| File name: | ___Purchase Order_ 100534-PO#2500006039.eml |
| Full analysis: | https://app.any.run/tasks/d63f777d-e792-44ca-9a7d-cc1c2943131f |
| Verdict: | Malicious activity |
| Threats: | FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus. |
| Analysis date: | November 23, 2023, 09:19:24 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | message/rfc822 |
| File info: | RFC 822 mail, ASCII text, with CRLF line terminators |
| MD5: | 41909CF08CA6F174B16F2C75BE44BF30 |
| SHA1: | 0658BEC67293539C9730A140915F792F3D97238F |
| SHA256: | 99D4033BA63BD38A7F34D7551F09C9D2B920DCF3A913A7787B1212E9BF70CFFE |
| SSDEEP: | 1536:ylaD5XsX2xHCz7rjLbosox+OwsA1rCKV5DxGllgoMD:ylaY2orjPIoOw17AllO |
| .eml | | | E-Mail message (Var. 5) (100) |
|---|
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 296 | "C:\Users\admin\AppData\Local\Temp\wmgmjd.exe" | C:\Users\admin\AppData\Local\Temp\wmgmjd.exe | — | asusns.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 588 | "C:\Windows\System32\dwm.exe" | C:\Windows\System32\dwm.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Desktop Window Manager Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
Formbook(PID) Process(588) dwm.exe C2www.memezon.net/hph0/ Strings (79)USERNAME LOCALAPPDATA USERPROFILE APPDATA TEMP ProgramFiles CommonProgramFiles ALLUSERSPROFILE /c copy " /c del " \Run \Policies \Explorer \Registry\User \Registry\Machine \SOFTWARE\Microsoft\Windows\CurrentVersion Office\15.0\Outlook\Profiles\Outlook\ NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\ \SOFTWARE\Mozilla\Mozilla \Mozilla Username: Password: formSubmitURL usernameField encryptedUsername encryptedPassword \logins.json \signons.sqlite \Microsoft\Vault\ SELECT encryptedUsername, encryptedPassword, formSubmitURL FROM moz_logins \Google\Chrome\User Data\Default\Login Data SELECT origin_url, username_value, password_value FROM logins .exe .com .scr .pif .cmd .bat ms win gdi mfc vga igfx user help config update regsvc chkdsk systray audiodg certmgr autochk taskhost colorcpl services IconCache ThumbCache Cookies SeDebugPrivilege SeShutdownPrivilege \BaseNamedObjects config.php POST HTTP/1.1 Host: Connection: close Content-Length: Cache-Control: no-cache Origin: http:// User-Agent: Mozilla Firefox/4.0 Content-Type: application/x-www-form-urlencoded Accept: */* Referer: http:// Accept-Language: en-US Accept-Encoding: gzip, deflate
dat= f-start f-end Decoy C2 (64)sikisizlef.click hottrendstore.com aaroncordova.com acemarketcommerce.com connectdata.pro wallerbrewery.com kentos-nude.online anlizhi.net turismdelta.com xgicloud.top jahialo.com warthercutlery.shop wtlogryx.click gbjyksm0czbki7.icu sharmeventsplanner.com plast.press cyphersentinel.com homes.credit www11312011.com rwalion.com wwwfuddruckers.com turkpinnup-se.click bl-mall.xyz dpworldtanzania.com iloveall-inclusive.com zqrrhmvsvl.top empiremarketingassociates.com bworks.dev offline-energy.com 51xjjd.com mobilerepportal.com livesexcams19.com dollarsymphony.com poscatpiscis.com soeasy777.net exabeam.info animanarrante.com joliecuisinenatchez.com nmmobiles.com daikisuzuki-com.top bb6aa.com moversetobicoke.com elektrai.com zfast.com originhub.net pvcwindows.life thepicklepantry.com glowbeautysuncare.com specmall.top fun-now.com sgh4k6g.xyz bestelysium.com adknanny.com floridahomesnow.com kacateringpersky.com oregoncupping.clinic tmdnfr.website xiaolan1001.com wenjing-yard.com cryptoesports.pro getcreditcard-au.bond grcontemporaryart.com analdudes.com bestpriceddeals.com | |||||||||||||||
| 608 | "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding | C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE | svchost.exe | ||||||||||||
User: admin Company: Design Science, Inc. Integrity Level: MEDIUM Description: Microsoft Equation Editor Exit code: 0 Version: 00110900 Modules
| |||||||||||||||
