| File name: | INQ_001825ABCPrj.docx |
| Full analysis: | https://app.any.run/tasks/f1bdf50e-970d-4067-be3f-cca1e2d6df36 |
| Verdict: | Malicious activity |
| Threats: | FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus. |
| Analysis date: | February 18, 2025, 15:53:44 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v2.0 to extract, compression method=store |
| MD5: | 4D87B432D9C56C5677102264C6AEE91F |
| SHA1: | 586C960C19829C54A92276655CF9048A31E596F3 |
| SHA256: | 95E45D55E2FC6DD48ACDDAEED3DA271D42F1422FA49F13FEEB42016A1A69816E |
| SSDEEP: | 12288:K9cEPZ2Lxg/LdkoR40+tPOYAMQVaGjrcMh4hIYV66daE:EJ8gjdkB0OhAdVaioMh4hIW66daE |
| .docx | | | Word Microsoft Office Open XML Format document (52.2) |
|---|---|---|
| .zip | | | Open Packaging Conventions container (38.8) |
| .zip | | | ZIP compressed archive (8.8) |
| ZipRequiredVersion: | 20 |
|---|---|
| ZipBitFlag: | - |
| ZipCompression: | None |
| ZipModifyDate: | 2025:02:13 16:20:38 |
| ZipCRC: | 0x00000000 |
| ZipCompressedSize: | - |
| ZipUncompressedSize: | - |
| ZipFileName: | _rels/ |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 124 | "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open C:\Users\admin\Desktop\document.xml.rels | C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: XML Editor Exit code: 0 Version: 14.0.4750.1000 Modules
| |||||||||||||||
| 280 | "C:\Windows\SysWOW64\PATHPING.EXE" | C:\Windows\SysWOW64\PATHPING.EXE | — | rundll32.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: TCP/IP PathPing Command Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 300 | C:\Users\admin\AppData\Local\Temp\RtkAudUService64.exe AC | C:\Users\admin\AppData\Local\Temp\RtkAudUService64.exe | cmd.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 340 | "C:\Windows\SysWOW64\PATHPING.EXE" | C:\Windows\SysWOW64\PATHPING.EXE | rundll32.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: TCP/IP PathPing Command Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 404 | C:\Windows\system32\svchost.exe -k NetworkService | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 592 | "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3744 CREDAT:78849 /prefetch:2 | C:\Program Files (x86)\Internet Explorer\iexplore.exe | — | iexplore.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Exit code: 0 Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
| 888 | C:\Windows\System32\cmd.exe /c copy C:\Users\Public\Downloads\RtkAudUService64.exe C:\Users\%username%\AppData\Roaming\Templates | C:\Windows\System32\cmd.exe | — | RtkAudUService64.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 960 | C:\Windows\System32\cmd.exe /c copy C:\Users\%username%\AppData\Local\Temp\RtkAudUService64.exe C:\Users\%username%\AppData\Roaming\Templates | C:\Windows\System32\cmd.exe | RtkAudUService64.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1120 | C:\Windows\System32\cmd.exe /c copy C:\Users\%username%\AppData\Local\Temp\nethost.dll C:\Users\%username%\AppData\Roaming\Templates | C:\Windows\System32\cmd.exe | — | RtkAudUService64.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1268 | C:\Windows\System32\cmd.exe /c copy C:\Users\Public\Downloads\RtkAudUService64.exe C:\Users\%username%\AppData\Roaming\Templates | C:\Windows\System32\cmd.exe | — | RtkAudUService64.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| (PID) Process: | (2936) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems |
| Operation: | write | Name: | n/8 |
Value: 6E2F3800780B0000010000000000000000000000 | |||
| (PID) Process: | (2936) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1033 |
Value: Off | |||
| (PID) Process: | (2936) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1041 |
Value: Off | |||
| (PID) Process: | (2936) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1042 |
Value: Off | |||
| (PID) Process: | (2936) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1046 |
Value: Off | |||
| (PID) Process: | (2936) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1036 |
Value: Off | |||
| (PID) Process: | (2936) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1031 |
Value: Off | |||
| (PID) Process: | (2936) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1040 |
Value: Off | |||
| (PID) Process: | (2936) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1049 |
Value: Off | |||
| (PID) Process: | (2936) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 3082 |
Value: Off | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2936 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVREBAF.tmp.cvr | — | |
MD5:— | SHA256:— | |||
| 2516 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRF767.tmp.cvr | — | |
MD5:— | SHA256:— | |||
| 2936 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\RtkAudUService64.exe:Zone.Identifier | text | |
MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B | SHA256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913 | |||
| 2936 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$Q_001825ABCPrj.docx | binary | |
