analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

588e64f0cecb7be8ffb253782164867b

Full analysis: https://app.any.run/tasks/e032ed56-3c89-4e3a-be6b-aaacb40ef4e4
Verdict: Malicious activity
Threats:

FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus.

Analysis date: May 20, 2022, 19:43:45
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
installer
formbook
trojan
stealer
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

588E64F0CECB7BE8FFB253782164867B

SHA1:

07680B353CDC696BECE3F891F0A6A73C9087EDCE

SHA256:

7F9EAD41557A685C5F7CD82C6607D7BBE98397BF87CF04BE8E7E7E13BEA41938

SSDEEP:

6144:B0Y2TrEiwjwlegl6aSQsnrkLs663oqTL9Q:m31cw7SQ68YTK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops executable file immediately after starts

      • 588e64f0cecb7be8ffb253782164867b.exe (PID: 2884)
    • Application was dropped or rewritten from another process

      • hrtmb.exe (PID: 3168)
      • hrtmb.exe (PID: 3732)
    • FORMBOOK detected by memory dumps

      • msiexec.exe (PID: 3264)
    • Connects to CnC server

      • Explorer.EXE (PID: 1296)
    • FORMBOOK was detected

      • Explorer.EXE (PID: 1296)
  • SUSPICIOUS

    • Checks supported languages

      • 588e64f0cecb7be8ffb253782164867b.exe (PID: 2884)
      • hrtmb.exe (PID: 3168)
      • hrtmb.exe (PID: 3732)
    • Reads the computer name

      • 588e64f0cecb7be8ffb253782164867b.exe (PID: 2884)
      • hrtmb.exe (PID: 3732)
    • Drops a file with a compile date too recent

      • 588e64f0cecb7be8ffb253782164867b.exe (PID: 2884)
    • Executable content was dropped or overwritten

      • 588e64f0cecb7be8ffb253782164867b.exe (PID: 2884)
    • Application launched itself

      • hrtmb.exe (PID: 3168)
    • Starts CMD.EXE for commands execution

      • msiexec.exe (PID: 3264)
    • Reads Environment values

      • msiexec.exe (PID: 3264)
  • INFO

    • Checks supported languages

      • msiexec.exe (PID: 3264)
      • cmd.exe (PID: 1976)
    • Reads the computer name

      • msiexec.exe (PID: 3264)
    • Manual execution by user

      • msiexec.exe (PID: 3264)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Formbook

