| File name: | IGCC.exe |
| Full analysis: | https://app.any.run/tasks/b0184209-d52c-4e31-a0e4-65f5b631f973 |
| Verdict: | Malicious activity |
| Threats: | FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus. |
| Analysis date: | November 06, 2023, 18:36:51 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive |
| MD5: | 7EFE414B31A738CE12F60B13EAB8048E |
| SHA1: | 48A2398697B7C0A45D60D7B34D15431C92298C8C |
| SHA256: | B68DEAD34DDB1B8D099EA67E476E174B7081BCC293A1A4FA77AFC5BCE3A51A7C |
| SSDEEP: | 6144:DQWIJFCV8KbM44NTkxxC0K83krQGbHEP8ZaUfIMPoGKpC10Loz8i8xX2j8Pa:IJFMpd41MXMrr4P8ICIEoGKA10LozH+a |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2016:04:02 05:20:13+02:00 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 6 |
| CodeSize: | 24576 |
| InitializedDataSize: | 164864 |
| UninitializedDataSize: | 1024 |
| EntryPoint: | 0x312a |
| OSVersion: | 4 |
| ImageVersion: | 6 |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1944 | C:\Windows\Explorer.EXE | C:\Windows\explorer.exe | — | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2004 | /c del "C:\Users\admin\AppData\Local\Temp\eslgt.exe" | C:\Windows\SysWOW64\cmd.exe | — | raserver.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2216 | "C:\Windows\SysWOW64\raserver.exe" | C:\Windows\SysWOW64\raserver.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Remote Assistance COM Server Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
Formbook(PID) Process(2216) raserver.exe C2www.sarthaksrishticreation.com/sy22/ Strings (79)USERNAME LOCALAPPDATA USERPROFILE APPDATA TEMP ProgramFiles CommonProgramFiles ALLUSERSPROFILE /c copy " /c del " \Run \Policies \Explorer \Registry\User \Registry\Machine \SOFTWARE\Microsoft\Windows\CurrentVersion Office\15.0\Outlook\Profiles\Outlook\ NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\ \SOFTWARE\Mozilla\Mozilla \Mozilla Username: Password: formSubmitURL usernameField encryptedUsername encryptedPassword \logins.json \signons.sqlite \Microsoft\Vault\ SELECT encryptedUsername, encryptedPassword, formSubmitURL FROM moz_logins \Google\Chrome\User Data\Default\Login Data SELECT origin_url, username_value, password_value FROM logins .exe .com .scr .pif .cmd .bat ms win gdi mfc vga igfx user help config update regsvc chkdsk systray audiodg certmgr autochk taskhost colorcpl services IconCache ThumbCache Cookies SeDebugPrivilege SeShutdownPrivilege \BaseNamedObjects config.php POST HTTP/1.1 Host: Connection: close Content-Length: Cache-Control: no-cache Origin: http:// User-Agent: Mozilla Firefox/4.0 Content-Type: application/x-www-form-urlencoded Accept: */* Referer: http:// Accept-Language: en-US Accept-Encoding: gzip, deflate
dat= f-start f-end Decoy C2 (64)vinteligencia.com displayfridges.fun completetip.com giallozafferrano.com jizihao1.com mysticheightstrail.com fourseasonslb.com kjnala.shop mosiacwall.com vandistreet.com gracefullytouchedartistry.com hbiwhwr.shop mfmz.net hrmbrillianz.com funwarsztat.com polewithcandy.com ourrajasthan.com wilhouettteamerica.com johnnystintshop.com asgnelwin.com alcmcyu.com thwmlohr.click gypseascuba.com mysonisgaythemovie.com sunriseautostorellc.com fuhouse.link motorcycleglassesshop.com vaskaworldairways.com qixservice.online b2b-scaling.com 03ss.vip trishpintar.com gk84.com omclaval.com emeeycarwash.com wb7mnp.com kimgj.com 278809.com summitstracecolumbus.com dryadai.com vistcreative.com weoliveorder.com kwamitikki.com cjk66.online travisline.pro mercardosupltda.shop sunspotplumbing.com podplugca.com leontellez.com fzturf.com docomo-mobileconsulting.com apneabirmingham.info rollesgraciejiujitsu.com sx15k.com kebobcapital.com 91967.net claudiaduverglas.com zhperviepixie.com oliwas.xyz flowersinspace.tech uadmxqby.click greatbaitusa.com drpenawaraircondhargarahmah.com sofbks.top | |||||||||||||||
