URL:

http://hsformular.com/downloads/HSFormular_Setup_4_22.exe

Full analysis: https://app.any.run/tasks/f9acf9f0-855e-473c-b69f-a1581736fbf8
Verdict: No threats detected
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: March 24, 2019, 15:27:20
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MD5:

CE6AAD859C03FB1AA824F0BF87B095E5

SHA1:

377B4A575A40DEEE93D63B70230AAE4348978174

SHA256:

4729EFCA834589423DD3B9E9DDA0F2676B7842D7CC1FD9D1CF0C1CE932D23665

SSDEEP:

3:N1KWW6+LdMXKRX7+0C:CWf0Kax7nC

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • HSFormular_Setup_4_22.exe (PID: 756)
      • HSFormular_Setup_4_22.exe (PID: 3020)
      • 7za.exe (PID: 752)
      • HSFormular.exe (PID: 1664)
    • Downloads executable files from the Internet

      • iexplore.exe (PID: 3028)
    • Loads dropped or rewritten executable

      • HSFormular.exe (PID: 1664)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 2596)
      • HSFormular_Setup_4_22.exe (PID: 756)
      • HSFormular_Setup_4_22.exe (PID: 3020)
      • iexplore.exe (PID: 3028)
      • HSFormular_Setup_4_22.tmp (PID: 2960)
    • Creates files in the program directory

      • HSFormular.exe (PID: 1664)
      • 7za.exe (PID: 752)
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 2596)
    • Changes internet zones settings

      • iexplore.exe (PID: 2596)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2596)
      • iexplore.exe (PID: 3028)
    • Creates files in the user directory

      • iexplore.exe (PID: 3028)
    • Application was dropped or rewritten from another process

      • HSFormular_Setup_4_22.tmp (PID: 3048)
      • HSFormular_Setup_4_22.tmp (PID: 2960)
    • Creates a software uninstall entry

      • HSFormular_Setup_4_22.tmp (PID: 2960)
    • Creates files in the program directory

      • HSFormular_Setup_4_22.tmp (PID: 2960)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
8
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start iexplore.exe iexplore.exe hsformular_setup_4_22.exe hsformular_setup_4_22.tmp no specs hsformular_setup_4_22.exe hsformular_setup_4_22.tmp hsformular.exe 7za.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
752"C:\Program Files\Handy soft\HSFormular\7za.exe" a -tzip "C:\Program Files\Handy soft\HSFormular\Data\baza_podataka\backup\24-03-2019.zip" "C:\Program Files\Handy soft\HSFormular\Data\baza_podataka\*.mdb"C:\Program Files\Handy soft\HSFormular\7za.exeHSFormular.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\program files\handy soft\hsformular\7za.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
756"C:\Users\admin\Downloads\HSFormular_Setup_4_22.exe" C:\Users\admin\Downloads\HSFormular_Setup_4_22.exe
iexplore.exe
User:
admin
Company:
Handy soft doo
Integrity Level:
MEDIUM
Description:
HSFormular Setup
Exit code:
0
Version:
Modules
Images
c:\users\admin\downloads\hsformular_setup_4_22.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
1664"C:\Program Files\Handy soft\HSFormular\HSFormular.exe"C:\Program Files\Handy soft\HSFormular\HSFormular.exe
HSFormular_Setup_4_22.tmp
User:
admin
Company:
Handy soft
Integrity Level:
MEDIUM
Description:
Aplikacija HSFormular
Exit code:
0
Version:
4, 0, 22, 0
Modules
Images
c:\program files\handy soft\hsformular\hsformular.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\handy soft\hsformular\hsformular.dll
c:\program files\handy soft\hsformular\celikapi.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\winscard.dll
2596"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2960"C:\Users\admin\AppData\Local\Temp\is-OEGTR.tmp\HSFormular_Setup_4_22.tmp" /SL5="$50206,9899316,63488,C:\Users\admin\Downloads\HSFormular_Setup_4_22.exe" /SPAWNWND=$30168 /NOTIFYWND=$301AC C:\Users\admin\AppData\Local\Temp\is-OEGTR.tmp\HSFormular_Setup_4_22.tmp
HSFormular_Setup_4_22.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.52.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-oegtr.tmp\hsformular_setup_4_22.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
3020"C:\Users\admin\Downloads\HSFormular_Setup_4_22.exe" /SPAWNWND=$30168 /NOTIFYWND=$301AC C:\Users\admin\Downloads\HSFormular_Setup_4_22.exe
HSFormular_Setup_4_22.tmp
User:
admin
Company:
Handy soft doo
Integrity Level:
HIGH
Description:
HSFormular Setup
Exit code:
0
Version:
Modules
Images
c:\users\admin\downloads\hsformular_setup_4_22.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
3028"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2596 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3048"C:\Users\admin\AppData\Local\Temp\is-POBTU.tmp\HSFormular_Setup_4_22.tmp" /SL5="$301AC,9899316,63488,C:\Users\admin\Downloads\HSFormular_Setup_4_22.exe" C:\Users\admin\AppData\Local\Temp\is-POBTU.tmp\HSFormular_Setup_4_22.tmpHSFormular_Setup_4_22.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.52.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-pobtu.tmp\hsformular_setup_4_22.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
Total events
1 533
Read events
1 375
Write events
154
Delete events
4

