| File name: | SEALEY UK ORDER PI DX190530.xlsx |
| Full analysis: | https://app.any.run/tasks/bdddf2dd-ec89-4761-bd1c-9edde24cf11b |
| Verdict: | Malicious activity |
| Threats: | FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus. |
| Analysis date: | June 19, 2019, 06:24:10 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/encrypted |
| File info: | CDFV2 Encrypted |
| MD5: | A50A3071CA1B34DD38A353CE402EE4ED |
| SHA1: | 56534549BA3BE16337EE16AA68FCC81AF02AD6F4 |
| SHA256: | B8D0936C7E24DFD4D68492AEE7FABA065E0EEF4D47B03B459FB590D1A2FFF53C |
| SSDEEP: | 768:MRC1jSlqm5lm1xd8jugoyT0dpB6cN3DmyQN:MXTJ9oz3DqNN |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 252 | C:\Windows\Explorer.EXE | C:\Windows\explorer.exe | ctfmon.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 568 | "C:\Program Files\Mozilla Firefox\Firefox.exe" | C:\Program Files\Mozilla Firefox\Firefox.exe | services.exe | ||||||||||||
User: admin Company: Mozilla Corporation Integrity Level: MEDIUM Description: Firefox Exit code: 0 Version: 65.0.2 Modules
| |||||||||||||||
| 1476 | C:\Program Files\Ejdfl_rt\3fxxvpr5plne.exe" | C:\Program Files\Ejdfl_rt\3fxxvpr5plne.exe | — | 3fxxvpr5plne.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Version: 1.07.0001 Modules
| |||||||||||||||
| 1504 | "C:\Program Files\Ejdfl_rt\3fxxvpr5plne.exe" | C:\Program Files\Ejdfl_rt\3fxxvpr5plne.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Version: 1.07.0001 Modules
| |||||||||||||||
| 2336 | "C:\Windows\System32\netsh.exe" | C:\Windows\System32\netsh.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Network Command Shell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2684 | C:\Users\Public\vbc.exe" | C:\Users\Public\vbc.exe | — | vbc.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Version: 1.07.0001 Modules
| |||||||||||||||
| 2796 | "C:\Windows\System32\services.exe" | C:\Windows\System32\services.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Services and Controller app Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2876 | "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /dde | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Excel Exit code: 0 Version: 14.0.6024.1000 Modules
| |||||||||||||||
| 3584 | "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding | C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE | svchost.exe | ||||||||||||
User: admin Company: Design Science, Inc. Integrity Level: MEDIUM Description: Microsoft Equation Editor Exit code: 0 Version: 00110900 Modules
| |||||||||||||||
| 3772 | C:\Windows\system32\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09} | C:\Windows\system32\DllHost.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: COM Surrogate Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (2876) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems |
| Operation: | write | Name: | m% |
Value: 6D2520003C0B0000010000000000000000000000 | |||
| (PID) Process: | (2876) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1033 |
Value: Off | |||
| (PID) Process: | (2876) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1033 |
Value: On | |||
| (PID) Process: | (2876) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel |
| Operation: | write | Name: | MTTT |
Value: 3C0B0000D20ACEA46726D50100000000 | |||
| (PID) Process: | (252) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached |
| Operation: | write | Name: | {C41662BB-1FA0-4CE0-8DC5-9B7F8279FF97} {BB2E617C-0920-11D1-9A0B-00C04FC2D6C1} 0xFFFF |
Value: 0100000000000000282C51A56726D501 | |||
| (PID) Process: | (2876) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems |
| Operation: | delete value | Name: | m% |
Value: 6D2520003C0B0000010000000000000000000000 | |||
| (PID) Process: | (2876) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems |
| Operation: | delete key | Name: | |
Value: | |||
| (PID) Process: | (2876) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency |
