File name:

lj.exe

Full analysis: https://app.any.run/tasks/ec6aba84-99d2-495e-a1dd-617514b690a3
Verdict: Malicious activity
Threats:

FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus.

Analysis date: April 29, 2025, 07:00:33
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
formbook
stealer
xloader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 3 sections
MD5:

937C2284BF85773D2860B21A937E5B9D

SHA1:

216AE881DA6613B7F92C1E70C2338243A96BEB35

SHA256:

CB3700F2905106AE90F229AFD9917E2A58B9DF89052601D2A9781D06F098D90A

SSDEEP:

3072:Bjp+FxiwO+Nzyjd2TCXBKerqPTiAaoul9BVvb/vsl6HvCrzxfj+xSlO:BcriX+NzrmXB5qPTjaN9BVvL3HK5Ll

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • FORMBOOK has been detected

      • wscript.exe (PID: 7844)
      • systray.exe (PID: 6468)
    • Actions looks like stealing of personal data

      • wscript.exe (PID: 7844)
    • FORMBOOK has been detected (YARA)

      • wscript.exe (PID: 7844)
    • FORMBOOK has been detected (SURICATA)

      • explorer.exe (PID: 5492)
    • Connects to the CnC server

      • explorer.exe (PID: 5492)
  • SUSPICIOUS

    • Application launched itself

      • lj.exe (PID: 7312)
      • mfcbdj8.exe (PID: 5504)
    • Starts CMD.EXE for commands execution

      • wscript.exe (PID: 7844)
    • Executable content was dropped or overwritten

      • explorer.exe (PID: 5492)
      • dllhost.exe (PID: 3240)
    • Contacting a server suspected of hosting an CnC

      • explorer.exe (PID: 5492)
  • INFO

    • The sample compiled with english language support

      • lj.exe (PID: 7312)
      • explorer.exe (PID: 5492)
      • dllhost.exe (PID: 3240)
    • Checks supported languages

      • lj.exe (PID: 7312)
      • lj.exe (PID: 7816)
      • mfcbdj8.exe (PID: 6712)
      • mfcbdj8.exe (PID: 5504)
    • Reads the computer name

      • lj.exe (PID: 7312)
      • lj.exe (PID: 7816)
      • mfcbdj8.exe (PID: 6712)
      • mfcbdj8.exe (PID: 5504)
    • Reads security settings of Internet Explorer

      • explorer.exe (PID: 5492)
      • dllhost.exe (PID: 3240)
    • Manual execution by a user

      • wscript.exe (PID: 7844)
    • Checks transactions between databases Windows and Oracle

      • explorer.exe (PID: 5492)
    • Creates files in the program directory

      • dllhost.exe (PID: 3240)
    • Create files in a temporary directory

      • cmd.exe (PID: 2320)
      • explorer.exe (PID: 5492)
    • Reads the software policy settings

      • slui.exe (PID: 7400)
      • slui.exe (PID: 4448)
    • Checks proxy server information

      • slui.exe (PID: 4448)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Formbook

