File name:

saver.scr

Full analysis: https://app.any.run/tasks/949efe0b-d38d-4e4a-b25e-51eba05b019e
Verdict: Malicious activity
Threats:

FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus.

Analysis date: February 06, 2019, 13:35:18
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
formbook
stealer
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

FA8F460899FE8F274C486B17254762BA

SHA1:

FA96D62B4DA88885EF0F1857E59789355FF4840D

SHA256:

5975424B959763B432BEA1F94C5C1281576D671606A2E774C12D8A19C9B3DB9F

SSDEEP:

6144:BIrOvQEopTCAzqjjSuCIVGpfhwuBMMWUQhzqdz2:OCvQZp+Azqv1dCfhxU+dy

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • saver.scr.exe (PID: 3116)
    • Connects to CnC server

      • explorer.exe (PID: 284)
    • FORMBOOK was detected

      • explorer.exe (PID: 284)
    • Formbook was detected

      • msg.exe (PID: 2276)
      • Firefox.exe (PID: 3232)
    • Changes the autorun value in the registry

      • msg.exe (PID: 2276)
    • Actions looks like stealing of personal data

      • msg.exe (PID: 2276)
    • Stealing of credential data

      • msg.exe (PID: 2276)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • saver.scr.exe (PID: 3116)
    • Starts CMD.EXE for commands execution

      • msg.exe (PID: 2276)
    • Application launched itself

      • saver.scr.exe (PID: 3116)
    • Creates files in the user directory

      • msg.exe (PID: 2276)
    • Loads DLL from Mozilla Firefox

      • msg.exe (PID: 2276)
  • INFO

    • Creates files in the user directory

      • Firefox.exe (PID: 3232)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2016:04:03 22:20:49+02:00
PEType: PE32
LinkerVersion: 6
CodeSize: 26624
InitializedDataSize: 3787776
UninitializedDataSize: 1024
EntryPoint: 0x3699
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 03-Apr-2016 20:20:49
Detected languages:
  • English - United States

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000C8

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 03-Apr-2016 20:20:49
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x0000664C
0x00006800
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.4419
.rdata
0x00008000
0x0000129A
0x00001400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.10031
.data
0x0000A000
0x0039A4F8
0x00000E00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.91292
.ndata
0x003A5000
0x00011000
0x00000000
IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.rsrc
0x003B6000
0x00004A90
0x00004C00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.79511

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.29548
1061
UNKNOWN
English - United States
RT_MANIFEST
2
5.9993
3752
UNKNOWN
English - United States
RT_ICON
3
6.24459
2216
UNKNOWN
English - United States
RT_ICON
4
5.01502
1384
UNKNOWN
English - United States
RT_ICON
5
6.16057
1128
UNKNOWN
English - United States
RT_ICON
6
3.34146
744
UNKNOWN
English - United States
RT_ICON
7
3.04232
296
UNKNOWN
English - United States
RT_ICON
103
2.6691
104
UNKNOWN
English - United States
RT_GROUP_ICON
104
2.70411
344
UNKNOWN
English - United States
RT_DIALOG
105
2.73893
514
UNKNOWN
English - United States
RT_DIALOG

Imports

ADVAPI32.dll
COMCTL32.dll
GDI32.dll
KERNEL32.dll
SHELL32.dll
USER32.dll
ole32.dll
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
6
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start saver.scr.exe saver.scr.exe no specs #FORMBOOK msg.exe cmd.exe no specs #FORMBOOK explorer.exe #FORMBOOK firefox.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
284C:\Windows\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\winanr.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
2276"C:\Windows\System32\msg.exe"C:\Windows\System32\msg.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Message Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msg.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winsta.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2920/c del "C:\Users\admin\AppData\Local\Temp\saver.scr.exe"C:\Windows\System32\cmd.exemsg.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3116"C:\Users\admin\AppData\Local\Temp\saver.scr.exe" C:\Users\admin\AppData\Local\Temp\saver.scr.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\saver.scr.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
3232"C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe
msg.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
61.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\dbghelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\version.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
3848"C:\Users\admin\AppData\Local\Temp\saver.scr.exe" C:\Users\admin\AppData\Local\Temp\saver.scr.exesaver.scr.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\saver.scr.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
Total events
355
Read events
354
Write events
1
Delete events
0

Modification events

(PID) Process:(2276) msg.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:NT-DMFE
Value:
C:\Program Files\Kwpxd\jfgajm.exe
Executable files
2
Suspicious files
74
Text files
12
Unknown types
3

