| File name: | e-dekont.pdf.exe |
| Full analysis: | https://app.any.run/tasks/cdb2f39c-371d-4eec-884c-3939f10ffdff |
| Verdict: | Malicious activity |
| Threats: | FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus. |
| Analysis date: | September 04, 2023, 16:20:37 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive |
| MD5: | 68E81732F7B3B06BE645EF5BCCD8E419 |
| SHA1: | AAAC23729120D0515F11E57E9A1C0BB52FF517DE |
| SHA256: | 837FC8D2A3E348E96EA2DB94ABBE3319B380496B7329CDE30519B26F51C1DE88 |
| SSDEEP: | 6144:/Ya67Z+/XILeburh5lX8sH/DWwYMY/o+ztDGZr6JF/yMJ/q2cEjczf863Z58tKJC:/YpOOpN5pp6wYMY3xDymnaMJCaM863Zg |
| .exe | | | Win32 Executable MS Visual C++ (generic) (67.4) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (14.2) |
| .exe | | | Win32 Executable (generic) (9.7) |
| .exe | | | Generic Win/DOS Executable (4.3) |
| .exe | | | DOS Executable Generic (4.3) |
| ProductName: | 21.44.34.17 |
|---|---|
| LegalCopyright: | Copyright Boothe |
| FileVersion: | 21.44.34.17 |
| FileDescription: | cockneyize |
| CompanyName: | pyramidoprismatic |
| CharacterSet: | Unicode |
| LanguageCode: | English (U.S.) |
| FileSubtype: | - |
| ObjectFileType: | Executable application |
| FileOS: | Win32 |
| FileFlags: | (none) |
| FileFlagsMask: | 0x0000 |
| ProductVersionNumber: | 21.44.34.17 |
| FileVersionNumber: | 21.44.34.17 |
| Subsystem: | Windows GUI |
| SubsystemVersion: | 4 |
| ImageVersion: | 6 |
| OSVersion: | 4 |
| EntryPoint: | 0x3640 |
| UninitializedDataSize: | 2048 |
| InitializedDataSize: | 141824 |
| CodeSize: | 26624 |
| LinkerVersion: | 6 |
| PEType: | PE32 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit |
| TimeStamp: | 2021:09:25 21:56:47+00:00 |
| MachineType: | Intel 386 or later, and compatibles |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 25-Sep-2021 21:56:47 |
| Detected languages: |
|
| CompanyName: | pyramidoprismatic |
| FileDescription: | cockneyize |
| FileVersion: | 21.44.34.17 |
| LegalCopyright: | Copyright Boothe |
| ProductName: | 21.44.34.17 |
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x000000D8 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 5 |
| Time date stamp: | 25-Sep-2021 21:56:47 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00001000 | 0x00006676 | 0x00006800 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.41746 |
.rdata | 0x00008000 | 0x0000139A | 0x00001400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.14107 |
.data | 0x0000A000 | 0x00020378 | 0x00000600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.11058 |
.ndata | 0x0002B000 | 0x00010000 | 0x00000000 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
.rsrc | 0x0003B000 | 0x00000CB0 | 0x00000E00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.20063 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
1 | 5.29934 | 830 | UNKNOWN | English - United States | RT_MANIFEST |
103 | 2.16096 | 20 | UNKNOWN | English - United States | RT_GROUP_ICON |
105 | 2.66174 | 256 | UNKNOWN | English - United States | RT_DIALOG |
106 | 2.88094 | 284 | UNKNOWN | English - United States | RT_DIALOG |
111 | 2.48825 | 96 | UNKNOWN | English - United States | RT_DIALOG |
ADVAPI32.dll |
COMCTL32.dll |
GDI32.dll |
KERNEL32.dll |
SHELL32.dll |
USER32.dll |
