File name:

DHL AWB TRACKING DETAILS.PDF.zip

Full analysis: https://app.any.run/tasks/f90a2bc5-19a1-44be-bee0-5b7d7f78462f
Verdict: Malicious activity
Threats:

FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus.

Analysis date: April 29, 2025, 10:50:25
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
stealer
formbook
xloader
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

8B422BB5C0958AE9FD917515D956AA6E

SHA1:

CEF7FCCB8BDD7639F2B09CCF070799581A566043

SHA256:

9EEB8F7853179CE34762B59EB8D789567D09619DAFCC15DEE4843C72077C9ED2

SSDEEP:

24576:uJY3vtGFzRQvNEH4VH0YeaBTdQFk+j8I5setD+QSZofREEQe8RM+DEby:uJY3vtGFzRQvNEYVH0YeaBJQFk+j8I5k

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 5048)
    • Uses Task Scheduler to run other applications

      • DHL AWB TRACKING DETAILS.exe (PID: 4108)
      • DHL AWB TRACKING DETAILS.exe (PID: 1128)
    • Actions looks like stealing of personal data

      • notepad.exe (PID: 5164)
    • FORMBOOK has been detected (SURICATA)

      • WinRAR.exe (PID: 5048)
  • SUSPICIOUS

    • Start notepad (likely ransomware note)

      • WinRAR.exe (PID: 5048)
    • Application launched itself

      • DHL AWB TRACKING DETAILS.exe (PID: 1128)
      • DHL AWB TRACKING DETAILS.exe (PID: 4108)
    • Executable content was dropped or overwritten

      • DHL AWB TRACKING DETAILS.exe (PID: 1128)
    • Reads security settings of Internet Explorer

      • DHL AWB TRACKING DETAILS.exe (PID: 1128)
      • DHL AWB TRACKING DETAILS.exe (PID: 4108)
  • INFO

    • Reads the machine GUID from the registry

      • DHL AWB TRACKING DETAILS.exe (PID: 1128)
      • DHL AWB TRACKING DETAILS.exe (PID: 2908)
      • DHL AWB TRACKING DETAILS.exe (PID: 4108)
    • Checks supported languages

      • DHL AWB TRACKING DETAILS.exe (PID: 1128)
      • DHL AWB TRACKING DETAILS.exe (PID: 2908)
      • DHL AWB TRACKING DETAILS.exe (PID: 4108)
      • DHL AWB TRACKING DETAILS.exe (PID: 2516)
      • DHL AWB TRACKING DETAILS.exe (PID: 6940)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 5048)
    • Reads the computer name

      • DHL AWB TRACKING DETAILS.exe (PID: 1128)
      • DHL AWB TRACKING DETAILS.exe (PID: 2908)
      • DHL AWB TRACKING DETAILS.exe (PID: 4108)
    • Manual execution by a user

      • DHL AWB TRACKING DETAILS.exe (PID: 1128)
      • DHL AWB TRACKING DETAILS.exe (PID: 2908)
      • DHL AWB TRACKING DETAILS.exe (PID: 4108)
    • Create files in a temporary directory

      • DHL AWB TRACKING DETAILS.exe (PID: 4108)
      • notepad.exe (PID: 5164)
      • DHL AWB TRACKING DETAILS.exe (PID: 1128)
    • Process checks computer location settings

      • DHL AWB TRACKING DETAILS.exe (PID: 4108)
      • DHL AWB TRACKING DETAILS.exe (PID: 1128)
    • Reads the software policy settings

      • slui.exe (PID: 4448)
      • slui.exe (PID: 5600)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 5164)
    • Creates files or folders in the user directory

      • DHL AWB TRACKING DETAILS.exe (PID: 1128)
    • Checks proxy server information

      • slui.exe (PID: 5600)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2025:04:29 09:08:50
ZipCRC: 0x5aab9a34
ZipCompressedSize: 740631
ZipUncompressedSize: 854016
ZipFileName: DHL AWB TRACKING DETAILS.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
145
Monitored processes
16
Malicious processes
2
Suspicious processes
2