Modification events

(PID) Process:(2596) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2596) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2596) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2596) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(2596) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2596) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(2596) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
Operation:writeName:{58F9E205-4E49-11E9-B63D-5254004A04AF}
Value:
0
(PID) Process:(2596) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Type
Value:
4
(PID) Process:(2596) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Count
Value:
1
(PID) Process:(2596) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Time
Value:
E3070300000018000F001B0024002A00
Executable files
14
Suspicious files
1 158
Text files
406
Unknown types
71

Dropped files

PID
Process
Filename
Type
2596iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF153C41E52BF5FE0C.TMP
MD5:
SHA256:
2596iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\favicon[1].ico
MD5:
SHA256:
2596iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
3028iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5VMQJGNT\HSFormular_Setup_4_22[1].exeexecutable
MD5:
SHA256:
2596iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF742972E8B28D0C22.TMP
MD5:
SHA256:
2596iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{58F9E205-4E49-11E9-B63D-5254004A04AF}.dat
MD5:
SHA256:
2960HSFormular_Setup_4_22.tmpC:\Program Files\Handy soft\HSFormular\is-2NDTO.tmp
MD5:
SHA256:
3028iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.datdat
MD5:
SHA256:
2960HSFormular_Setup_4_22.tmpC:\Program Files\Handy soft\HSFormular\is-C9NAG.tmp
MD5:
SHA256:
3028iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\MSHist012019032420190325\index.datdat
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
15
TCP/UDP connections
4
DNS requests
3
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3028
iexplore.exe
GET
200
93.188.2.52:80
http://hsformular.com/downloads/HSFormular_Setup_4_22.exe
SE
executable
9.74 Mb
malicious
1664
HSFormular.exe
POST
200
93.188.2.52:80
http://www.hsformular.com/soap
SE
text
169 b
malicious
1664
HSFormular.exe
GET
200
93.188.2.52:80
http://www.hsformular.com/update/templates/Ugovor%20o%20radu%20(9).hsr
SE
binary
105 Kb
malicious
1664
HSFormular.exe
GET
200
93.188.2.52:80
http://www.hsformular.com/update/Menu.dat
SE
binary
156 Kb
malicious
1664
HSFormular.exe
GET
200
93.188.2.52:80
http://www.hsformular.com/home
SE
html
15.2 Kb
malicious
1664
HSFormular.exe
GET
200
93.188.2.52:80
http://www.hsformular.com/update/templates/Ugovor%20o%20radu%20(8).hsr
SE
binary
105 Kb
malicious
1664
HSFormular.exe
GET
200
93.188.2.52:80
http://www.hsformular.com/update/exports/ppi-1.xml
SE
xml
34.8 Kb
malicious
1664
HSFormular.exe
GET
200
93.188.2.52:80
http://www.hsformular.com/home
SE
html
15.2 Kb
malicious
1664
HSFormular.exe
GET
200
93.188.2.52:80
http://www.hsformular.com/home
SE
html
15.2 Kb
malicious
1664
HSFormular.exe
GET
200
93.188.2.52:80
http://www.hsformular.com/update/Izmene.xml
SE
xml
5.28 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2596
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3028
iexplore.exe
93.188.2.52:80
hsformular.com
Loopia AB
SE
malicious
1664
HSFormular.exe
93.188.2.52:80
hsformular.com
Loopia AB
SE
malicious

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
hsformular.com
  • 93.188.2.52
malicious
www.hsformular.com
  • 93.188.2.52
malicious

Threats

PID
Process
Class
Message
3028
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
No debug info