File name: | prop.xlsx |
Full analysis: | https://app.any.run/tasks/45b1ff50-c18e-4a8e-86fb-a8ad5cfb601c |
Verdict: | Malicious activity |
Threats: | FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus. |
Analysis date: | June 18, 2019, 18:49:00 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/encrypted |
File info: | CDFV2 Encrypted |
MD5: | 224DF64002100B92D6D00B5B8EFC1CA6 |
SHA1: | 03692193A42B73C0972C20E0A20AEF788A5C2E43 |
SHA256: | 48F82E8DEC6D4E79B4CA368A26219F73B5F72AEF7E38C74A5E7DAB88772D3F9D |
SSDEEP: | 1536:UPpajNk3r3nZ5lNG66JoV1ZEVELcY5Rg3Ilu7hIKgSs9862yeEbLb0wWCN9tNX:UPoQT1866JoZEVELcf+Kgj9869eK0Y9z |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2948 | "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /dde | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Excel Version: 14.0.6024.1000 | ||||
2436 | "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding | C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE | svchost.exe | |
User: admin Company: Design Science, Inc. Integrity Level: MEDIUM Description: Microsoft Equation Editor Exit code: 0 Version: 00110900 | ||||
3208 | "C:\Users\Public\vbc.exe" | C:\Users\Public\vbc.exe | — | EQNEDT32.EXE |
User: admin Integrity Level: MEDIUM Description: VistaTask Exit code: 0 Version: 1.4.8.0 | ||||
2368 | "C:\Users\Public\vbc.exe" | C:\Users\Public\vbc.exe | — | vbc.exe |
User: admin Integrity Level: MEDIUM Description: VistaTask Exit code: 0 Version: 1.4.8.0 | ||||
2104 | "C:\Windows\System32\services.exe" | C:\Windows\System32\services.exe | explorer.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Services and Controller app Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
828 | /c del "C:\Users\Public\vbc.exe" | C:\Windows\System32\cmd.exe | — | services.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
2036 | C:\Windows\Explorer.EXE | C:\Windows\explorer.exe | — | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
1944 | "C:\Program Files\Mozilla Firefox\Firefox.exe" | C:\Program Files\Mozilla Firefox\Firefox.exe | services.exe | |
User: admin Company: Mozilla Corporation Integrity Level: MEDIUM Description: Firefox Exit code: 0 Version: 65.0.2 |
(PID) Process: | (2948) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems |
Operation: | write | Name: | #'= |
Value: 23273D00840B0000010000000000000000000000 | |||
(PID) Process: | (2948) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
Operation: | write | Name: | 1033 |
Value: Off | |||
(PID) Process: | (2948) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
Operation: | write | Name: | 1033 |
Value: On | |||
(PID) Process: | (2948) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel |
Operation: | write | Name: | MTTT |
Value: 840B00005CDD62880626D50100000000 | |||
(PID) Process: | (2948) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems |
Operation: | delete value | Name: | #'= |
Value: 23273D00840B0000010000000000000000000000 | |||
(PID) Process: | (2948) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems |
Operation: | delete key | Name: | |
Value: | |||
(PID) Process: | (2948) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency |
Operation: | delete key | Name: | |
Value: | |||
(PID) Process: | (2948) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
(PID) Process: | (2948) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | AutoDetect |
Value: 1 | |||
(PID) Process: | (2948) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\121863 |
Operation: | write | Name: | 121863 |
Value: 04000000840B00002B00000043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C004C006F00630061006C005C00540065006D0070005C00700072006F0070002E0078006C0073007800000000002200000043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C004C006F00630061006C005C00540065006D0070005C000100000000000000B0F4BE890626D501631812006318120000000000AC020000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 |
PID | Process | Filename | Type | |
---|---|---|---|---|
2948 | EXCEL.EXE | C:\Users\admin\AppData\Local\Temp\CVR1303.tmp.cvr | — | |
MD5:— | SHA256:— | |||
2436 | EQNEDT32.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\sant[1].exe | executable | |
MD5:8CEAC7C145C0D4D7A26394502DAFA1C5 | SHA256:C36405B8E3D1B821AF8E5BB1C8F63012260D499DC82EFA252C76EB8A19649361 | |||
2436 | EQNEDT32.EXE | C:\Users\Public\vbc.exe | executable | |
MD5:8CEAC7C145C0D4D7A26394502DAFA1C5 | SHA256:C36405B8E3D1B821AF8E5BB1C8F63012260D499DC82EFA252C76EB8A19649361 | |||
