File name:

Payment_Notification.pdf.img

Full analysis: https://app.any.run/tasks/d5190f1b-9c32-4826-8795-8368a63db8d3
Verdict: Malicious activity
Threats:

FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus.

Analysis date: May 20, 2019, 18:49:22
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
formbook
stealer
Indicators:
MIME: application/x-iso9660-image
File info: ISO 9660 CD-ROM filesystem data 'Payment_Notification.pdf'
MD5:

C7479984C695F25119CC8B2FD1AFE2F8

SHA1:

D776748F0D6EFAA886B85C212386F678C1CD93E1

SHA256:

C36D8B58A3DF931B8604DA4554E8EBEE0A76B284D8E5FB6E48ABFBDEC7533649

SSDEEP:

12288:hyHoiS5fiPYt/gIPzx8AWUyODltPljeOlyWwfvV0RIDwJlt6+1lf:hyHvS5figtzNvyODlttKYqwJN1F

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Payment_Notification.pdf.exe (PID: 300)
      • Payment_Notification.pdf.exe (PID: 3960)
    • FORMBOOK was detected

      • explorer.exe (PID: 2036)
    • Formbook was detected

      • services.exe (PID: 2092)
      • Firefox.exe (PID: 3964)
    • Changes the autorun value in the registry

      • services.exe (PID: 2092)
    • Actions looks like stealing of personal data

      • services.exe (PID: 2092)
    • Connects to CnC server

      • explorer.exe (PID: 2036)
    • Stealing of credential data

      • services.exe (PID: 2092)
  • SUSPICIOUS

    • Uses RUNDLL32.EXE to load library

      • explorer.exe (PID: 2036)
    • Creates files in the user directory

      • explorer.exe (PID: 2036)
      • Payment_Notification.pdf.exe (PID: 300)
      • services.exe (PID: 2092)
    • Reads Internet Cache Settings

      • explorer.exe (PID: 2036)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2728)
    • Starts CMD.EXE for commands execution

      • services.exe (PID: 2092)
    • Loads DLL from Mozilla Firefox

      • services.exe (PID: 2092)
  • INFO

    • Manual execution by user

      • Payment_Notification.pdf.exe (PID: 300)
      • services.exe (PID: 2092)
      • lsm.exe (PID: 2652)
    • Creates files in the user directory

      • Firefox.exe (PID: 3964)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.iso | ISO 9660 CD image (27.6)
.atn | Photoshop Action (27.1)
.gmc | Game Music Creator Music (6.1)

EXIF

ISO

System: Win32
VolumeName: Payment_Notification.pdf
VolumeBlockCount: 351
VolumeBlockSize: 2048
RootDirectoryCreateDate: 2019:05:20 07:02:16+02:00
Software: PowerISO
VolumeCreateDate: 2019:05:20 07:02:16.00+02:00
VolumeModifyDate: 2019:05:20 07:02:16.00+02:00

Composite

VolumeSize: 702 kB
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
42
Monitored processes
9
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start rundll32.exe no specs winrar.exe payment_notification.pdf.exe no specs #FORMBOOK services.exe cmd.exe no specs payment_notification.pdf.exe no specs lsm.exe no specs #FORMBOOK explorer.exe #FORMBOOK firefox.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
300"C:\Users\admin\Downloads\Payment_Notification.pdf.img\Payment_Notification.pdf.exe" C:\Users\admin\Downloads\Payment_Notification.pdf.img\Payment_Notification.pdf.exeexplorer.exe
User:
admin
Company:
Alberto Rodr�guez Orozco
Integrity Level:
MEDIUM
Description:
70s Gives
Exit code:
0
Version:
3.6.41.92
Modules
Images
c:\users\admin\downloads\payment_notification.pdf.img\payment_notification.pdf.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1888/c del "C:\Users\admin\Downloads\Payment_Notification.pdf.img\Payment_Notification.pdf.exe"C:\Windows\System32\cmd.exeservices.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2036C:\Windows\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\winanr.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
2092"C:\Windows\System32\services.exe"C:\Windows\System32\services.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Services and Controller app
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\services.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\profapi.dll
c:\windows\system32\sechost.dll
c:\windows\system32\cryptbase.dll
2568"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\Downloads\Payment_Notification.pdf.img.isoC:\Windows\system32\rundll32.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
2652"C:\Windows\System32\lsm.exe"C:\Windows\System32\lsm.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Local Session Manager Service
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\lsm.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sysntfy.dll
c:\windows\system32\wmsgapi.dll
c:\windows\system32\advapi32.dll
2728"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Downloads\Payment_Notification.pdf.img.iso"C:\Program Files\WinRAR\WinRAR.exe
rundll32.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3960"C:\Users\admin\AppData\Local\Temp\Rar$EXa2728.30046\Payment_Notification.pdf.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2728.30046\Payment_Notification.pdf.exeWinRAR.exe
User:
admin
Company:
Alberto Rodr�guez Orozco
Integrity Level:
MEDIUM
Description:
70s Gives
Exit code:
0
Version:
3.6.41.92
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa2728.30046\payment_notification.pdf.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
3964"C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe
services.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
65.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
Total events
1 889
Read events
1 709
Write events
179
Delete events
1

