analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

TNT EXPRESS DELIVERY DOCUMENTS.exe

Full analysis: https://app.any.run/tasks/b214d102-bcef-4ae5-b52c-ce5388d91d44
Verdict: Malicious activity
Threats:

FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus.

Analysis date: March 15, 2019, 03:09:13
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
formbook
stealer
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

561189349E7EF1918A4C27182A279CA6

SHA1:

37165C0B5BD29F23664D55E0E4279F89CCDE4275

SHA256:

5D11D75DC9ECBA71D33F246F0F277FFEC929402F96C132D186A398E6942FFB7E

SSDEEP:

6144:dt39+IGUiggkeVXZtFz/icY6FBXmyskHrBggUBmefTm2+zNXsl37t:CgWVXZj/XBGyskdgpfT

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • FORMBOOK was detected

      • explorer.exe (PID: 116)
    • Formbook was detected

      • wlanext.exe (PID: 2888)
      • Firefox.exe (PID: 3840)
    • Connects to CnC server

      • explorer.exe (PID: 116)
    • Actions looks like stealing of personal data

      • wlanext.exe (PID: 2888)
    • Changes the autorun value in the registry

      • wlanext.exe (PID: 2888)
    • Stealing of credential data

      • wlanext.exe (PID: 2888)
  • SUSPICIOUS

    • Creates files in the user directory

      • explorer.exe (PID: 116)
      • wlanext.exe (PID: 2888)
    • Reads Internet Cache Settings

      • explorer.exe (PID: 116)
    • Starts CMD.EXE for commands execution

      • wlanext.exe (PID: 2888)
    • Application launched itself

      • TNT EXPRESS DELIVERY DOCUMENTS.exe (PID: 2980)
    • Loads DLL from Mozilla Firefox

      • wlanext.exe (PID: 2888)
    • Executable content was dropped or overwritten

      • explorer.exe (PID: 116)
      • DllHost.exe (PID: 3936)
    • Creates files in the program directory

      • DllHost.exe (PID: 3936)
    • Uses IPCONFIG.EXE to discover IP address

      • explorer.exe (PID: 116)
  • INFO

    • Starts Microsoft Office Application

      • explorer.exe (PID: 116)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 2076)
      • Firefox.exe (PID: 3840)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 2076)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable Microsoft Visual Basic 6 (84.4)
.dll | Win32 Dynamic Link Library (generic) (6.7)
.exe | Win32 Executable (generic) (4.6)
.exe | Generic Win/DOS Executable (2)
.exe | DOS Executable Generic (2)

EXIF

EXE

OriginalFileName: sre.exe
InternalName: sre
ProductVersion: 8.02.0005
FileVersion: 8.02.0005
ProductName: klo
CompanyName: sIEmENS
CharacterSet: Unicode
LanguageCode: English (U.S.)
FileSubtype: -
ObjectFileType: Executable application
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x0000
ProductVersionNumber: 8.2.0.5
FileVersionNumber: 8.2.0.5
Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: 8.2
OSVersion: 4
EntryPoint: 0x131c
UninitializedDataSize: -
InitializedDataSize: 32768
CodeSize: 360448
LinkerVersion: 6
PEType: PE32
TimeStamp: 2019:03:14 00:07:16+01:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 13-Mar-2019 23:07:16
Detected languages:
  • English - United States
CompanyName: sIEmENS
ProductName: klo
FileVersion: 8.02.0005
ProductVersion: 8.02.0005
InternalName: sre
OriginalFilename: sre.exe

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000C8

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 3
Time date stamp: 13-Mar-2019 23:07:16
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x0005725C
0x00058000
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.54396
.data
0x00059000
0x00005CB8
0x00001000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.rsrc
0x0005F000
0x00001CA2
0x00002000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.00442

Resources

Title
Entropy
Size
Codepage
Language
Type
1
3.27416
528
Unicode (UTF 16LE)
English - United States
RT_VERSION
30001
6.26526
2216
Unicode (UTF 16LE)
UNKNOWN
RT_ICON
30002
4.91971
4264
Unicode (UTF 16LE)
UNKNOWN
RT_ICON