2104 | services.exe | C:\Users\admin\AppData\Roaming\J11OTS2E\J11logrc.ini | binary | |
MD5:146180A97851159BE1EE1025BEC0140A | SHA256:F9EF3FC8F0AE1AB18B426DC8674875CA257E7D14B57236519ABF9858A48BF629 | |||
2104 | services.exe | C:\Users\admin\AppData\Roaming\J11OTS2E\J11logim.jpeg | image | |
MD5:56DEACD26B87DE6E70F91F7E7741BE6E | SHA256:DD07F9DD2DE0E978AC8290FC878A47828CE70F75255FA9A39FCF9515DC2394BD | |||
1944 | Firefox.exe | C:\Users\admin\AppData\Roaming\J11OTS2E\J11logrf.ini | binary | |
MD5:53028481B5B5795F1501241CCC7ABFF6 | SHA256:75B5F3045E20C80F264568707E2D444DC7498DB119D9661AE51A91575960FC5A | |||
2104 | services.exe | C:\Users\admin\AppData\Roaming\J11OTS2E\J11logrv.ini | binary | |
MD5:BA3B6BC807D4F76794C4B81B09BB9BA5 | SHA256:6EEBF968962745B2E9DE2CA969AF7C424916D4E3FE3CC0BB9B3D414ABFCE9507 | |||
2104 | services.exe | C:\Users\admin\AppData\Roaming\J11OTS2E\J11logri.ini | binary | |
MD5:D63A82E5D81E02E399090AF26DB0B9CB | SHA256:EAECE2EBA6310253249603033C744DD5914089B0BB26BDE6685EC9813611BAAE |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2036 | explorer.exe | GET | — | 213.238.177.28:80 | http://www.companyhg.com/sa/?-ZIL2=WU95QNHyg3Ku87wCemr8eqEbzA+VIvGtIVvcWBU8VW5KHQ7SxavJf1fS1qdFTk7/dNIh6g==&4hW=k2KdNtCh-27t5lv0&sql=1 | TR | — | — | malicious |
2036 | explorer.exe | GET | 404 | 199.192.20.71:80 | http://www.curaxin.com/sa/?-ZIL2=dfLYrfnP4aEwG4AlruXFL8OzMk5ESlXFboJDL5j3//jgfb4jHaHkmt2jwVrZhEgRJC00uQ==&4hW=k2KdNtCh-27t5lv0 | US | html | 326 b | malicious |
2036 | explorer.exe | POST | 404 | 199.192.20.71:80 | http://www.curaxin.com/sa/ | US | html | 291 b | malicious |
2036 | explorer.exe | POST | — | 213.238.177.28:80 | http://www.companyhg.com/sa/ | TR | — | — | malicious |
2036 | explorer.exe | GET | 404 | 78.153.212.173:80 | http://www.crossfitgap.com/sa/?-ZIL2=b/N2F4y874IP6mnaXKNt0rHvqNFp+HOBWTxGqryf78bOPIzG0mXGY6v3FelfZTWYuv0+yg==&4hW=k2KdNtCh-27t5lv0 | IE | html | 210 b | malicious |
2436 | EQNEDT32.EXE | GET | 200 | 23.249.165.218:80 | http://promotionzynovawillzerodacontinuegood.duckdns.org/sant.exe | US | executable | 291 Kb | malicious |
2036 | explorer.exe | POST | — | 213.238.177.28:80 | http://www.companyhg.com/sa/ | TR | — | — | malicious |
2036 | explorer.exe | POST | 404 | 199.192.20.71:80 | http://www.curaxin.com/sa/ | US | html | 291 b | malicious |
2036 | explorer.exe | POST | — | 199.192.20.71:80 | http://www.curaxin.com/sa/ | US | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2036 | explorer.exe | 213.238.177.28:80 | www.companyhg.com | Dgn Teknoloji A.s. | TR | malicious |
2436 | EQNEDT32.EXE | 23.249.165.218:80 | promotionzynovawillzerodacontinuegood.duckdns.org | ColoCrossing | US | malicious |
2036 | explorer.exe | 78.153.212.173:80 | www.crossfitgap.com | Blacknight Internet Solutions Ltd | IE | malicious |
— | — | 213.238.177.28:80 | www.companyhg.com | Dgn Teknoloji A.s. | TR | malicious |
2036 | explorer.exe | 199.192.20.71:80 | www.curaxin.com | — | US | malicious |
Domain | IP | Reputation |
---|---|---|
promotionzynovawillzerodacontinuegood.duckdns.org |
| malicious |
www.crossfitgap.com |
| malicious |
www.fruitspanda.com |
| unknown |
www.nordicxpres.com |
| unknown |
www.4tayar.com |
| unknown |
www.dkozii.design |
| unknown |
www.wulianx.net |
| unknown |
dns.msftncsi.com |
| shared |
www.companyhg.com |
| malicious |
www.uni-debrecen.com |
| unknown |
PID | Process | Class | Message |
---|---|---|---|
— | — | Misc activity | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain |
2436 | EQNEDT32.EXE | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2036 | explorer.exe | A Network Trojan was detected | MALWARE [PTsecurity] FormBook CnC Checkin (GET) |
2036 | explorer.exe | A Network Trojan was detected | MALWARE [PTsecurity] FormBook CnC Checkin (GET) |
2036 | explorer.exe | A Network Trojan was detected | MALWARE [PTsecurity] TrojanSpy:FormBook CnC Checkin (POST) |
2036 | explorer.exe | A Network Trojan was detected | MALWARE [PTsecurity] TrojanSpy:FormBook CnC Checkin (POST) |
2036 | explorer.exe | A Network Trojan was detected | MALWARE [PTsecurity] FormBook CnC Checkin (GET) |
2036 | explorer.exe | A Network Trojan was detected | MALWARE [PTsecurity] TrojanSpy:FormBook CnC Checkin (POST) |
2036 | explorer.exe | A Network Trojan was detected | MALWARE [PTsecurity] TrojanSpy:FormBook CnC Checkin (POST) |
2036 | explorer.exe | A Network Trojan was detected | MALWARE [PTsecurity] FormBook CnC Checkin (POST) |