MD5:7E46B23508AC4528D0B04CB97926E0EA | SHA256:E96CFC2B06BDB0D7D30F1EB6F3201876A29E704CC03AE5CCD02878ADC7D5D77E | |||
| 300 | RtkAudUService64.exe | C:\Users\admin\AppData\Local\Temp\wc137B.tmp | — | |
MD5:— | SHA256:— | |||
| 3772 | RtkAudUService64.exe | C:\Users\admin\AppData\Local\Temp\wc1B3B.tmp | — | |
MD5:— | SHA256:— | |||
| 2936 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\RtkAudUService64 (2).exe | executable | |
MD5:720F2634FE2E508EFE789B333E0043E8 | SHA256:38502A7852B56C500CABA4CD92E15A67B745BB778FD452214BBC5599FF738C99 | |||
| 2936 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\nethost (2).dll | executable | |
MD5:7326F6FA581C06AF70D264D4407EB584 | SHA256:108A118D2554B11FF7A369B26E65320EFA8783DB51A35386FAAB1A0259ADC2BA | |||
| 2936 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\nethost (2).dll:Zone.Identifier | text | |
MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B | SHA256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913 | |||
| 1916 | explorer.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\Bolivia.rtf.lnk | binary | |
MD5:9069BC44FFEF513AB034CEF6A4C70512 | SHA256:A3D04B85C0A7B975772AE531FBD59727F051EF1EA4B646BD666CDE36C55BB082 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1916 | explorer.exe | POST | 405 | 13.248.169.48:80 | http://www.garfo.xyz/35rt/ | unknown | — | — | malicious |
2880 | WINWORD.EXE | POST | 302 | 92.123.18.10:80 | http://go.microsoft.com/fwlink/?LinkID=120750 | unknown | — | — | whitelisted |
2880 | WINWORD.EXE | POST | 302 | 92.123.18.10:80 | http://go.microsoft.com/fwlink/?LinkID=120751 | unknown | — | — | whitelisted |
2880 | WINWORD.EXE | POST | 302 | 92.123.18.10:80 | http://go.microsoft.com/fwlink/?LinkID=120752 | unknown | — | — | whitelisted |
1916 | explorer.exe | GET | 404 | 104.21.112.1:80 | http://www.tumbetgirislinki.fit/i8hk/?R9WjC=t-qzCTw8NlS50Md&bAzBpF=K+pOOopymkknXfkwRMOODRnImAE84SOFWu/9K2ORM5db05+i9FCCCEOBxkitCmszUvDEDc3uFMal6ws8EFgKUfLm96GiPiVA6tmaiLUWN0tILc0KGSLI7+KDSxTz | unknown | — | — | malicious |
340 | PATHPING.EXE | GET | 200 | 45.33.6.223:80 | http://www.sqlite.org/2018/sqlite-dll-win32-x86-3220000.zip | unknown | — | — | whitelisted |
1916 | explorer.exe | POST | 405 | 13.248.169.48:80 | http://www.garfo.xyz/35rt/ | unknown | — | — | malicious |
1916 | explorer.exe | POST | 405 | 13.248.169.48:80 | http://www.garfo.xyz/35rt/ | unknown | — | — | malicious |
1916 | explorer.exe | GET | 200 | 13.248.169.48:80 | http://www.garfo.xyz/35rt/?bAzBpF=bXJGOrFa4jMYz/J1RPPonv+vRvtdlVQruKbZMpq3JR37y95WDNt8nzvZ2V5ofaBeOYeERyvLhcpbbu6Cmq0iYxcHOJ+3oXbx5JLLj2xMQFKu1/X376vyLErhN2WQ&R9WjC=t-qzCTw8NlS50Md | unknown | — | — | malicious |
1916 | explorer.exe | POST | 403 | 156.224.244.124:80 | http://www.grcgrg.net/jxyu/ | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
300 | RtkAudUService64.exe | 104.21.96.1:443 | www2.0zz0.com | CLOUDFLARENET | — | whitelisted |
3772 | RtkAudUService64.exe | 104.21.96.1:443 | www2.0zz0.com | CLOUDFLARENET | — | whitelisted |
3744 | iexplore.exe | 152.199.21.175:443 | iecvlist.microsoft.com | EDGECAST | DE | whitelisted |
1460 | RtkAudUService64.exe | 104.21.96.1:443 | www2.0zz0.com | CLOUDFLARENET | — | malicious |
2880 | WINWORD.EXE | 92.123.18.10:80 | go.microsoft.com | AKAMAI-AS | AT | whitelisted |
2880 | WINWORD.EXE | 20.83.72.98:443 | activation.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
1916 | explorer.exe | 104.21.112.1:80 | www2.0zz0.com | CLOUDFLARENET | — | malicious |
340 | PATHPING.EXE | 45.33.6.223:80 | www.sqlite.org | Linode, LLC | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
www2.0zz0.com |
| whitelisted |
api.bing.com |
| whitelisted |
www.bing.com |
| whitelisted |
iecvlist.microsoft.com |
| whitelisted |
r20swj13mr.microsoft.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
activation.sls.microsoft.com |
| whitelisted |
www.tumbetgirislinki.fit |
| malicious |
www.sqlite.org |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
1916 | explorer.exe | Malware Command and Control Activity Detected | ET MALWARE FormBook CnC Checkin (GET) M5 |
1916 | explorer.exe | A Network Trojan was detected | STEALER [ANY.RUN] Formbook HTTP Header |
1916 | explorer.exe | A Network Trojan was detected | STEALER [ANY.RUN] Formbook HTTP Header |
1916 | explorer.exe | A Network Trojan was detected | STEALER [ANY.RUN] Formbook HTTP Header |
1916 | explorer.exe | A Network Trojan was detected | STEALER [ANY.RUN] Formbook HTTP Header |
1916 | explorer.exe | A Network Trojan was detected | STEALER [ANY.RUN] Formbook HTTP Header |
1916 | explorer.exe | Malware Command and Control Activity Detected | ET MALWARE FormBook CnC Checkin (GET) M5 |
1916 | explorer.exe | A Network Trojan was detected | STEALER [ANY.RUN] Formbook HTTP Header |
1916 | explorer.exe | A Network Trojan was detected | STEALER [ANY.RUN] Formbook HTTP Header |
1916 | explorer.exe | A Network Trojan was detected | STEALER [ANY.RUN] Formbook HTTP Header |