| File name: | DHL customer form and parcel details.exe |
| Full analysis: | https://app.any.run/tasks/8ee0301f-1ecc-46a7-9f04-8077c6ebdbc6 |
| Verdict: | Malicious activity |
| Threats: | FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus. |
| Analysis date: | November 23, 2023, 12:50:00 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows |
| MD5: | 928BEBB9E1B55B7B5DFCE8AD0958C6F4 |
| SHA1: | CDBC528DB55CB888D0892D346805B80215D44419 |
| SHA256: | 4E888A7A812BE647C1DB3C45B41997976B81FCAC54DBB3C2C53087518C036287 |
| SSDEEP: | 49152:IuWr6vmvVIGbphHdf8zZIp8GC/Sj1DMQiB5NTFgQWO+Dd7HzA:tWr6vmtbpEzZ5Q8B5NNWzA |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (72.2) |
|---|---|---|
| .scr | | | Windows screen saver (12.9) |
| .dll | | | Win32 Dynamic Link Library (generic) (6.4) |
| .exe | | | Win32 Executable (generic) (4.4) |
| .exe | | | Generic Win/DOS Executable (1.9) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2023:11:23 01:38:25+01:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 48 |
| CodeSize: | 1092608 |
| InitializedDataSize: | 39936 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x10cb62 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.0.0.0 |
| ProductVersionNumber: | 1.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| Comments: | - |
| CompanyName: | - |
| FileDescription: | Flexible_computing |
| FileVersion: | 1.0.0.* |
| InternalName: | CSvti.exe |
| LegalCopyright: | Copyright © 2011-2012 |
| LegalTrademarks: | - |
| OriginalFileName: | CSvti.exe |
| ProductName: | Flexible_computing |
| ProductVersion: | 1.0.0.* |
| AssemblyVersion: | 3.35.0.6552 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 284 | "C:\Windows\SysWOW64\autoconv.exe" | C:\Windows\SysWOW64\autoconv.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Auto File System Conversion Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 308 | "C:\Windows\SysWOW64\autoconv.exe" | C:\Windows\SysWOW64\autoconv.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Auto File System Conversion Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 572 | "C:\Users\admin\AppData\Local\Temp\DHL customer form and parcel details.exe" | C:\Users\admin\AppData\Local\Temp\DHL customer form and parcel details.exe | — | DHL customer form and parcel details.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: Flexible_computing Exit code: 0 Version: 1.0.0.* Modules
| |||||||||||||||
| 976 | "C:\Windows\SysWOW64\autoconv.exe" | C:\Windows\SysWOW64\autoconv.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Auto File System Conversion Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1696 | "C:\Windows\SysWOW64\autoconv.exe" | C:\Windows\SysWOW64\autoconv.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Auto File System Conversion Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1728 | "C:\Windows\SysWOW64\wininit.exe" | C:\Windows\SysWOW64\wininit.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Start-Up Application Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
Formbook(PID) Process(1728) wininit.exe C2www.archernoob.com/sy13/ Strings (79)USERNAME LOCALAPPDATA USERPROFILE APPDATA TEMP ProgramFiles CommonProgramFiles ALLUSERSPROFILE /c copy " /c del " \Run \Policies \Explorer \Registry\User \Registry\Machine \SOFTWARE\Microsoft\Windows\CurrentVersion Office\15.0\Outlook\Profiles\Outlook\ NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\ \SOFTWARE\Mozilla\Mozilla \Mozilla Username: Password: formSubmitURL usernameField encryptedUsername encryptedPassword \logins.json \signons.sqlite \Microsoft\Vault\ SELECT encryptedUsername, encryptedPassword, formSubmitURL FROM moz_logins \Google\Chrome\User Data\Default\Login Data SELECT origin_url, username_value, password_value FROM logins .exe .com .scr .pif .cmd .bat ms win gdi mfc vga igfx user help config update regsvc chkdsk systray audiodg certmgr autochk taskhost colorcpl services IconCache ThumbCache Cookies SeDebugPrivilege SeShutdownPrivilege \BaseNamedObjects config.php POST HTTP/1.1 Host: Connection: close Content-Length: Cache-Control: no-cache Origin: http:// User-Agent: Mozilla Firefox/4.0 Content-Type: application/x-www-form-urlencoded Accept: */* Referer: http:// Accept-Language: en-US Accept-Encoding: gzip, deflate