(PID) Process(7844) wscript.exe
C2www.replazimnt.online/ch12/
Strings (79)USERNAME
LOCALAPPDATA
USERPROFILE
APPDATA
TEMP
ProgramFiles
CommonProgramFiles
ALLUSERSPROFILE
/c copy "
/c del "
\Run
\Policies
\Explorer
\Registry\User
\Registry\Machine
\SOFTWARE\Microsoft\Windows\CurrentVersion
Office\15.0\Outlook\Profiles\Outlook\
NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\
\SOFTWARE\Mozilla\Mozilla
\Mozilla
Username:
Password:
formSubmitURL
usernameField
encryptedUsername
encryptedPassword
\logins.json
\signons.sqlite
\Microsoft\Vault\
SELECT encryptedUsername, encryptedPassword, formSubmitURL FROM moz_logins
\Google\Chrome\User Data\Default\Login Data
SELECT origin_url, username_value, password_value FROM logins
.exe
.com
.scr
.pif
.cmd
.bat
ms
win
gdi
mfc
vga
igfx
user
help
config
update
regsvc
chkdsk
systray
audiodg
certmgr
autochk
taskhost
colorcpl
services
IconCache
ThumbCache
Cookies
SeDebugPrivilege
SeShutdownPrivilege
\BaseNamedObjects
config.php
POST
HTTP/1.1
Host:
Connection: close
Content-Length:
Cache-Control: no-cache
Origin: http://
User-Agent: Mozilla Firefox/4.0
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://
Accept-Language: en-US
Accept-Encoding: gzip, deflate dat=
f-start
f-end
Decoy C2 (64)lmrdevelopment.com
passivezodiac.win
hjtexastile.com
buckteeth.tech
cowardlions.com
1bcustom.com
frendly.company
jamieotto.com
easontea.com
pdg.services
halmakelaardij.com
vrfjxgdz.download
weiweidashi.com
bkgre4.info
healreadyhasamom.com
thebrbtravelteam.com
ekfdi.com
willamovie.com
blackinkarchive.com
sensedl.com
ahangerkhurshid.com
peabodylab.network
zhuanzhuanyoupin58.com
homerjnr.net
lockhole.com
weakdata.com
yatescloud.com
governmentcontactdata.com
reunsecuredcreditcardsok.live
update-group.com
kakaotown.com
897manbetx.com
gzpmj.info
vanzettofiori.com
jmjlyon2021.com
8ibsowvc0.biz
meninaizybida.com
arenadesign.company
m-bats.com
olharsemlimites.com
smallmonstersgames.com
taoluhan.com
makemoneyonlinefromhome.site
wellsfargo-mgt.com
multihui.com
zacharymarinelli.com
bkhis.com
kzrofy.men
cloudphone.site
illegalhelmets.com
ziqiangzhilu.com
cryptocoinvideo.com
ingridpress.com
621leightroad.com
ofmakingweb.com
southernbluephotos.com
dejarladroga.com
vandelprofesionales.com
meritsplit.com
lntongxin.site
hidroforservisi.info
postcardgeek.com
middledeck.com
ideeahosting.com
No Malware configuration.

TRiD

.exe | Win32 Executable Microsoft Visual Basic 6 (90.6)
.exe | Win32 Executable (generic) (4.9)
.exe | Generic Win/DOS Executable (2.2)
.exe | DOS Executable Generic (2.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2017:12:12 20:43:30+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 421888
InitializedDataSize: 8192
UninitializedDataSize: -
EntryPoint: 0x1330
OSVersion: 4
ImageVersion: 6.9
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 6.9.0.1
ProductVersionNumber: 6.9.0.1
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: epson
FileDescription: cheat engine
LegalCopyright: mALWAREbYTes cORPORAtion
LegalTrademarks: laSTPASS
ProductName: CHECKSUMcALCUlATOR.COm
FileVersion: 6.09.0001
ProductVersion: 6.09.0001
InternalName: Quadrisected
OriginalFileName: Quadrisected.exe
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
146
Monitored processes
17
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start lj.exe no specs sppextcomobj.exe no specs slui.exe lj.exe no specs #FORMBOOK wscript.exe cmd.exe no specs conhost.exe no specs #FORMBOOK explorer.exe cmd.exe no specs conhost.exe no specs firefox.exe no specs slui.exe Copy/Move/Rename/Delete/Link Object mfcbdj8.exe no specs mfcbdj8.exe no specs #FORMBOOK systray.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2320/c copy "C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\admin\AppData\Local\Temp\DB1" /VC:\Windows\SysWOW64\cmd.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
2392\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3240C:\WINDOWS\system32\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}C:\Windows\System32\dllhost.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
4448C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5492C:\WINDOWS\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\shcore.dll
5504"C:\Program Files (x86)\Yxlr\mfcbdj8.exe"C:\Program Files (x86)\Yxlr\mfcbdj8.exeexplorer.exe
User:
admin
Company:
epson
Integrity Level:
MEDIUM
Description:
cheat engine
Exit code:
0
Version:
6.09.0001
Modules
Images
c:\program files (x86)\yxlr\mfcbdj8.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvbvm60.dll
6468"C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Systray .exe stub
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\systray.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
6712"C:\Program Files (x86)\Yxlr\mfcbdj8.exe"C:\Program Files (x86)\Yxlr\mfcbdj8.exemfcbdj8.exe
User:
admin
Company:
epson
Integrity Level:
MEDIUM
Description:
cheat engine
Exit code:
0
Version:
6.09.0001
Modules
Images
c:\program files (x86)\yxlr\mfcbdj8.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
7204"C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exewscript.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
3221225534
Version:
123.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
Total events
8 779
Read events
8 774
Write events
5
Delete events
0