| 2348 | "C:\Users\admin\AppData\Local\Temp\eslgt.exe" | C:\Users\admin\AppData\Local\Temp\eslgt.exe | — | IGCC.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 2600 | "C:\Users\admin\AppData\Local\Temp\IGCC.exe" | C:\Users\admin\AppData\Local\Temp\IGCC.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 2688 | "C:\Users\admin\AppData\Local\Temp\eslgt.exe" | C:\Users\admin\AppData\Local\Temp\eslgt.exe | — | eslgt.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (1944) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{01979c6a-42fa-414c-b8aa-eee2c8202018}.check.100 |
| Operation: | write | Name: | CheckSetting |
Value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| |||
| (PID) Process: | (1944) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0 |
| Operation: | write | Name: | CheckSetting |
Value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| |||
| (PID) Process: | (1944) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count |
| Operation: | write | Name: | HRZR_PGYFRFFVBA |
Value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| |||
| (PID) Process: | (1944) explorer.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\156\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2600 | IGCC.exe | C:\Users\admin\AppData\Local\Temp\wybsjo.lgk | binary | |
MD5:78B021FBDCE997B5223182F554F5FEF1 | SHA256:77C8A56F9FD94A33861E86C1D5869D8BC24EA85D8B71C7CA1F3511E2D895A41C | |||
| 2600 | IGCC.exe | C:\Users\admin\AppData\Local\Temp\eslgt.exe | executable | |
MD5:7F11092E65548CC005C1FD77C3A1CD83 | SHA256:39483676F1ADC0D9F2710A6B5F73EF4058B7F550714533D6B62E42C9FE9C4143 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1944 | explorer.exe | GET | 301 | 188.114.97.3:80 | http://www.emeeycarwash.com/sy22/?w8l=idWz9iOdlqi9cpMKmMnCD/xpUTTFozVhxOCiBLfEuopljFZ45SxfjR6yKmC12YdLqROHww==&lxld=wRAdWLp0Nd9Hv4 | unknown | — | — | unknown |
1944 | explorer.exe | GET | 200 | 64.190.63.111:80 | http://www.docomo-mobileconsulting.com/sy22/?w8l=lVM1xi+cVgAbIMHqq/1MnIj4JTU8QNZxAwtnBLuxN6GTboe8PABHdNzg0Aw6HjhMWaiOcw==&lxld=wRAdWLp0Nd9Hv4 | unknown | html | 56.2 Kb | unknown |
1944 | explorer.exe | GET | 403 | 23.227.38.74:80 | http://www.vandistreet.com/sy22/?w8l=ebYri2Un+ceGq84aIZ3RboTDPGX+2LyTyMxHYnpzeShqSQ1cgB3Zd+B5VXRplNuWuXgpXg==&lxld=wRAdWLp0Nd9Hv4 | unknown | html | 4.41 Kb | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
324 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1956 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
1944 | explorer.exe | 188.114.97.3:80 | www.emeeycarwash.com | CLOUDFLARENET | NL | unknown |
1944 | explorer.exe | 64.190.63.111:80 | www.docomo-mobileconsulting.com | SEDO GmbH | DE | unknown |
1944 | explorer.exe | 23.227.38.74:80 | www.vandistreet.com | CLOUDFLARENET | CA | unknown |
1944 | explorer.exe | 82.221.141.60:80 | www.fzturf.com | Advania Island ehf | IS | unknown |
Domain | IP | Reputation |
|---|---|---|
www.emeeycarwash.com |
| unknown |
www.docomo-mobileconsulting.com |
| unknown |
www.vandistreet.com |
| unknown |
www.fzturf.com |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
1944 | explorer.exe | Malware Command and Control Activity Detected | ET MALWARE FormBook CnC Checkin (GET) |