| File name: | Transaction .exe |
| Full analysis: | https://app.any.run/tasks/5f6e1460-3e0e-42d7-b0d1-7a1ba074efb5 |
| Verdict: | Malicious activity |
| Threats: | FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus. |
| Analysis date: | October 05, 2023, 15:28:58 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive |
| MD5: | 5760C3D839F1444175BDD379C2CF7495 |
| SHA1: | D365BC5D708A69D0992E16209EBE0533B41FF4C2 |
| SHA256: | 7DA9294BA554D4C17ED9E4CAAC9836E303980814C7898B422CCDE7A246AC26A5 |
| SSDEEP: | 12288:qqzzTE1CHNQgnDjC+brd+lzx38Qh6BvNQt0kx:hzzTE1CHNQgnDjC+brd+r3zh6BvNQtrx |
| .exe | | | Win32 Executable MS Visual C++ (generic) (67.4) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (14.2) |
| .exe | | | Win32 Executable (generic) (9.7) |
| .exe | | | Generic Win/DOS Executable (4.3) |
| .exe | | | DOS Executable Generic (4.3) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2023:07:02 04:09:39+02:00 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 6 |
| CodeSize: | 26112 |
| InitializedDataSize: | 139776 |
| UninitializedDataSize: | 2048 |
| EntryPoint: | 0x34fc |
| OSVersion: | 4 |
| ImageVersion: | 6 |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 416 | "C:\Users\admin\AppData\Local\Temp\rqaij.exe" | C:\Users\admin\AppData\Local\Temp\rqaij.exe | — | rqaij.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 572 | "C:\Users\admin\AppData\Local\Temp\rqaij.exe" | C:\Users\admin\AppData\Local\Temp\rqaij.exe | — | Transaction .exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 1452 | "C:\Windows\SysWOW64\wlanext.exe" | C:\Windows\SysWOW64\wlanext.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Wireless LAN 802.11 Extensibility Framework Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
Formbook(PID) Process(1452) wlanext.exe C2www.zachmahl.com/sn26/ Strings (79)USERNAME LOCALAPPDATA USERPROFILE APPDATA TEMP ProgramFiles CommonProgramFiles ALLUSERSPROFILE /c copy " /c del " \Run \Policies \Explorer \Registry\User \Registry\Machine \SOFTWARE\Microsoft\Windows\CurrentVersion Office\15.0\Outlook\Profiles\Outlook\ NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\ \SOFTWARE\Mozilla\Mozilla \Mozilla Username: Password: formSubmitURL usernameField encryptedUsername encryptedPassword \logins.json \signons.sqlite \Microsoft\Vault\ SELECT encryptedUsername, encryptedPassword, formSubmitURL FROM moz_logins \Google\Chrome\User Data\Default\Login Data SELECT origin_url, username_value, password_value FROM logins .exe .com .scr .pif .cmd .bat ms win gdi mfc vga igfx user help config update regsvc chkdsk systray audiodg certmgr autochk taskhost colorcpl services IconCache ThumbCache Cookies SeDebugPrivilege SeShutdownPrivilege \BaseNamedObjects config.php POST HTTP/1.1 Host: Connection: close Content-Length: Cache-Control: no-cache Origin: http:// User-Agent: Mozilla Firefox/4.0 Content-Type: application/x-www-form-urlencoded Accept: */* Referer: http:// Accept-Language: en-US Accept-Encoding: gzip, deflate
dat= f-start f-end Decoy C2 (64)resenha10.bet gulshan-rajput.com xbus.tech z813my.cfd wlxzjlny.cfd auntengotiempo.com canada-reservation.com thegiftcompany.shop esthersilveirapropiedades.com 1wapws.top ymjblnvo.cfd termokimik.net kushiro-artist-school.com bmmboo.com caceresconstructionservices.com kentuckywalkabout.com bringyourcart.com miamiwinetour.com bobcatsocial.site thirdmind.network 4tbbwa.com rhinosecurellc.net rdparadise.com radpm.xyz thewhiteorchidspa.com clhynfco.cfd ngohcvja.cfd woodennickelcandles.com gg18rb.cfd qcdrxwr.cfd 974dp.com lagardere-vivendi-corp.net chestnutmaretraining.com seosjekk.online ahevrlh.xyz uedam.xyz natrada.love yoywvfw.top unifiedtradingjapan.com chinakaldi.com agenciacolmeiadigital.com wdlzzfkc.cfd 097850.com xingcansy.com uahrbqtj.cfd charliehaywood.com witheres.shop sqiyvdrx.cfd biopfizer.com tiktokviewer.com prftwgmw.cfd sfsdnwpf.cfd linkboladewahub.xyz orvados.com goodshepherdopcesva.com christianlovewv.com cdicontrols.com hawskio26.click ownlegalhelp.com tiydmdzp.cfd ppirr.biz stonyatrick.com itsamazingbarley.com msjbaddf.cfd | |||||||||||||||