Imports

MSVBVM60.DLL
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
11
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start tnt express delivery documents.exe no specs tnt express delivery documents.exe no specs #FORMBOOK wlanext.exe cmd.exe no specs winword.exe no specs #FORMBOOK explorer.exe #FORMBOOK firefox.exe no specs Copy/Move/Rename/Delete/Link Object cnhejg4il6h.exe no specs cnhejg4il6h.exe no specs ipconfig.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2980"C:\Users\admin\AppData\Local\Temp\TNT EXPRESS DELIVERY DOCUMENTS.exe" C:\Users\admin\AppData\Local\Temp\TNT EXPRESS DELIVERY DOCUMENTS.exeexplorer.exe
User:
admin
Company:
sIEmENS
Integrity Level:
MEDIUM
Exit code:
0
Version:
8.02.0005
3816"C:\Users\admin\AppData\Local\Temp\TNT EXPRESS DELIVERY DOCUMENTS.exe" C:\Users\admin\AppData\Local\Temp\TNT EXPRESS DELIVERY DOCUMENTS.exeTNT EXPRESS DELIVERY DOCUMENTS.exe
User:
admin
Company:
sIEmENS
Integrity Level:
MEDIUM
Exit code:
0
Version:
8.02.0005
2888"C:\Windows\System32\wlanext.exe"C:\Windows\System32\wlanext.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Wireless LAN 802.11 Extensibility Framework
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3616/c del "C:\Users\admin\AppData\Local\Temp\TNT EXPRESS DELIVERY DOCUMENTS.exe"C:\Windows\System32\cmd.exewlanext.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2076"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\functionscalls.rtf"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
116C:\Windows\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3840"C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe
wlanext.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
61.0.2
3936C:\Windows\system32\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}C:\Windows\system32\DllHost.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2504"C:\Program Files\Ciddtqt90\cnhejg4il6h.exe"C:\Program Files\Ciddtqt90\cnhejg4il6h.exeexplorer.exe
User:
admin
Company:
sIEmENS
Integrity Level:
MEDIUM
Exit code:
0
Version:
8.02.0005
3220"C:\Program Files\Ciddtqt90\cnhejg4il6h.exe"C:\Program Files\Ciddtqt90\cnhejg4il6h.execnhejg4il6h.exe
User:
admin
Company:
sIEmENS
Integrity Level:
MEDIUM
Exit code:
0
Version:
8.02.0005
Total events
2 396
Read events
2 327
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
75
Text files
8
Unknown types
8