Behavior graph

Click at the process to see the details
start #FORMBOOK winrar.exe sppextcomobj.exe no specs slui.exe dhl awb tracking details.exe dhl awb tracking details.exe dhl awb tracking details.exe no specs schtasks.exe no specs conhost.exe no specs dhl awb tracking details.exe no specs dhl awb tracking details.exe no specs notepad.exe schtasks.exe no specs conhost.exe no specs dhl awb tracking details.exe no specs slui.exe firefox.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
632\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeschtasks.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1128"C:\Users\admin\Desktop\DHL AWB TRACKING DETAILS.exe" C:\Users\admin\Desktop\DHL AWB TRACKING DETAILS.exe
explorer.exe
User:
admin
Company:
HP Inc.
Integrity Level:
MEDIUM
Description:
Sgm_Student_Information
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\dhl awb tracking details.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
1628\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeschtasks.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2516"C:\Users\admin\Desktop\DHL AWB TRACKING DETAILS.exe"C:\Users\admin\Desktop\DHL AWB TRACKING DETAILS.exeDHL AWB TRACKING DETAILS.exe
User:
admin
Company:
HP Inc.
Integrity Level:
MEDIUM
Description:
Sgm_Student_Information
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\dhl awb tracking details.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
2908"C:\Users\admin\Desktop\DHL AWB TRACKING DETAILS.exe" C:\Users\admin\Desktop\DHL AWB TRACKING DETAILS.exe
explorer.exe
User:
admin
Company:
HP Inc.
Integrity Level:
HIGH
Description:
Sgm_Student_Information
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\dhl awb tracking details.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
4024"C:\Users\admin\Desktop\DHL AWB TRACKING DETAILS.exe"C:\Users\admin\Desktop\DHL AWB TRACKING DETAILS.exeDHL AWB TRACKING DETAILS.exe
User:
admin
Company:
HP Inc.
Integrity Level:
MEDIUM
Description:
Sgm_Student_Information
Exit code:
4294967295
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\dhl awb tracking details.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
4108"C:\Users\admin\Desktop\DHL AWB TRACKING DETAILS.exe" C:\Users\admin\Desktop\DHL AWB TRACKING DETAILS.exeexplorer.exe
User:
admin
Company:
HP Inc.
Integrity Level:
MEDIUM
Description:
Sgm_Student_Information
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\dhl awb tracking details.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
4200"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GvreDyIXrAzP" /XML "C:\Users\admin\AppData\Local\Temp\tmp7BE4.tmp"C:\Windows\SysWOW64\schtasks.exeDHL AWB TRACKING DETAILS.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
4336"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GvreDyIXrAzP" /XML "C:\Users\admin\AppData\Local\Temp\tmpC5BE.tmp"C:\Windows\SysWOW64\schtasks.exeDHL AWB TRACKING DETAILS.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\oleaut32.dll
4448"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
4 904
Read events
4 877
Write events
14
Delete events
13

Modification events

(PID) Process:(5048) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(5048) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(5048) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(5048) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\DHL AWB TRACKING DETAILS.PDF.zip
(PID) Process:(5048) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(5048) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(5048) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(5048) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(5048) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:15
Value:
(PID) Process:(5048) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:14
Value:
Executable files
2
Suspicious files
1
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
5164notepad.exeC:\Users\admin\AppData\Local\Temp\w2-0G0-7binary
MD5:A45465CDCDC6CB30C8906F3DA4EC114C
SHA256:4412319EF944EBCCA9581CBACB1D4E1DC614C348D1DFC5D2FAAAAD863D300209
1128DHL AWB TRACKING DETAILS.exeC:\Users\admin\AppData\Roaming\GvreDyIXrAzP.exeexecutable
MD5:B5046CA7FF13822C29BDAED43364F7B8
SHA256:C81190B655F1CD5942CCC5766917C798477A21599CE465AAA8EC04BC98EEB2B9
5048WinRAR.exeC:\Users\admin\Desktop\DHL AWB TRACKING DETAILS.exeexecutable
MD5:B5046CA7FF13822C29BDAED43364F7B8
SHA256:C81190B655F1CD5942CCC5766917C798477A21599CE465AAA8EC04BC98EEB2B9
1128DHL AWB TRACKING DETAILS.exeC:\Users\admin\AppData\Local\Temp\tmp7BE4.tmpxml
MD5:E0C2C395BEDCB2AB97D0215E9DA9F8B0
SHA256:2610FBAE9F0E85D151D288706536AF7E99EC0EF61C3A0B3F081C6276F7B0C649
4108DHL AWB TRACKING DETAILS.exeC:\Users\admin\AppData\Local\Temp\tmpC5BE.tmpxml
MD5:E0C2C395BEDCB2AB97D0215E9DA9F8B0
SHA256:2610FBAE9F0E85D151D288706536AF7E99EC0EF61C3A0B3F081C6276F7B0C649
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
20
TCP/UDP connections
38
DNS requests
18
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.216.77.6:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.6:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1184
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1184
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5048
WinRAR.exe
POST
405
3.33.130.190:80
http://www.it2sp8.vip/7ufe/
unknown
unknown
5048
WinRAR.exe
GET
403
208.91.197.27:80
http://www.themessageart.online/qap9/?5th=xSaU-f6fCQvjev&Tb4Ft3P=oFuHuq6DiuAzSboqcqNqm+G6EBqRoLkGkI2UG0m+HHiCKV3Q2jcVXtTCUOlShxO6XQy6ZRE8ULiq4etI7OGA2IEYlOQY/x32KqJkV4O+N013gP7GJBiZskOiR1O9KkrwR7Q54kQ=
unknown
unknown
5048
WinRAR.exe
POST
405
3.33.130.190:80
http://www.it2sp8.vip/7ufe/
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2104
svchost.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.6:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.216.77.6:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:137
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.31.3:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.206.46
whitelisted
crl.microsoft.com
  • 23.216.77.6
  • 23.216.77.28
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 40.126.31.3
  • 20.190.159.131
  • 20.190.159.73
  • 40.126.31.0
  • 20.190.159.23
  • 40.126.31.131
  • 20.190.159.71
  • 20.190.159.4
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted
nexusrules.officeapps.live.com
  • 52.111.229.19
whitelisted

Threats

PID
Process
Class
Message
5048
WinRAR.exe
A Network Trojan was detected
STEALER [ANY.RUN] Formbook HTTP Header
5048
WinRAR.exe
A Network Trojan was detected
STEALER [ANY.RUN] Formbook HTTP Header
5048
WinRAR.exe
A Network Trojan was detected
STEALER [ANY.RUN] Formbook HTTP Header
5048
WinRAR.exe
A Network Trojan was detected
STEALER [ANY.RUN] Formbook HTTP Header
No debug info