| 684 | "C:\Program Files\Windows Media Player\wmpnscfg.exe" | C:\Program Files\Windows Media Player\wmpnscfg.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Media Player Network Sharing Service Configuration Application Exit code: 0 Version: 12.0.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1640 | "C:\Users\admin\AppData\Local\Temp\wmgmjd.exe" | C:\Users\admin\AppData\Local\Temp\wmgmjd.exe | — | wmgmjd.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 1856 | "C:\Users\admin\AppData\Roaming\asusns.exe" | C:\Users\admin\AppData\Roaming\asusns.exe | — | EQNEDT32.EXE | |||||||||||
User: admin Company: concern Integrity Level: MEDIUM Description: equip Exit code: 0 Version: 6.10.5.0 Modules
| |||||||||||||||
| 2444 | /c del "C:\Users\admin\AppData\Local\Temp\wmgmjd.exe" | C:\Windows\System32\cmd.exe | — | dwm.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 3460 | "C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE" /eml "C:\Users\admin\AppData\Local\Temp\___Purchase Order_ 100534-PO#2500006039.eml" | C:\Program Files\Microsoft Office\Office14\OUTLOOK.EXE | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Outlook Exit code: 0 Version: 14.0.6025.1000 Modules
| |||||||||||||||
| 3736 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Embedding | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | WINWORD.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Microsoft Word Exit code: 0 Version: 14.0.6024.1000 Modules
| |||||||||||||||
| 3828 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Embedding | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | OUTLOOK.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Microsoft Word Exit code: 0 Version: 14.0.6024.1000 Modules
| |||||||||||||||
| (PID) Process: | (3460) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1033 |
Value: On | |||
| (PID) Process: | (3460) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1041 |
Value: On | |||
| (PID) Process: | (3460) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1046 |
Value: On | |||
| (PID) Process: | (3460) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1036 |
Value: On | |||
| (PID) Process: | (3460) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1031 |
Value: On | |||
| (PID) Process: | (3460) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1040 |
Value: On | |||
| (PID) Process: | (3460) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1049 |
Value: On | |||
| (PID) Process: | (3460) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 3082 |
Value: On | |||
| (PID) Process: | (3460) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1042 |
Value: On | |||
| (PID) Process: | (3460) OUTLOOK.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1055 |
Value: On | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3460 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Temp\CVR715C.tmp.cvr | — | |
MD5:— | SHA256:— | |||
| 3460 | OUTLOOK.EXE | C:\Users\admin\Documents\Outlook Files\Outlook Data File - NoMail.pst | — | |
MD5:— | SHA256:— | |||
| 3908 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR94F1.tmp.cvr | — | |
MD5:— | SHA256:— | |||
| 3460 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\Outlook\mapisvc.inf | text | |
MD5:F3B25701FE362EC84616A93A45CE9998 | SHA256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209 | |||
| 3908 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\OICE_D1E57C0C-620C-45B1-AA3A-2EBEEAA9909F.0\20F72B76.docx:Zone.Identifier:$DATA | text | |
MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B | SHA256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913 | |||
| 3460 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\ZOBTJ9AX\PO25006039 (2).docx | document | |
MD5:D732E057D158D9D6CC1F2DD1BB5095A8 | SHA256:B83D419B53D64D4B11C32F125C2148FF9F28820AE51055A2ADDA6C98804563C2 | |||
| 3908 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | binary | |