(PID) Process(3264) msiexec.exe
C2www.zy.company/r75h/
Decoys and strings (143)USERNAME
LOCALAPPDATA
USERPROFILE
APPDATA
TEMP
ProgramFiles
CommonProgramFiles
ALLUSERSPROFILE
/c copy "
/c del "
\Run
\Policies
\Explorer
\Registry\User
\Registry\Machine
\SOFTWARE\Microsoft\Windows\CurrentVersion
Office\15.0\Outlook\Profiles\Outlook\
NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\
\SOFTWARE\Mozilla\Mozilla
\Mozilla
Username:
Password:
formSubmitURL
usernameField
encryptedUsername
encryptedPassword
\logins.json
\signons.sqlite
\Microsoft\Vault\
SELECT encryptedUsername, encryptedPassword, formSubmitURL FROM moz_logins
\Google\Chrome\User Data\Default\Login Data
SELECT origin_url, username_value, password_value FROM logins
.exe
.com
.scr
.pif
.cmd
.bat
ms
win
gdi
mfc
vga
igfx
user
help
config
update
regsvc
chkdsk
systray
audiodg
certmgr
autochk
taskhost
colorcpl
services
IconCache
ThumbCache
Cookies
SeDebugPrivilege
SeShutdownPrivilege
\BaseNamedObjects
config.php
POST
HTTP/1.1
Host:
Connection: close
Content-Length:
Cache-Control: no-cache
Origin: http://
User-Agent: Mozilla Firefox/4.0
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://
Accept-Language: en-US
Accept-Encoding: gzip, deflate dat=
f-start
prvzz.xyz
jhh9999.com
myshellsnaturals.com
kaminemper.xyz
whatongodsgreedearth.com
xiaoxinyan.com
bruv.media
solarpenels-es-open.site
cymail.ca
viaplan.site
a2700ou.com
klinkai.com
e2ojcduey3b1.xyz
summerfarm.site
justlable.store
burghwallisjubilee.com
kangarooblog2022.com
graficaolimpo.com
hjsdsgtdfg.xyz
keezelevenrsa.xyz
caseynevaeh.xyz
calender.pro
paysoshomozwv.xyz
beccashop.com
b0jpt2.xyz
betscorestips.store
foreignbills4u.com
dignitycareatoasis.com
milktowngoats.com
elijahchairs.com
yhllwyj.xyz
magicalmeta.xyz
elusiveminds.institute
onenight19.com
bestpremiumwordpressthemes.com
brightstonexm.com
southwestfloridamattress.com
wanderlabs.media
idiotideas.com
t4yhofie0.xyz
voice-of-april.com
feelmypayne.com
istanbulhikayeleri.com
navlgatorkcy.website
beijinghongritianchuang.site
phemsoq.xyz
redeemliquor.com
modocinema.com
donutprints.info
malerbetriebbock.com
akimotrade.com
yeavaneu.xyz
digitaliseringsstyrelsen.xyz
ib-moneta-zmrazeny.info
explainedpro.com
xdygu.xyz
ozdemirdtm.com
godhcf.xyz
openerlotion.site
7477a.xyz
penguinmoonwalker.com
matchperfeito.com
fqvsi.xyz
grandudes.com
f-end
Modules (42)kernel32.dll
advapi32.dll
ws2_32.dll
svchost.exe
msiexec.exe
wuauclt.exe
lsass.exe
wlanext.exe
msg.exe
lsm.exe
dwm.exe
help.exe
chkdsk.exe
cmmon32.exe
nbtstat.exe
spoolsv.exe
rdpclip.exe
control.exe
taskhost.exe
rundll32.exe
systray.exe
audiodg.exe
wininit.exe
services.exe
autochk.exe
autoconv.exe
autofmt.exe
cmstp.exe
colorcpl.exe
cscript.exe
explorer.exe
WWAHost.exe
ipconfig.exe
msdt.exe
mstsc.exe
NAPSTAT.EXE
netsh.exe
NETSTAT.EXE
raserver.exe
wscript.exe
wuapp.exe
cmd.exe
No Malware configuration.

TRiD

.exe | NSIS - Nullsoft Scriptable Install System (94.8)
.exe | Win32 Executable MS Visual C++ (generic) (3.4)
.dll | Win32 Dynamic Link Library (generic) (0.7)
.exe | Win32 Executable (generic) (0.5)
.exe | Generic Win/DOS Executable (0.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2007:06:08 23:48:38+02:00
PEType: PE32
LinkerVersion: 6
CodeSize: 23040
InitializedDataSize: 119808
UninitializedDataSize: 1024
EntryPoint: 0x32fa
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 08-Jun-2007 21:48:38
Detected languages:
  • English - United States

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000D8

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 08-Jun-2007 21:48:38
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x000059AC
0x00005A00
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.45808
.rdata
0x00007000
0x0000117A
0x00001200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.17514
.data
0x00009000
0x0001AFD8
0x00000400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.98111
.ndata
0x00024000
0x00008000
0x00000000
IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.rsrc
0x0002C000
0x00000900
0x00000A00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
3.94449

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.00226
491
UNKNOWN
English - United States
RT_MANIFEST
103
2.16096
20
UNKNOWN
English - United States
RT_GROUP_ICON
105
2.66174
256
UNKNOWN
English - United States
RT_DIALOG
106
2.88094
284
UNKNOWN
English - United States
RT_DIALOG
111
2.48825
96
UNKNOWN
English - United States
RT_DIALOG

Imports

ADVAPI32.dll
COMCTL32.dll
GDI32.dll
KERNEL32.dll
SHELL32.dll
USER32.dll
VERSION.dll
ole32.dll
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
6
Malicious processes
2
Suspicious processes
2

Behavior graph

Click at the process to see the details
drop and start start 588e64f0cecb7be8ffb253782164867b.exe hrtmb.exe no specs hrtmb.exe no specs #FORMBOOK msiexec.exe no specs cmd.exe no specs #FORMBOOK explorer.exe