Dropped files

PID
Process
Filename
Type
3816TNT EXPRESS DELIVERY DOCUMENTS.exeC:\Users\admin\AppData\Local\Temp\~DFC3AA9A7F49D273C9.TMP
MD5:
SHA256:
2076WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR793.tmp.cvr
MD5:
SHA256:
2076WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{FD959111-DD91-4AA4-BD8D-FF239B901DB3}.tmp
MD5:
SHA256:
2076WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{2D42D7A1-E944-44BF-9841-C2CC62BE4F19}.tmp
MD5:
SHA256:
116explorer.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\1b4dd67f29cb1962.automaticDestinations-msautomaticdestinations-ms
MD5:1697500B16B3B3560E7E6617E09012D9
SHA256:CF735876B62F2E2B1F56D007C60356777CA553793AA64BA86486FE0B4E28DD94
2076WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:6D7B87262806397679FF737AD37F1AA2
SHA256:D7708ED70992D2AF7663732AB1FB55BAC28E35565DFDA9F2FC981DE8DBB7F400
116explorer.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\a7bd71699cd38d1c.automaticDestinations-msautomaticdestinations-ms
MD5:20EF998F7E7D326477ED61F46C5CD584
SHA256:1CF72201F9801924C7B3D162BEBA238688A37177E0AA11E5E44FAC7E1E930F92
2980TNT EXPRESS DELIVERY DOCUMENTS.exeC:\Users\admin\AppData\Local\Temp\~DF8B38958D50350EFD.TMPbinary
MD5:17379EF1B0679ABBE2C5122568B33146
SHA256:859FB14AF8B0ADE85F4EA01579B4FEB1C605398616D218C00C17082839188A1A
2076WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\functionscalls.rtf.LNKlnk
MD5:ABC5F7E65692C0A7B88571113F4BC4C8
SHA256:E4B55AEDFAD9E0B37F085466F43BE66869477F86EF2FBA9C94AB367B52C8D8FE
116explorer.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\functionscalls.rtf.lnklnk
MD5:46B04C6AB7CE10540EADEC775C22E0A8
SHA256:CE4D281A87DF7BA789E952115F7907968EACCC336D6EE62B577E0161B3332C71
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
26
TCP/UDP connections
26
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
116
explorer.exe
GET
404
72.52.238.103:80
http://www.petitkevin.com/ch/?nDFxwnQ8=AlFZyTk3pU7A5ZwtbmhcOPRkLcozONN/lkYmXUgeEpb5/JhgqkT9Hw0m6p38sMFcL9+dzA==&BZ-=dhDhI4XxZdnx26Y&sql=1
US
html
320 b
malicious
116
explorer.exe
GET
404
199.188.203.227:80
http://www.saibez.com/ch/?nDFxwnQ8=ChrdQJ3JjgCxSTMyEG3OxXQQg0zaw2RW1xOAubNXPOhpfFLzh9jLihO0PuLkryl07+EVOw==&BZ-=dhDhI4XxZdnx26Y&sql=1
US
html
326 b
malicious
116
explorer.exe
POST
23.20.239.12:80
http://www.areauruguay.com/ch/
US
shared
116
explorer.exe
POST
23.20.239.12:80
http://www.areauruguay.com/ch/
US
shared
116
explorer.exe
POST
72.52.238.103:80
http://www.petitkevin.com/ch/
US
malicious
116
explorer.exe
GET
107.186.23.124:80
http://www.gzxhx168.com/ch/?nDFxwnQ8=6zwHgmy8wWdfY41lmTs6ccVq9nNpqjDmcqB+q0T/59BxEdYsAqc+hSE1PW623fTPITjtjg==&BZ-=dhDhI4XxZdnx26Y
US
malicious
116
explorer.exe
GET
302
23.20.239.12:80
http://www.areauruguay.com/ch/?nDFxwnQ8=DmJOioIitS7uAO0/M47gh5Z7xp1k+h0QvFS8TOeZm0v4YFEgz7D2diDNp9XEDjEKYOeaTg==&BZ-=dhDhI4XxZdnx26Y&sql=1
US
html
187 b
shared
116
explorer.exe
POST
404
199.188.203.227:80
http://www.saibez.com/ch/
US
html
290 b
malicious
116
explorer.exe
GET
198.185.159.144:80
http://www.peoplearentprops.com/ch/?nDFxwnQ8=Bg6dIISLLlUzv0f6aZadhdBlQEnqujIpb9FcNCib6p8PWEukQrgxi90mKrSexnjCZg0PvQ==&BZ-=dhDhI4XxZdnx26Y
US
malicious
116
explorer.exe
POST
72.52.238.103:80
http://www.petitkevin.com/ch/
US
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
116
explorer.exe
199.188.203.227:80
www.saibez.com
Namecheap, Inc.
US
malicious
116
explorer.exe
52.18.2.156:80
www.masakatsugaru.com
Amazon.com, Inc.
IE
malicious
116
explorer.exe
23.20.239.12:80
www.areauruguay.com
Amazon.com, Inc.
US
shared
116
explorer.exe
72.52.238.103:80
www.petitkevin.com
Liquid Web, L.L.C
US
malicious
116
explorer.exe
198.185.159.144:80
www.peoplearentprops.com
Squarespace, Inc.
US
malicious
116
explorer.exe
208.91.197.39:80
www.atsintech.solutions
Confluence Networks Inc
VG
malicious
116
explorer.exe
107.186.23.124:80
www.gzxhx168.com
EGIHosting
US
malicious

DNS requests

Domain
IP
Reputation
www.masakatsugaru.com
  • 52.18.2.156
  • 52.31.109.102
malicious
www.1024ccco.info
unknown
www.petitkevin.com
  • 72.52.238.103
malicious
www.areauruguay.com
  • 23.20.239.12
shared
www.thicdienthoai.com
unknown
www.saibez.com
  • 199.188.203.227
malicious
www.pl8v5z.info
unknown
www.gzxhx168.com
  • 107.186.23.124
malicious
www.afcct-ladiesinredlunch.com
unknown
www.peoplearentprops.com
  • 198.185.159.144
  • 198.185.159.145
  • 198.49.23.144
  • 198.49.23.145
malicious

Threats

PID
Process
Class
Message
116
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] FormBook CnC Checkin (GET)
116
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] FormBook CnC Checkin (GET)
116
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] TrojanSpy:FormBook CnC Checkin (POST)
116
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] TrojanSpy:FormBook CnC Checkin (POST)
116
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] FormBook CnC Checkin (POST)
116
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] FormBook CnC Checkin (GET)
116
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] TrojanSpy:FormBook CnC Checkin (POST)
116
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] TrojanSpy:FormBook CnC Checkin (POST)
116
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] FormBook CnC Checkin (POST)
116
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] FormBook CnC Checkin (GET)
20 ETPRO signatures available at the full report
No debug info