ole32.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1924 | C:\Windows\Explorer.EXE | C:\Windows\explorer.exe | — | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2504 | "C:\Users\admin\AppData\Local\Temp\fdvazbckgj.exe" | C:\Users\admin\AppData\Local\Temp\fdvazbckgj.exe | — | fdvazbckgj.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 2888 | "C:\Windows\SysWOW64\cscript.exe" | C:\Windows\SysWOW64\cscript.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Console Based Script Host Exit code: 0 Version: 5.8.7600.16385 Modules
Formbook(PID) Process(2888) cscript.exe C2www.xpcslda.com/mh21/ Strings (79)USERNAME LOCALAPPDATA USERPROFILE APPDATA TEMP ProgramFiles CommonProgramFiles ALLUSERSPROFILE /c copy " /c del " \Run \Policies \Explorer \Registry\User \Registry\Machine \SOFTWARE\Microsoft\Windows\CurrentVersion Office\15.0\Outlook\Profiles\Outlook\ NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\ \SOFTWARE\Mozilla\Mozilla \Mozilla Username: Password: formSubmitURL usernameField encryptedUsername encryptedPassword \logins.json \signons.sqlite \Microsoft\Vault\ SELECT encryptedUsername, encryptedPassword, formSubmitURL FROM moz_logins \Google\Chrome\User Data\Default\Login Data SELECT origin_url, username_value, password_value FROM logins .exe .com .scr .pif .cmd .bat ms win gdi mfc vga igfx user help config update regsvc chkdsk systray audiodg certmgr autochk taskhost colorcpl services IconCache ThumbCache Cookies SeDebugPrivilege SeShutdownPrivilege \BaseNamedObjects config.php POST HTTP/1.1 Host: Connection: close Content-Length: Cache-Control: no-cache Origin: http:// User-Agent: Mozilla Firefox/4.0 Content-Type: application/x-www-form-urlencoded Accept: */* Referer: http:// Accept-Language: en-US Accept-Encoding: gzip, deflate
dat= f-start f-end Decoy C2 (64)qiandaye.top zltgw.com getxgp.link forest-create.site parsefilm.com foodstore.top reynoldsquality.com tripleshops.com altuwaijrifood.com seniorassistedlivinglocator.com essencedelanature.com hrwv098.xyz olkja.xyz 10685johansen.com ajidenhp.com sensifiedregistration.com timetodatings.life bizbet-review-pt.com zhangming.asia xn--vhq074eeozsda.top rygodigital.site cellphonespoland.today dentsfirst.com envrliteracyprojectia.online friendsislove.com g1t1v5am.top naturo-construction.com jstzzlm.com cukservers.net serofix.com afhpj.com westnewburyopenspace.net copperstatenotary.com rw6dh.top 5812harold.com zzfd.shop webmarketingrocket.com bcdwg.com amotcabo.com accountswallet.com itechsarl.net wakuy.app mmacpdrm.click 2d8t36nfmh.skin kimberlys-portfolio.com iran-protests.com bodhiheals.com mkamiart.com cuprolifestyle.com smartpartproducts.com 7300-banking.pro dinheirofacil.digital fednowdigitalpayment.com hokkoriidol.com agapehomecleaning.com iicaqjls.click 53dorethyrd.com indepqueretaro.com fsjixrkh83o.cyou seomasteraff.net dbwci.com simplebly.store calicarmovers.com opleermandmand.com | |||||||||||||||
| 3016 | "C:\Users\admin\AppData\Local\Temp\e-dekont.pdf.exe" | C:\Users\admin\AppData\Local\Temp\e-dekont.pdf.exe | explorer.exe | ||||||||||||
User: admin Company: pyramidoprismatic Integrity Level: MEDIUM Description: cockneyize Exit code: 0 Version: 21.44.34.17 Modules
| |||||||||||||||