Process information

PID
CMD
Path
Indicators
Parent process
2884"C:\Users\admin\AppData\Local\Temp\588e64f0cecb7be8ffb253782164867b.exe" C:\Users\admin\AppData\Local\Temp\588e64f0cecb7be8ffb253782164867b.exe
Explorer.EXE
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3168C:\Users\admin\AppData\Local\Temp\hrtmb.exe C:\Users\admin\AppData\Local\Temp\bxhfnC:\Users\admin\AppData\Local\Temp\hrtmb.exe588e64f0cecb7be8ffb253782164867b.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3732C:\Users\admin\AppData\Local\Temp\hrtmb.exe C:\Users\admin\AppData\Local\Temp\bxhfnC:\Users\admin\AppData\Local\Temp\hrtmb.exehrtmb.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3264"C:\Windows\System32\msiexec.exe"C:\Windows\System32\msiexec.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Formbook
(PID) Process(3264) msiexec.exe
C2www.zy.company/r75h/
Decoys and strings (143)USERNAME
LOCALAPPDATA
USERPROFILE
APPDATA
TEMP
ProgramFiles
CommonProgramFiles
ALLUSERSPROFILE
/c copy "
/c del "
\Run
\Policies
\Explorer
\Registry\User
\Registry\Machine
\SOFTWARE\Microsoft\Windows\CurrentVersion
Office\15.0\Outlook\Profiles\Outlook\
NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\
\SOFTWARE\Mozilla\Mozilla
\Mozilla
Username:
Password:
formSubmitURL
usernameField
encryptedUsername
encryptedPassword
\logins.json
\signons.sqlite
\Microsoft\Vault\
SELECT encryptedUsername, encryptedPassword, formSubmitURL FROM moz_logins
\Google\Chrome\User Data\Default\Login Data
SELECT origin_url, username_value, password_value FROM logins
.exe
.com
.scr
.pif
.cmd
.bat
ms
win
gdi
mfc
vga
igfx
user
help
config
update
regsvc
chkdsk
systray
audiodg
certmgr
autochk
taskhost
colorcpl
services
IconCache
ThumbCache
Cookies
SeDebugPrivilege
SeShutdownPrivilege
\BaseNamedObjects
config.php
POST
HTTP/1.1
Host:
Connection: close
Content-Length:
Cache-Control: no-cache
Origin: http://
User-Agent: Mozilla Firefox/4.0
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://
Accept-Language: en-US
Accept-Encoding: gzip, deflate dat=
f-start
prvzz.xyz
jhh9999.com
myshellsnaturals.com
kaminemper.xyz
whatongodsgreedearth.com
xiaoxinyan.com
bruv.media
solarpenels-es-open.site
cymail.ca
viaplan.site
a2700ou.com
klinkai.com
e2ojcduey3b1.xyz
summerfarm.site
justlable.store
burghwallisjubilee.com
kangarooblog2022.com
graficaolimpo.com
hjsdsgtdfg.xyz
keezelevenrsa.xyz
caseynevaeh.xyz
calender.pro
paysoshomozwv.xyz
beccashop.com
b0jpt2.xyz
betscorestips.store
foreignbills4u.com
dignitycareatoasis.com
milktowngoats.com
elijahchairs.com
yhllwyj.xyz
magicalmeta.xyz
elusiveminds.institute
onenight19.com
bestpremiumwordpressthemes.com
brightstonexm.com
southwestfloridamattress.com
wanderlabs.media
idiotideas.com
t4yhofie0.xyz
voice-of-april.com
feelmypayne.com
istanbulhikayeleri.com
navlgatorkcy.website
beijinghongritianchuang.site
phemsoq.xyz
redeemliquor.com
modocinema.com
donutprints.info
malerbetriebbock.com
akimotrade.com
yeavaneu.xyz
digitaliseringsstyrelsen.xyz
ib-moneta-zmrazeny.info
explainedpro.com
xdygu.xyz
ozdemirdtm.com
godhcf.xyz
openerlotion.site
7477a.xyz
penguinmoonwalker.com
matchperfeito.com
fqvsi.xyz
grandudes.com
f-end
Modules (42)kernel32.dll
advapi32.dll
ws2_32.dll
svchost.exe
msiexec.exe
wuauclt.exe
lsass.exe
wlanext.exe
msg.exe
lsm.exe
dwm.exe
help.exe
chkdsk.exe
cmmon32.exe
nbtstat.exe
spoolsv.exe
rdpclip.exe
control.exe
taskhost.exe
rundll32.exe
systray.exe
audiodg.exe
wininit.exe
services.exe
autochk.exe
autoconv.exe
autofmt.exe
cmstp.exe
colorcpl.exe
cscript.exe
explorer.exe
WWAHost.exe
ipconfig.exe
msdt.exe
mstsc.exe
NAPSTAT.EXE
netsh.exe
NETSTAT.EXE
raserver.exe
wscript.exe
wuapp.exe
cmd.exe
1976/c del "C:\Users\admin\AppData\Local\Temp\hrtmb.exe"C:\Windows\System32\cmd.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
1296C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
757
Read events
757
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
3
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
2884588e64f0cecb7be8ffb253782164867b.exeC:\Users\admin\AppData\Local\Temp\hrtmb.exeexecutable
MD5:D8D7186A46FB0078E44ED89C64AA3881
SHA256:4982AAF13A3DC1C128975A9FFFC5636280AB0ACFE390574164EDAA019C1B3B9C
2884588e64f0cecb7be8ffb253782164867b.exeC:\Users\admin\AppData\Local\Temp\afy7cbsqdzzlq5ud0binary
MD5:8DC56B738DB64FE02A247DAEFEC0466D
SHA256:D3D766A35F0D10AB029B4E978851F6E2ED2E08C59FEACA21F4A8FE60AB8CEDAB
2884588e64f0cecb7be8ffb253782164867b.exeC:\Users\admin\AppData\Local\Temp\nsu91E7.tmpbinary
MD5:402ED41E9B1B3CB0ED776923524F41D8
SHA256:DEF718CBB32BB01E5FDDDDE34E47BF926C72A664AF361422DE3348A563E75206
2884588e64f0cecb7be8ffb253782164867b.exeC:\Users\admin\AppData\Local\Temp\bxhfnbinary
MD5:8D939C4619A1B93A91EC769E50865A30
SHA256:6D7F790627A73FC30AA77D515AB674C0B444910974826A403A4C978D8CEDE3A4
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
3
DNS requests
4
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1296
Explorer.EXE
GET
301
162.43.118.123:80
http://www.akimotrade.com/r75h/?jP=/SELbyx6zIe4F7FPy6FEek/QPcTN2xBCR8QPm+T5Nt2NejYU9hWEkwWMHQQxhWJNYc57UA==&pNJ=Nv1DCv_
US
html
332 b
malicious
1296
Explorer.EXE
GET
404
156.226.218.214:80
http://www.jhh9999.com/r75h/?jP=5gPu29TqcIwODq2QILsIZu7pgJD0Y8PRHWogwA/1Lfzsy6zppku2vs68JDEv5oYfX1otIQ==&pNJ=Nv1DCv_
ZA
html
146 b
malicious
1296
Explorer.EXE
GET
403
185.53.178.51:80
http://www.calender.pro/r75h/?jP=TSRS8iTb02g4KDwSSgcLxK1PWAs4Q/+aC5V0Gi5D8RV63ds4WfZLpkCOfob1KW+V9bSrtg==&pNJ=Nv1DCv_
DE
html
146 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1296
Explorer.EXE
162.43.118.123:80
www.akimotrade.com
US
malicious
1296
Explorer.EXE
185.53.178.51:80
www.calender.pro
Team Internet AG
DE
malicious
1296
Explorer.EXE
156.226.218.214:80
www.jhh9999.com
MacroLAN
ZA
malicious