MD5:D89472701791EDE1B158BED3131F9EB7 | SHA256:D4FA092ED464870979DE9157C800B754EFBE6E36A28700A10CA42DAFA61D6847 | |||
| 3908 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\OICE_D1E57C0C-620C-45B1-AA3A-2EBEEAA9909F.0\20F72B76.docx | document | |
MD5:D732E057D158D9D6CC1F2DD1BB5095A8 | SHA256:B83D419B53D64D4B11C32F125C2148FF9F28820AE51055A2ADDA6C98804563C2 | |||
| 3460 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\ZOBTJ9AX\PO25006039.docx:Zone.Identifier | text | |
MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B | SHA256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913 | |||
| 3908 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\{7E38C763-FBEB-4CBC-B022-B26405C10392} | binary | |
MD5:D020C6911F4E9FC4F39306C6F70CA597 | SHA256:8A2EAB3D400506DCBAC422E117AFA549E3D76CF265D24A1DBFBF4EBCD7501928 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3908 | WINWORD.EXE | OPTIONS | 301 | 104.21.48.17:80 | http://tyny.to/ | unknown | — | — | unknown |
828 | svchost.exe | PROPFIND | 301 | 104.21.48.17:80 | http://tyny.to/ | unknown | — | — | unknown |
3908 | WINWORD.EXE | HEAD | 301 | 104.21.48.17:80 | http://tyny.to/sc28a9 | unknown | — | — | unknown |
828 | svchost.exe | OPTIONS | 301 | 104.21.48.17:80 | http://tyny.to/ | unknown | — | — | unknown |
828 | svchost.exe | PROPFIND | 301 | 104.21.48.17:80 | http://tyny.to/ | unknown | — | — | unknown |
3908 | WINWORD.EXE | GET | 200 | 142.250.184.195:80 | http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D | unknown | binary | 1.41 Kb | unknown |
3908 | WINWORD.EXE | GET | 200 | 87.248.204.0:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?90d899bcfc7c8713 | unknown | compressed | 4.66 Kb | unknown |
3908 | WINWORD.EXE | GET | 200 | 142.250.184.195:80 | http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFCjJ1PwkYAi7fE%3D | unknown | binary | 724 b | unknown |
3908 | WINWORD.EXE | GET | 200 | 66.175.208.79:80 | http://66.175.208.79/htm/brwoserdeletedentirehistoryfromthepcforclean.doc | unknown | text | 55.2 Kb | unknown |
828 | svchost.exe | PROPFIND | 301 | 104.21.48.17:80 | http://tyny.to/ | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2588 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
3460 | OUTLOOK.EXE | 64.4.26.155:80 | config.messenger.msn.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
3908 | WINWORD.EXE | 104.21.48.17:80 | tyny.to | CLOUDFLARENET | — | unknown |
3908 | WINWORD.EXE | 104.21.48.17:443 | tyny.to | CLOUDFLARENET | — | unknown |
828 | svchost.exe | 104.21.48.17:80 | tyny.to | CLOUDFLARENET | — | unknown |
828 | svchost.exe | 104.21.48.17:443 | tyny.to | CLOUDFLARENET | — | unknown |
3908 | WINWORD.EXE | 87.248.204.0:80 | ctldl.windowsupdate.com | LLNW | US | unknown |
Domain | IP | Reputation |
|---|---|---|
config.messenger.msn.com |
| whitelisted |
tyny.to |
| malicious |
ctldl.windowsupdate.com |
| whitelisted |
ocsp.pki.goog |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
1080 | svchost.exe | Potentially Bad Traffic | ET DNS Query for .to TLD |
3908 | WINWORD.EXE | Misc activity | ET USER_AGENTS Microsoft Office Existence Discovery User-Agent |
3908 | WINWORD.EXE | Potentially Bad Traffic | ET INFO Dotted Quad Host DOC Request |
3908 | WINWORD.EXE | Potentially Bad Traffic | ET HUNTING Microsoft Office User-Agent Requesting A Doc File |
3908 | WINWORD.EXE | Potentially Bad Traffic | ET INFO Possible RTF File With Obfuscated Version Header |
3908 | WINWORD.EXE | Potentially Bad Traffic | ET INFO Dotted Quad Host DOC Request |
608 | EQNEDT32.EXE | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
608 | EQNEDT32.EXE | A Network Trojan was detected | ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 |
608 | EQNEDT32.EXE | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
608 | EQNEDT32.EXE | A Network Trojan was detected | ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 |