| 3564 | /c del "C:\Users\admin\AppData\Local\Temp\fdvazbckgj.exe" | C:\Windows\SysWOW64\cmd.exe | — | cscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 4072 | "C:\Users\admin\AppData\Local\Temp\fdvazbckgj.exe" | C:\Users\admin\AppData\Local\Temp\fdvazbckgj.exe | — | e-dekont.pdf.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (1924) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0 |
| Operation: | write | Name: | CheckSetting |
Value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| |||
| (PID) Process: | (1924) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count |
| Operation: | write | Name: | HRZR_PGYFRFFVBA |
Value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| |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3016 | e-dekont.pdf.exe | C:\Users\admin\AppData\Local\Temp\nskB6B.tmp | binary | |
MD5:96335AD9C238CC94568EB6834C65E3E2 | SHA256:61EF7F0BCB80EE7E86F8E3B31B1EBBD4E8C7AE47271A5FC710FC84A67C736202 | |||
| 3016 | e-dekont.pdf.exe | C:\Users\admin\AppData\Local\Temp\lqyrcrcd.aor | binary | |
MD5:64F8723A95E5B3012F77BD684D2F757E | SHA256:C206BFD5494FA7EBC8D65000A538365D081A2F6E0E0CDDA7CB46E63F55CF2E8B | |||
| 3016 | e-dekont.pdf.exe | C:\Users\admin\AppData\Local\Temp\fdvazbckgj.exe | executable | |
MD5:765FD0073777FA17C2E48904593C31D9 | SHA256:D261B4241C77E9D362B0876C9DCEF509E4C23EA2DD88BB3052F76155A30DC646 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1924 | explorer.exe | GET | 200 | 156.234.201.239:80 | http://www.rw6dh.top/mh21/?vTax-=y3w155G+DCRs2eXKpnvLkoLPf6n8CkVT1oHOLXnRIRunUvabZMzIq/niQPZJeDI11UaZuQ==&S0GhCH=RRHlpvnHLv_L | unknown | text | 60 b | suspicious |
1924 | explorer.exe | GET | 301 | 172.67.177.114:80 | http://www.bizbet-review-pt.com/mh21/?vTax-=elCaaRPQK3+RZ7lLuSQxdnmkSwv9KKoAqvuAqj9IgzyxJKbCPAvvd2UcayLko/IfhHkZDQ==&S0GhCH=RRHlpvnHLv_L | unknown | html | 178 b | malicious |
1924 | explorer.exe | GET | 301 | 185.252.29.160:80 | http://www.parsefilm.com/mh21/?vTax-=XiJTF7j/F/vXjVRlqLMIt0ZEGJeVfRJ3myaY1WjAyS7/851g+QRaO5/c2z9yAaXyCRoipg==&S0GhCH=RRHlpvnHLv_L | unknown | html | 707 b | unknown |
1924 | explorer.exe | GET | 404 | 185.104.28.238:80 | http://www.opleermandmand.com/mh21/?vTax-=VFkF7QA8/Ks4YjJ/dNSXC2LKrArBYVzvkfR1DicGJYSAxqdE9QJdsY7FzORd5JOWusrKUQ==&S0GhCH=RRHlpvnHLv_L | unknown | html | 203 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 239.255.255.250:1900 | — | — | — | unknown |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
332 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
1924 | explorer.exe | 172.67.177.114:80 | www.bizbet-review-pt.com | CLOUDFLARENET | US | malicious |
1924 | explorer.exe | 185.104.28.238:80 | www.opleermandmand.com | Stichting DIGI NL | NL | unknown |
1924 | explorer.exe | 156.234.201.239:80 | www.rw6dh.top | MOACK.Co.LTD | HK | suspicious |
1924 | explorer.exe | 185.252.29.160:80 | www.parsefilm.com | Shabakeh Ertebatat Artak Towseeh LTD | IR | unknown |
Domain | IP | Reputation |
|---|---|---|
www.bizbet-review-pt.com |
| malicious |
www.opleermandmand.com |
| unknown |
www.rw6dh.top |
| suspicious |
www.parsefilm.com |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
1924 | explorer.exe | Malware Command and Control Activity Detected | ET MALWARE FormBook CnC Checkin (GET) |
332 | svchost.exe | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |
1924 | explorer.exe | Potentially Bad Traffic | ET INFO HTTP Request to a *.top domain |