:writeName:MTTT
Value:
E40D000026BEB2312B77D40100000000
(PID) Process:(3556) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation:writeName:6:&
Value:
363A2600E40D000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000
(PID) Process:(3556) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation:delete valueName:6:&
Value:
363A2600E40D000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000
Executable files
2
Suspicious files
73
Text files
2
Unknown types
3

Dropped files

PID
Process
Filename
Type
3556WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR318A.tmp.cvr
MD5:
SHA256:
3556WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$d353abf3ef14452ab0233a253c8adf711e3573daaaf17a7a767e4c5dd7742f.docpgc
MD5:A3FDA882CC134741DC2761431A55B63B
SHA256:FF538D7B5055A2B9CFC904120BF5015D6ACB6431B825F1CFEE9FA9B328927CE8
3556WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:1178BF800A7E9A315A240C34A220AC74
SHA256:D9C88E977D14F6A961A1118B14A375E85A2D6FC2467D14A13161D3D2EBF0E8B7
3448EQNEDT32.EXEC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\admin@bit[1].txttext
MD5:72D90A30CD6EDA1C6AAD28B810B14AE1
SHA256:0296C65B3754A0D73C167305A5EF7BAC268547C901FBEA46E4A57105E71A6321
2488netsh.exeC:\Users\admin\AppData\Roaming\5M6B6R9E\5M6logrc.inibinary
MD5:2855A82ECDD565B4D957EC2EE05AED26
SHA256:88E38DA5B12DD96AFD9DC90C79929EC31D8604B1AFDEBDD5A02B19249C08C939
3448EQNEDT32.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\hwcovf[1].jpgexecutable
MD5:2ABC6F4B5BCC2775EED848BF8315FA64
SHA256:A801FC404D66735278F5E487D6ABE1CC262D5D2899A1F689052246DC6E32A788
3448EQNEDT32.EXEC:\Users\admin\AppData\Local\Temp\1.exeexecutable
MD5:2ABC6F4B5BCC2775EED848BF8315FA64
SHA256:A801FC404D66735278F5E487D6ABE1CC262D5D2899A1F689052246DC6E32A788
3448EQNEDT32.EXEC:\Users\admin\AppData\Roaming\Microsoft\Windows\IETldCache\index.datdat
MD5:D7A950FEFD60DBAA01DF2D85FEFB3862
SHA256:75D0B1743F61B76A35B1FEDD32378837805DE58D79FA950CB6E8164BFA72073A
1012Firefox.exeC:\Users\admin\AppData\Roaming\5M6B6R9E\5M6logrf.inibinary
MD5:53028481B5B5795F1501241CCC7ABFF6
SHA256:75B5F3045E20C80F264568707E2D444DC7498DB119D9661AE51A91575960FC5A
2488netsh.exeC:\Users\admin\AppData\Roaming\5M6B6R9E\5M6logim.jpegimage
MD5:6BB9A7B03E0DD42A9929F42A09F08AD1
SHA256:C70A52CFF53F42936468E262DE3DD659F7E095EC3A9DCF1354DD50A7CF5EC5CE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
7
DNS requests
8
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1772
explorer.exe
GET
301
185.23.21.27:80
http://www.quercuspharm.com/z2/?r0H=qJWhqSSXDNU0ITrsQV5d6TricK6NP05wROja6T+NYkDt49TyHprYtIRQgtbI+G/B5IBNsw==&CZ=8pfxV4&sql=1
PL
malicious
1772
explorer.exe
POST
185.23.21.27:80
http://www.quercuspharm.com/z2/
PL
malicious
3448
EQNEDT32.EXE
GET
301
67.199.248.11:80
http://bit.ly/2F7dZ53
US
html
116 b
shared
1772
explorer.exe
GET
404
199.192.26.174:80
http://www.polrad.com/z2/?r0H=yM2gAZGxuED8vnYWiw98DrHulH6hqt1X+KjaMPszRqaXmFB6cWoy0IwQzESigPdQzaaIVQ==&CZ=8pfxV4
US
html
326 b
malicious
1772
explorer.exe
POST
185.23.21.27:80
http://www.quercuspharm.com/z2/
PL
malicious
1772
explorer.exe
POST
185.23.21.27:80
http://www.quercuspharm.com/z2/
PL
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3448
EQNEDT32.EXE
67.199.248.11:80
bit.ly
Bitly Inc
US
shared
1772
explorer.exe
199.192.26.174:80
www.polrad.com
US
malicious
1772
explorer.exe
185.23.21.27:80
www.quercuspharm.com
E24 Sp. z o.o.
PL
malicious
3448
EQNEDT32.EXE
185.83.214.16:443
a.doko.moe
PT
suspicious

DNS requests

Domain
IP
Reputation
bit.ly
  • 67.199.248.11
  • 67.199.248.10
shared
a.doko.moe
  • 185.83.214.16
unknown
www.wka893.com
unknown
www.polrad.com
  • 199.192.26.174
malicious
www.uvrlau.info
unknown
www.e5o27k.info
unknown
www.quercuspharm.com
  • 185.23.21.27
malicious
www.yil520.net
unknown

Threats

PID
Process
Class
Message
1772
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] FormBook CnC Checkin (GET)
1772
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] FormBook CnC Checkin (GET)
1772
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] FormBook CnC Checkin (POST)
1772
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] TrojanSpy:FormBook CnC Checkin (POST)
1772
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] FormBook CnC Checkin (POST)
1772
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] TrojanSpy:FormBook CnC Checkin (POST)
6 ETPRO signatures available at the full report
No debug info