| 1944 | C:\Windows\Explorer.EXE | C:\Windows\explorer.exe | — | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2764 | /c del "C:\Users\admin\AppData\Local\Temp\rqaij.exe" | C:\Windows\SysWOW64\cmd.exe | — | wlanext.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2964 | "C:\Users\admin\AppData\Local\Temp\Transaction .exe" | C:\Users\admin\AppData\Local\Temp\Transaction .exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (1944) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0 |
| Operation: | write | Name: | CheckSetting |
Value: 01000000D08C9DDF0115D1118C7A00C04FC297EB01000000088AF72B0747534094337F63DE35C94A000000000200000000001066000000010000200000003A7AE26404D75DF41C31FF40C5EA8CE90BAF74FA9E9BD7A9ACA34C7048350C1E000000000E8000000002000020000000BD2D56D46506C12C41A6A70B10E79EE53CB79EF36FD2BA8CDD2460CB8F4BE86A300000009B5D1418CBF2EB49F3C4BD4C21D58CA55B82FA3D3ED08AF0EF59D6C7ECAFC1055FA323A80FF7C154B1C9B60253392B6640000000DED9FDCC168073324C3013F1BB125E066EB1A2F09FD2C8E7CC7A793AA992E21EF1C942BF7294D04E036428704009B863B1CB981B97312E2530E3E816780CF7C9 | |||
| (PID) Process: | (1944) explorer.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\156\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2964 | Transaction .exe | C:\Users\admin\AppData\Local\Temp\qnbqnoovem.y | binary | |
MD5:51736AF1D953A0CAE38EF33385F45372 | SHA256:14C3B5A6E99F4CF87686D7AB8770350C1794C47E6FA1EEB362CE53E9BD25773A | |||
| 2964 | Transaction .exe | C:\Users\admin\AppData\Local\Temp\rqaij.exe | executable | |
MD5:9FAD3CD00C8DEE4BB877F0F1FBB8DC84 | SHA256:70C0EF97DB97E10004D5B57CB0A26F02AAD81CF0BBEF8E06F8557ACABCA625EA | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1944 | explorer.exe | GET | 301 | 104.18.8.146:80 | http://www.natrada.love/sn26/?6l=WpWHuZZlT9/ICGf7uQUtDbzxa6wIoMhJXj/XjLXBDMejdbk9sZnmjYw4Wb7XAWEHqhB4KA==&EZW47L=2dnTgtux9Lyx | unknown | — | — | unknown |
1944 | explorer.exe | GET | 403 | 3.33.130.190:80 | http://www.woodennickelcandles.com/sn26/?6l=U/urBRR8La7wmInyY0cNVqEjktmtxjJ0t/arTx8id04Vq5zFezvNT1/DWb94/CxF/EI2Iw==&EZW47L=2dnTgtux9Lyx | unknown | html | 291 b | unknown |
1944 | explorer.exe | GET | 403 | 3.33.130.190:80 | http://www.auntengotiempo.com/sn26/?6l=fGyXT8jtM7Km0N5jrAcCMXpRuh5LL99qegLjiblS4PzTsIUoRiP3N2idUB86uyqJ4bFCOA==&EZW47L=2dnTgtux9Lyx | unknown | html | 150 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
324 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
1956 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1944 | explorer.exe | 3.33.130.190:80 | www.woodennickelcandles.com | AMAZON-02 | US | unknown |
1944 | explorer.exe | 104.18.8.146:80 | www.natrada.love | CLOUDFLARENET | — | unknown |
1944 | explorer.exe | 160.121.10.129:80 | www.esthersilveirapropiedades.com | Clayer Limited | US | unknown |
Domain | IP | Reputation |
|---|---|---|
www.woodennickelcandles.com |
| unknown |
www.natrada.love |
| unknown |
www.auntengotiempo.com |
| unknown |
www.esthersilveirapropiedades.com |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
1944 | explorer.exe | Malware Command and Control Activity Detected | ET MALWARE FormBook CnC Checkin (GET) |