dat= f-start f-end Decoy C2 (64)shophouseoftrinh.com xn--i9q20pc9dov6e.com kconevent.com qqcghjb.shop huirushi.com havesat.com 5201314.fan agroyouth.com mertking1017.com cled.online 825symphony.com nutvc.com solarenergy-price.live brinhos.online sexonlinedir.com slotonlinegacorwin.com tsescort.beauty performantcap.com drmatheusrodrigues.com oxfighter.com growersharv.best trxioc.xyz bajubo.cloud afminok.com natashatrocel.com islotjackpot.com nikindiansexxnxx.com novezzi.com vinoandvibeslounge.com lawyerbraincoaching.com leftinruin.com lemonadefromlimes.com 7pw.xyz hemaponction.com youmunet.com glamynov.com rerescardshop.online yxjdfyt.com bety8.com kuajing.icu matzalal.com tropadok10.com masukslotgacor.club quanzhiai.com d5m3gw87t2.skin sandymeyerremax.com renda.digital 1325817.com kieranlchadwick.xyz cgv85.com dekonlinuk.com localmawes.top benzo-pila.store amjszk0.top purplesplace.com hu166.com lirab-coin.com dvds4x4.com 112233.store fxbrokersnews.com savecoco.com 86lode88.vip the682group.com tudoverso.store | |||||||||||||||
| 1944 | C:\Windows\Explorer.EXE | C:\Windows\explorer.exe | — | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2228 | "C:\Windows\SysWOW64\autoconv.exe" | C:\Windows\SysWOW64\autoconv.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Auto File System Conversion Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2380 | "C:\Windows\SysWOW64\autoconv.exe" | C:\Windows\SysWOW64\autoconv.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Auto File System Conversion Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2584 | "C:\Users\admin\AppData\Local\Temp\DHL customer form and parcel details.exe" | C:\Users\admin\AppData\Local\Temp\DHL customer form and parcel details.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: Flexible_computing Exit code: 0 Version: 1.0.0.* Modules
| |||||||||||||||
| (PID) Process: | (1944) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0 |
| Operation: | write | Name: | CheckSetting |
Value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| |||
| (PID) Process: | (1944) explorer.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\156\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1944 | explorer.exe | GET | 302 | 81.17.29.149:80 | http://www.dekonlinuk.com/sy13/?rDHph=jnjhjcAL3L3LEH7HDpbHMBiBAde9u5PprO3que0wFEYtZi+n1NRUGmBuW/+numej8qVv1A==&Wr=LhnLHroPV | unknown | text | 11 b | unknown |
1944 | explorer.exe | GET | 404 | 162.240.81.18:80 | http://www.tudoverso.store/sy13/?rDHph=RXytQUAqLYmpVTNBsPWEqG/5jLA9k6Hr/TwQx+ILM2c6JmUeD9O7BqXB6Z5liNqrJRBPPA==&Wr=LhnLHroPV | unknown | html | 3.56 Kb | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1956 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
324 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1944 | explorer.exe | 81.17.29.149:80 | www.dekonlinuk.com | Private Layer INC | CH | unknown |
1944 | explorer.exe | 162.240.81.18:80 | www.tudoverso.store | UNIFIEDLAYER-AS-1 | US | unknown |
Domain | IP | Reputation |
|---|---|---|
www.dekonlinuk.com |
| unknown |
www.mertking1017.com |
| unknown |
www.tudoverso.store |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
1944 | explorer.exe | Malware Command and Control Activity Detected | ET MALWARE FormBook CnC Checkin (GET) |