analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Purchase Order.arj

Full analysis: https://app.any.run/tasks/9d32b584-863a-468b-8aa7-4e4f45388e0a
Verdict: Malicious activity
Threats:

FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus.

Analysis date: November 15, 2018, 10:54:25
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
formbook
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

8E7AC1F05894DCF6EE37A74013012AE4

SHA1:

50FE653F624F4264CEA4967E30BE64D0B38AB246

SHA256:

6248CE89DE74766D0E4A1E17BBFDF2379F644BF7C6A724E6F0D08FE0EECC0258

SSDEEP:

3072:BEQlpclrYal2pho+0HjUGaZIk7VJLc9wXHRgAaZpViHVqgG:BNKYal0hoJAhVJgqXHRBaZpV2zG

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Purchase Order.exe (PID: 3036)
      • Purchase Order.exe (PID: 3492)
      • Cookies8pr.exe (PID: 4008)
    • FORMBOOK was detected

      • explorer.exe (PID: 1604)
    • Connects to CnC server

      • explorer.exe (PID: 1604)
    • Changes the autorun value in the registry

      • rundll32.exe (PID: 3096)
    • Actions looks like stealing of personal data

      • rundll32.exe (PID: 3096)
    • Formbook was detected

      • rundll32.exe (PID: 3096)
      • Firefox.exe (PID: 2432)
    • Stealing of credential data

      • rundll32.exe (PID: 3096)
  • SUSPICIOUS

    • Creates files in the user directory

      • explorer.exe (PID: 1604)
      • rundll32.exe (PID: 3096)
    • Starts CMD.EXE for commands execution

      • rundll32.exe (PID: 3096)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3440)
      • explorer.exe (PID: 1604)
      • DllHost.exe (PID: 800)
    • Uses RUNDLL32.EXE to load library

      • explorer.exe (PID: 1604)
    • Reads Internet Cache Settings

      • explorer.exe (PID: 1604)
    • Loads DLL from Mozilla Firefox

      • rundll32.exe (PID: 3096)
    • Creates files in the program directory

      • DllHost.exe (PID: 800)
  • INFO

    • Creates files in the user directory

      • Firefox.exe (PID: 2432)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
45
Monitored processes
11
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start drop and start winrar.exe purchase order.exe no specs #FORMBOOK rundll32.exe cmd.exe no specs purchase order.exe no specs msiexec.exe no specs #FORMBOOK explorer.exe Copy/Move/Rename/Delete/Link Object cookies8pr.exe no specs raserver.exe no specs #FORMBOOK firefox.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3440"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\Purchase Order.arj.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
3492"C:\Users\admin\AppData\Local\Temp\Rar$EXa3440.29664\Purchase Order.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3440.29664\Purchase Order.exeWinRAR.exe
User:
admin
Company:
lexus
Integrity Level:
MEDIUM
Description:
lexus
Exit code:
0
Version:
3.01.0009
3096"C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2920/c del "C:\Users\admin\AppData\Local\Temp\Rar$EXa3440.29664\Purchase Order.exe"C:\Windows\System32\cmd.exerundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3036"C:\Users\admin\Desktop\Purchase Order.exe" C:\Users\admin\Desktop\Purchase Order.exeexplorer.exe
User:
admin
Company:
lexus
Integrity Level:
MEDIUM
Description:
lexus
Exit code:
0
Version:
3.01.0009
2568"C:\Windows\System32\msiexec.exe"C:\Windows\System32\msiexec.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
1604C:\Windows\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
800C:\Windows\system32\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}C:\Windows\system32\DllHost.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
4008"C:\Program Files\Mib8x\Cookies8pr.exe"C:\Program Files\Mib8x\Cookies8pr.exeexplorer.exe
User:
admin
Company:
lexus
Integrity Level:
MEDIUM
Description:
lexus
Exit code:
0
Version:
3.01.0009
3944"C:\Windows\System32\raserver.exe"C:\Windows\System32\raserver.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Remote Assistance COM Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
2 324
Read events
2 268
Write events
54
Delete events
2

Modification events

(PID) Process:(3440) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3440) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3440) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3440) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\Purchase Order.arj.rar
(PID) Process:(3440) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3440) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3440) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3440) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1604) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rar\OpenWithList
Operation:writeName:a
Value:
WinRAR.exe
(PID) Process:(1604) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rar\OpenWithList
Operation:writeName:MRUList
Value:
a
Executable files
4
Suspicious files
73
Text files
1
Unknown types
4