DNS requests

Domain
IP
Reputation
www.zy.company
unknown
www.akimotrade.com
  • 162.43.118.123
malicious
www.jhh9999.com
  • 156.226.218.214
malicious
www.calender.pro
  • 185.53.178.51
malicious

Threats

PID
Process
Class
Message
1296
Explorer.EXE
Generic Protocol Command Decode
SURICATA HTTP Unexpected Request body
1296
Explorer.EXE
A Network Trojan was detected
ET TROJAN FormBook CnC Checkin (GET)
1296
Explorer.EXE
A Network Trojan was detected
ET TROJAN FormBook CnC Checkin (GET)
1296
Explorer.EXE
A Network Trojan was detected
ET TROJAN FormBook CnC Checkin (GET)
1296
Explorer.EXE
Generic Protocol Command Decode
SURICATA HTTP Unexpected Request body
1296
Explorer.EXE
A Network Trojan was detected
ET TROJAN FormBook CnC Checkin (GET)
1296
Explorer.EXE
A Network Trojan was detected
ET TROJAN FormBook CnC Checkin (GET)
1296
Explorer.EXE
A Network Trojan was detected
ET TROJAN FormBook CnC Checkin (GET)
1296
Explorer.EXE
Generic Protocol Command Decode
SURICATA HTTP Unexpected Request body
1296
Explorer.EXE
A Network Trojan was detected
ET TROJAN FormBook CnC Checkin (GET)
No debug info