Modification events

(PID) Process:(5492) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
Operation:writeName:CheckSetting
Value:
23004100430042006C006F0062000000000000000000000001000000740065006D000000
(PID) Process:(7844) wscript.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:CHLDL8YXCN
Value:
C:\Program Files (x86)\Yxlr\mfcbdj8.exe
(PID) Process:(7844) wscript.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(7844) wscript.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(7844) wscript.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
2
Suspicious files
7
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
5492explorer.exeC:\Users\admin\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.datbinary
MD5:E49C56350AEDF784BFE00E444B879672
SHA256:A8BD235303668981563DFB5AAE338CB802817C4060E2C199B7C84901D57B7E1E
7844wscript.exeC:\Users\admin\AppData\Roaming\299381VA\299logrg.iniimage
MD5:4AADF49FED30E4C9B3FE4A3DD6445EBE
SHA256:75034BEB7BDED9AEAB5748F4592B9E1419256CAEC474065D43E531EC5CC21C56
7844wscript.exeC:\Users\admin\AppData\Roaming\299381VA\299logri.inibinary
MD5:D63A82E5D81E02E399090AF26DB0B9CB
SHA256:EAECE2EBA6310253249603033C744DD5914089B0BB26BDE6685EC9813611BAAE
2320cmd.exeC:\Users\admin\AppData\Local\Temp\DB1binary
MD5:A45465CDCDC6CB30C8906F3DA4EC114C
SHA256:4412319EF944EBCCA9581CBACB1D4E1DC614C348D1DFC5D2FAAAAD863D300209
7844wscript.exeC:\Users\admin\AppData\Roaming\299381VA\299logrc.inibinary
MD5:E03F207A7B9CFC4D877ED2EC64BE028E
SHA256:B17183098B6E349844A3151456EDF62C8E41B2348D2445A610C0FF1E29963067
7844wscript.exeC:\Users\admin\AppData\Roaming\299381VA\299logrv.inibinary
MD5:BA3B6BC807D4F76794C4B81B09BB9BA5
SHA256:6EEBF968962745B2E9DE2CA969AF7C424916D4E3FE3CC0BB9B3D414ABFCE9507
3240dllhost.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-msbinary
MD5:8F8D7FCF4D748C0EF8C9F2F6B45D31E3
SHA256:612014F969F0478586CDF9A3C14E93739059ECBB4DFDCCF6E784077195DE012D
5492explorer.exeC:\Users\admin\AppData\Local\Temp\Yxlr\mfcbdj8.exeexecutable
MD5:937C2284BF85773D2860B21A937E5B9D
SHA256:CB3700F2905106AE90F229AFD9917E2A58B9DF89052601D2A9781D06F098D90A
3240dllhost.exeC:\Program Files (x86)\Yxlr\mfcbdj8.exeexecutable
MD5:937C2284BF85773D2860B21A937E5B9D
SHA256:CB3700F2905106AE90F229AFD9917E2A58B9DF89052601D2A9781D06F098D90A
7844wscript.exeC:\Users\admin\AppData\Roaming\299381VA\299logim.jpegbinary
MD5:19428C6B0FF8FADDB5939F1CA1307D82
SHA256:5857B6D34694A2C08F0B464A54DE9F9EE4682887742F2A568D22FCEB30AFA25F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
61
DNS requests
33
Threats
12