Dropped files

PID
Process
Filename
Type
3492Purchase Order.exeC:\Users\admin\AppData\Local\Temp\~DF7A8E4187DDA1F19F.TMP
MD5:
SHA256:
3440WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3440.33216\Purchase Order.exe
MD5:
SHA256:
3036Purchase Order.exeC:\Users\admin\AppData\Local\Temp\~DF65952AA47F85ED11.TMP
MD5:
SHA256:
3440WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3440.29664\Purchase Order.exeexecutable
MD5:A66C424561A0BEC72B26D60EF6F89F08
SHA256:BB13134A94DB7D51E1459DB9087CA1A9F0DCB01A15A69FB7CC3A5BA08823B0E6
3096rundll32.exeC:\Users\admin\AppData\Roaming\LMO8QCRE\LMOlogrc.inibinary
MD5:2855A82ECDD565B4D957EC2EE05AED26
SHA256:88E38DA5B12DD96AFD9DC90C79929EC31D8604B1AFDEBDD5A02B19249C08C939
800DllHost.exeC:\Program Files\Mib8x\Cookies8pr.exeexecutable
MD5:A66C424561A0BEC72B26D60EF6F89F08
SHA256:BB13134A94DB7D51E1459DB9087CA1A9F0DCB01A15A69FB7CC3A5BA08823B0E6
1604explorer.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\Purchase Order.arj.rar.lnklnk
MD5:AC0A025239BFB78810C7B865ED09A603
SHA256:B4BE9F90EC070B4E7C31EB7C5B8F4DADB4DC820E03A676A3BEB24EC0F53EFC99
1604explorer.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\290532160612e071.automaticDestinations-msautomaticdestinations-ms
MD5:D452B4348AE100623699834CF01CF004
SHA256:DE376493BC9454A36B7F981FC367BB41B2C268AB1BA6FB571092FEFEE3975924
1604explorer.exeC:\Users\admin\Desktop\Purchase Order.exeexecutable
MD5:A66C424561A0BEC72B26D60EF6F89F08
SHA256:BB13134A94DB7D51E1459DB9087CA1A9F0DCB01A15A69FB7CC3A5BA08823B0E6
1604explorer.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\1b4dd67f29cb1962.automaticDestinations-msautomaticdestinations-ms
MD5:6C21A219A7DA3CCD7A195D2B08221EBA
SHA256:D0D5C02A802BDAAB26E4706EF49872F2607C40846A89D650E9B0570F47388434
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
10
DNS requests
8
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1604
explorer.exe
POST
47.254.39.76:80
http://www.zhuizhai.site/uc/
US
malicious
1604
explorer.exe
POST
199.192.21.143:80
http://www.sezop.com/uc/
US
malicious
1604
explorer.exe
GET
51.255.102.144:80
http://www.dentistry-apple.com/uc/?KnJHv=vQ62Y96vJbHz2CgShJfup2mhn1AxM1ZNaogWBHTfwRu/Ys9s6l7v4QF6jcXQDRlhKJKZpA==&ppv=K2KdTZix8vZDAFKP
FR
malicious
1604
explorer.exe
POST
199.192.21.143:80
http://www.sezop.com/uc/
US
malicious
1604
explorer.exe
POST
47.254.39.76:80
http://www.zhuizhai.site/uc/
US
malicious
1604
explorer.exe
GET
403
47.254.39.76:80
http://www.zhuizhai.site/uc/?KnJHv=3CZTDHn4u0xx0D9ZJAa1wC1JYCuuoDGZd9kjSBl1n8AxfdxGv7OFiAsqh3n3RWCEM+c3rg==&ppv=K2KdTZix8vZDAFKP&sql=1
US
html
724 b
malicious
1604
explorer.exe
POST
404
199.192.21.143:80
http://www.sezop.com/uc/
US
html
287 b
malicious
1604
explorer.exe
GET
404
199.192.21.143:80
http://www.sezop.com/uc/?KnJHv=zg1s9sLMXWbjwxN8cTinTb+bqQMqR9FxD0rKLxMvrlZtVXAVSUsJNdRjsBstTRhACiUHSw==&ppv=K2KdTZix8vZDAFKP&sql=1
US
html
326 b
malicious
1604
explorer.exe
GET
302
54.208.56.179:80
http://www.clscammers.com/uc/?KnJHv=0CLUVPlbpIPwqcDS6LIOuvsVHT2eSl5h11r/r+vjFCNnSAX6B3GUHJ9Sm+eW0v5PNOCDFA==&ppv=K2KdTZix8vZDAFKP
US
html
186 b
malicious
1604
explorer.exe
POST
199.192.21.143:80
http://www.sezop.com/uc/
US
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1604
explorer.exe
199.192.21.143:80
www.sezop.com
US
malicious
1604
explorer.exe
47.254.39.76:80
www.zhuizhai.site
Alibaba (China) Technology Co., Ltd.
US
malicious
1604
explorer.exe
54.208.56.179:80
www.clscammers.com
Amazon.com, Inc.
US
malicious
1604
explorer.exe
51.255.102.144:80
www.dentistry-apple.com
OVH SAS
FR
suspicious

DNS requests

Domain
IP
Reputation
www.kxaww.loan
unknown
www.clscammers.com
  • 54.208.56.179
  • 52.6.234.76
malicious
www.zhuizhai.site
  • 47.254.39.76
malicious
dns.msftncsi.com
  • 131.107.255.255
shared
www.sezop.com
  • 199.192.21.143
malicious
www.jkgfiuyfujhnow.online
unknown
www.dentistry-apple.com
  • 51.255.102.144
malicious

Threats

PID
Process
Class
Message
1604
explorer.exe
A Network Trojan was detected
SC SPYWARE Trojan-Spy.Win32.Noon
1604
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] FormBook CnC Checkin (GET)
1604
explorer.exe
A Network Trojan was detected
SC SPYWARE Trojan-Spy.Win32.Noon
1604
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] FormBook CnC Checkin (GET)
1604
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] TrojanSpy:FormBook CnC Checkin (POST)
1604
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] FormBook CnC Checkin (POST)
1604
explorer.exe
A Network Trojan was detected
SC SPYWARE Trojan-Spy.Win32.Noon
1604
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] FormBook CnC Checkin (GET)
1604
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] TrojanSpy:FormBook CnC Checkin (POST)
1604
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] FormBook CnC Checkin (POST)
6 ETPRO signatures available at the full report
No debug info