| Operation: | delete key | Name: | |
Value: | |||
| (PID) Process: | (2876) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (2876) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2876 | EXCEL.EXE | C:\Users\admin\AppData\Local\Temp\CVRE54D.tmp.cvr | — | |
MD5:— | SHA256:— | |||
| 2876 | EXCEL.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\72D98342.png | — | |
MD5:— | SHA256:— | |||
| 2876 | EXCEL.EXE | C:\Users\admin\AppData\Local\Temp\~DFAD605323758E3E6A.TMP | — | |
MD5:— | SHA256:— | |||
| 2876 | EXCEL.EXE | C:\Users\admin\Desktop\~$SEALEY UK ORDER PI DX190530.xlsx | — | |
MD5:— | SHA256:— | |||
| 3584 | EQNEDT32.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\frank[1].exe | executable | |
MD5:— | SHA256:— | |||
| 252 | explorer.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\SEALEY UK ORDER PI DX190530.xlsx.lnk | lnk | |
MD5:— | SHA256:— | |||
| 252 | explorer.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019061920190620\index.dat | dat | |
MD5:— | SHA256:— | |||
| 252 | explorer.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\1b4dd67f29cb1962.automaticDestinations-ms | automaticdestinations-ms | |
MD5:— | SHA256:— | |||
| 252 | explorer.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\9839aec31243a928.automaticDestinations-ms | automaticdestinations-ms | |
MD5:— | SHA256:— | |||
| 3584 | EQNEDT32.EXE | C:\Users\Public\vbc.exe | executable | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
252 | explorer.exe | GET | 301 | 74.220.215.226:80 | http://www.mtzionstl.com/mi/?FTn8o=9UQ3Pml9iZg+vknTSSRFJwLChFOr+Qx3p5wC6tigYIkAmwL2mknOhivaCDadb4zi+FJrMA==&uRpx=kjd0TfwH1JnxzH&sql=1 | US | html | 415 b | malicious |
252 | explorer.exe | POST | — | 74.220.215.226:80 | http://www.mtzionstl.com/mi/ | US | — | — | malicious |
252 | explorer.exe | POST | — | 74.220.215.226:80 | http://www.mtzionstl.com/mi/ | US | — | — | malicious |
252 | explorer.exe | GET | 301 | 107.180.51.3:80 | http://www.holisticmargin.com/mi/?FTn8o=9bFpQfKhqHZfYhUyl+6W9dytNe2N5ztWzZ/aZUH0S0bw8BgewcUJ/KkeHENGUYsggP1mVw==&uRpx=kjd0TfwH1JnxzH | US | — | — | malicious |
3584 | EQNEDT32.EXE | GET | 200 | 23.249.165.218:80 | http://promotionzynovawillzerodacontinuegood.duckdns.org/frank.exe | US | executable | 496 Kb | malicious |
252 | explorer.exe | POST | — | 74.220.215.226:80 | http://www.mtzionstl.com/mi/ | US | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3584 | EQNEDT32.EXE | 23.249.165.218:80 | promotionzynovawillzerodacontinuegood.duckdns.org | ColoCrossing | US | malicious |
252 | explorer.exe | 107.180.51.3:80 | www.holisticmargin.com | GoDaddy.com, LLC | US | malicious |
252 | explorer.exe | 74.220.215.226:80 | www.mtzionstl.com | Unified Layer | US | malicious |
Domain | IP | Reputation |
|---|---|---|
promotionzynovawillzerodacontinuegood.duckdns.org |
| malicious |
www.gosport.store |
| unknown |
www.holisticmargin.com |
| malicious |
www.mtzionstl.com |
| malicious |
www.capitalcamerarentals.com |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
1048 | svchost.exe | Misc activity | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain |
3584 | EQNEDT32.EXE | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
252 | explorer.exe | A Network Trojan was detected | MALWARE [PTsecurity] FormBook CnC Checkin (GET) |
252 | explorer.exe | A Network Trojan was detected | MALWARE [PTsecurity] FormBook CnC Checkin (GET) |
252 | explorer.exe | A Network Trojan was detected | MALWARE [PTsecurity] TrojanSpy:FormBook CnC Checkin (POST) |
252 | explorer.exe | A Network Trojan was detected | MALWARE [PTsecurity] FormBook CnC Checkin (POST) |
252 | explorer.exe | A Network Trojan was detected | MALWARE [PTsecurity] TrojanSpy:FormBook CnC Checkin (POST) |
252 | explorer.exe | A Network Trojan was detected | MALWARE [PTsecurity] FormBook CnC Checkin (POST) |
252 | explorer.exe | A Network Trojan was detected | MALWARE [PTsecurity] FormBook CnC Checkin (POST) |