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5492
explorer.exe
GET
404
49.13.77.253:80
http://www.kakaotown.com/ch12/?id=4z1/xI1UY7qXKngByRXt824mPc205u85rjEQ1s+g6V90xCjAq4Q99XPwye2tWJB/qfc9&wP88nd=W0GxczDp
unknown
malicious
5492
explorer.exe
GET
404
49.13.77.253:80
http://www.cowardlions.com/ch12/?id=ssXEu/+LdTFnWyhmZeqrwbrfobcOVUSSw5zAImyqWL6/sMU36g7l/S6yHoGNUqRYwYNb&wP88nd=W0GxczDp
unknown
malicious
5492
explorer.exe
GET
404
49.13.77.253:80
http://www.replazimnt.online/ch12/?id=9viFDboDZUL44KQULC6CmolFryUcZVCPqb+y7zm9rBriSl6HB4mmHitKbbgNVJqr6jIP&wP88nd=W0GxczDp
unknown
malicious
5492
explorer.exe
GET
404
49.13.77.253:80
http://www.makemoneyonlinefromhome.site/ch12/?id=77Oo3V4MQk2OyCyBCK+kDFq5BF0sbm1xWI4ZGYYfgoK873SSiNtCZQS73VSzyu9rMJp1&wP88nd=W0GxczDp
unknown
malicious
5492
explorer.exe
GET
404
49.13.77.253:80
http://www.bkhis.com/ch12/?id=h31NP3/b63WPCqm9VuUcsPZCq+3qMnuBD41Wkl59dsWI3cVmpH0Nz8IcZ+9YLM0Y5UvN&wP88nd=W0GxczDp
unknown
malicious
5492
explorer.exe
GET
404
49.13.77.253:80
http://www.meninaizybida.com/ch12/?id=QtzfRQzjAl2mdaZ/NjFIg04FeuhPu8PvgwJ5TLtBU8Uq2jfV0rqoGVaunF2mZGBZw2zj&wP88nd=W0GxczDp
unknown
malicious
5492
explorer.exe
GET
404
49.13.77.253:80
http://www.postcardgeek.com/ch12/?id=oLdaZ2IEBtyP045MjeOEjmxeFeiQ5CeNIb8pR3w+aZWI2iXvc3Di2jmM1GVpNqs+SiMY&wP88nd=W0GxczDp
unknown
malicious
5492
explorer.exe
GET
404
37.46.140.12:80
http://www.halmakelaardij.com/ch12/?id=aJAZxRoyAh8UcyW5RZmskkrCRaA/4twvKTU9+pGtfqNwW4EzLhOli5a+pYVurlg/I6Pv&wP88nd=W0GxczDp
unknown
malicious
5492
explorer.exe
GET
404
49.13.77.253:80
http://www.897manbetx.com/ch12/?id=J0KVYaxGv/lJd99NCr9DiSPChMtv1Guv7ZAzR4737D0W/6KZUfJiR5uiyddYRp8qrjUF&wP88nd=W0GxczDp
unknown
malicious
5492
explorer.exe
GET
404
49.13.77.253:80
http://www.illegalhelmets.com/ch12/?id=wPAF1i3Akn4GlxYu0tJkeYDuKxeRzd9NtKFTMRoCTwtHAP3h5zxMl/L8QRhtCpkr7lWZ&wP88nd=W0GxczDp
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5496
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2112
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.32.133:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
8052
SIHClient.exe
4.175.87.197:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.124.78.146
whitelisted
google.com
  • 142.250.185.78
whitelisted
client.wns.windows.com
  • 172.211.123.250
  • 172.211.123.248
whitelisted
login.live.com
  • 40.126.32.133
  • 40.126.32.140
  • 20.190.160.20
  • 40.126.32.136
  • 20.190.160.14
  • 20.190.160.131
  • 40.126.32.74
  • 40.126.32.68
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
  • 2a01:111:f100:a000::4134:4847
whitelisted
198.187.3.20.in-addr.arpa
unknown
7.4.8.4.4.3.1.4.0.0.0.0.0.0.0.0.0.0.0.a.0.0.1.f.1.1.1.0.1.0.a.2.ip6.arpa
unknown
www.cowardlions.com
  • 49.13.77.253
malicious
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

PID
Process
Class
Message
5492
explorer.exe
Malware Command and Control Activity Detected
ET MALWARE FormBook CnC Checkin (GET)
5492
explorer.exe
Malware Command and Control Activity Detected
ET MALWARE FormBook CnC Checkin (GET)
5492
explorer.exe
Malware Command and Control Activity Detected
ET MALWARE FormBook CnC Checkin (GET)
5492
explorer.exe
Malware Command and Control Activity Detected
ET MALWARE FormBook CnC Checkin (GET)
5492
explorer.exe
Malware Command and Control Activity Detected
ET MALWARE FormBook CnC Checkin (GET)
5492
explorer.exe
Malware Command and Control Activity Detected
ET MALWARE FormBook CnC Checkin (GET)
5492
explorer.exe
Malware Command and Control Activity Detected
ET MALWARE FormBook CnC Checkin (GET)
5492
explorer.exe
Malware Command and Control Activity Detected
ET MALWARE FormBook CnC Checkin (GET)
5492
explorer.exe
Malware Command and Control Activity Detected
ET MALWARE FormBook CnC Checkin (GET)
5492
explorer.exe
Malware Command and Control Activity Detected
ET MALWARE FormBook CnC Checkin (GET)
No debug info