Modification events

(PID) Process:(2568) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2568) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:@C:\Windows\System32\isoburn.exe,-350
Value:
Disc Image File
(PID) Process:(2568) rundll32.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.iso\OpenWithProgids
Operation:writeName:Windows.IsoFile
Value:
(PID) Process:(2568) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:LangID
Value:
0904
(PID) Process:(2568) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:@%SystemRoot%\System32\isoburn.exe,-352
Value:
Windows Disc Image Burner
(PID) Process:(2568) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Windows\System32\isoburn.exe
Value:
Windows Disc Image Burner
(PID) Process:(2568) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Program Files\WinRAR\WinRAR.exe
Value:
WinRAR archiver
(PID) Process:(2568) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
Value:
Adobe Acrobat Reader DC
(PID) Process:(2568) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Windows\eHome\ehshell.exe
Value:
Windows Media Center
(PID) Process:(2568) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Program Files\Internet Explorer\iexplore.exe
Value:
Internet Explorer
Executable files
2
Suspicious files
82
Text files
1
Unknown types
6

Dropped files

PID
Process
Filename
Type
2036explorer.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\1b4dd67f29cb1962.automaticDestinations-msautomaticdestinations-ms
MD5:
SHA256:
2036explorer.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\290532160612e071.automaticDestinations-msautomaticdestinations-ms
MD5:
SHA256:
2728WinRAR.exeC:\Users\admin\Downloads\Payment_Notification.pdf.img\Payment_Notification.pdf.exeexecutable
MD5:
SHA256:
2728WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2728.30046\Payment_Notification.pdf.exeexecutable
MD5:
SHA256:
2092services.exeC:\Users\admin\AppData\Roaming\031R2A5E\031logim.jpegimage
MD5:
SHA256:
3964Firefox.exeC:\Users\admin\AppData\Roaming\031R2A5E\031logrf.inibinary
MD5:
SHA256:
2036explorer.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019052020190521\index.datdat
MD5:
SHA256:
2036explorer.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\Downloads.lnklnk
MD5:
SHA256:
2036explorer.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\Payment_Notification.pdf.img.iso.lnklnk
MD5:
SHA256:
2092services.exeC:\Users\admin\AppData\Roaming\031R2A5E\031logrc.inibinary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
6
DNS requests
13
Threats
11

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2036
explorer.exe
GET
301
2.16.187.32:80
http://www.pattiradle.com/dy/?cx=vv3LB3t7AG5+oOlOmUOmLHqRYUfD6y430XH5RfNBRXuW1ljrWR4+FZ6QsYCkneRXjeNa9g==&Tj=YBcDkPE
unknown
suspicious
2036
explorer.exe
GET
301
35.246.6.109:80
http://www.market2boost.com/dy/?cx=I7dCZLFfctmE9c1y+iuiqXSeA+PhvqYwYgIbmAdtE6ONoMhEE/BFz5t+bShobe3gfoPOpw==&Tj=YBcDkPE&sql=1
US
malicious
2036
explorer.exe
GET
162.213.250.187:80
http://www.jankolet.com/dy/?cx=w7XLkMN61pR0MnMB2qLaprTUq3KaA5aHdEqDphFd56KNj5fPvmuvIwpuWr/uCTdIhy40Vw==&Tj=YBcDkPE
US
malicious
2036
explorer.exe
POST
35.246.6.109:80
http://www.market2boost.com/dy/
US
malicious
2036
explorer.exe
POST
35.246.6.109:80
http://www.market2boost.com/dy/
US
malicious
2036
explorer.exe
POST
35.246.6.109:80
http://www.market2boost.com/dy/
US
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2036
explorer.exe
2.16.187.32:80
www.pattiradle.com
Akamai International B.V.
whitelisted
2036
explorer.exe
35.246.6.109:80
www.market2boost.com
US
malicious
2036
explorer.exe
162.213.250.187:80
www.jankolet.com
Namecheap, Inc.
US
malicious

DNS requests

Domain
IP
Reputation
www.personal-dudaust1-3.com
unknown
www.khaledsleem.com
unknown
www.6505drexel.info
unknown
www.pattiradle.com
  • 2.16.187.32
  • 2.16.187.51
suspicious
www.abatedourodogalego.com
unknown
www.realmofcare.com
unknown
www.fizzy-slim.site
unknown
www.market2boost.com
  • 35.246.6.109
malicious
www.loanblasters.com
unknown
www.jankolet.com
  • 162.213.250.187
malicious

Threats

PID
Process
Class
Message
2036
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] FormBook CnC Checkin (GET)
2036
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] FormBook CnC Checkin (GET)
2036
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] TrojanSpy:FormBook CnC Checkin (POST)
2036
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] TrojanSpy:FormBook CnC Checkin (POST)
2036
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] FormBook CnC Checkin (POST)
2036
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] FormBook CnC Checkin (GET)
5 ETPRO signatures available at the full report
No debug info