Dropped files

PID
Process
Filename
Type
3116saver.scr.exeC:\Users\admin\AppData\Local\Temp\MicrosoftSolitaireAppList.scale-100.pngimage
MD5:
SHA256:
3116saver.scr.exeC:\Users\admin\AppData\Local\Temp\OUTRO_300px.46.pngimage
MD5:
SHA256:
3116saver.scr.exeC:\Users\admin\AppData\Local\Temp\Animate_in.33.pngimage
MD5:
SHA256:
3116saver.scr.exeC:\Users\admin\AppData\Local\Temp\OneConnectStoreLogo.scale-100.pngimage
MD5:
SHA256:
3116saver.scr.exeC:\Users\admin\AppData\Local\Temp\10172_smoke_icon.bytesimage
MD5:
SHA256:
3116saver.scr.exeC:\Users\admin\AppData\Local\Temp\GamesXboxHubAppList.targetsize-32_contrast-high.pngimage
MD5:
SHA256:
3116saver.scr.exeC:\Users\admin\AppData\Local\Temp\Physiquebinary
MD5:
SHA256:
3116saver.scr.exeC:\Users\admin\AppData\Local\Temp\Yelp2.scale-200.pngimage
MD5:
SHA256:
3116saver.scr.exeC:\Users\admin\AppData\Local\Temp\WindowsCameraSplashScreen.contrast-black_scale-200.pnggmc
MD5:7C0439F690F78FDBDC3B427BE2380E81
SHA256:933443839674BA1487EEB164E300FA7E3D23E72CDCA5AB01A3D518F819786494
3116saver.scr.exeC:\Users\admin\AppData\Local\Temp\tab_mru.pnggmc
MD5:582CED1AF8BDC5866CAF6B0A22B9B5E6
SHA256:F43F1C232392E03B1884CE7893DC617084277DADFE6EB12CA996C269E295FA1D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
29
TCP/UDP connections
29
DNS requests
12
Threats
51

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
284
explorer.exe
GET
35.173.211.61:80
http://www.cannaffection.com/c164/?NjDtQt=wiDbIJhDbyZMV3ukQVRnvsw+5AamZQwr31a3q5uDhsELK26JDB5b4wzFyaOKy3zD8v+QkQ==&Yn=fbxdvxTxav0lu
US
malicious
284
explorer.exe
POST
67.205.11.251:80
http://www.browniewd.com/c164/
US
malicious
284
explorer.exe
POST
67.205.11.251:80
http://www.browniewd.com/c164/
US
malicious
284
explorer.exe
POST
67.205.11.251:80
http://www.browniewd.com/c164/
US
malicious
284
explorer.exe
GET
404
67.205.11.251:80
http://www.browniewd.com/c164/?NjDtQt=At9UA6plAquJQFlQVTsY+Chrbjb94qfuBm5CEvHi3EGNQRqbq/K8sLgJU4oXh2iVkbXOPQ==&Yn=fbxdvxTxav0lu&sql=1
US
html
322 b
malicious
284
explorer.exe
POST
199.250.201.164:80
http://www.localmogulmedia.com/c164/
US
malicious
284
explorer.exe
GET
404
129.232.251.55:80
http://www.asheshe.com/c164/?NjDtQt=U7nYnoB8mhyMGcdDcr+ZcFD/uBzVX5f8r+G/Ep3pEOkWl3ReMJKvAYx3BKViPIHNVUKR/Q==&Yn=fbxdvxTxav0lu&sql=1
ZA
html
264 b
malicious
284
explorer.exe
POST
129.232.251.55:80
http://www.asheshe.com/c164/
ZA
malicious
284
explorer.exe
POST
199.250.201.164:80
http://www.localmogulmedia.com/c164/
US
malicious
284
explorer.exe
POST
199.250.201.164:80
http://www.localmogulmedia.com/c164/
US
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
284
explorer.exe
35.173.211.61:80
www.cannaffection.com
Amazon.com, Inc.
US
malicious
284
explorer.exe
129.232.251.55:80
www.asheshe.com
HETZNER
ZA
malicious
284
explorer.exe
23.231.47.190:80
www.situteng.net
Eonix Corporation
US
malicious
284
explorer.exe
23.20.239.12:80
www.iqytech.com
Amazon.com, Inc.
US
shared
284
explorer.exe
59.110.16.44:80
www.iqqcs.com
Hangzhou Alibaba Advertising Co.,Ltd.
CN
malicious
284
explorer.exe
172.106.150.60:80
www.ilkbilgi.com
Psychz Networks
US
malicious
284
explorer.exe
199.250.201.164:80
www.localmogulmedia.com
US
malicious
284
explorer.exe
67.205.11.251:80
www.browniewd.com
New Dream Network, LLC
US
malicious

DNS requests

Domain
IP
Reputation
www.cannaffection.com
  • 35.173.211.61
malicious
www.xzuuhz.info
unknown
www.browniewd.com
  • 67.205.11.251
malicious
www.cecdynamicfashion.com
unknown
www.localmogulmedia.com
  • 199.250.201.164
malicious
www.asheshe.com
  • 129.232.251.55
malicious
www.situteng.net
  • 23.231.47.190
malicious
www.iqytech.com
  • 23.20.239.12
shared
www.rylht.com
unknown
www.spaltanlagen-maler.com
unknown

Threats

PID
Process
Class
Message
284
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] FormBook CnC Checkin (GET)
284
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] FormBook CnC Checkin (GET)
284
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] TrojanSpy:FormBook CnC Checkin (POST)
284
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] TrojanSpy:FormBook CnC Checkin (POST)
284
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] FormBook CnC Checkin (POST)
284
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] FormBook CnC Checkin (GET)
284
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] TrojanSpy:FormBook CnC Checkin (POST)
284
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] FormBook CnC Checkin (POST)
284
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] TrojanSpy:FormBook CnC Checkin (POST)
284
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] FormBook CnC Checkin (GET)
22 ETPRO signatures available at the full report
No debug info