analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

776ce2dc0c7d5950d6dc9a461838eeac.rtf

Full analysis: https://app.any.run/tasks/7164f02d-648f-408d-bea8-3bba64a6ffff
Verdict: Malicious activity
Threats:

FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus.

Analysis date: March 22, 2019, 08:25:16
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ole-embedded
trojan
exploit
CVE-2017-11882
loader
formbook
stealer
Indicators:
MIME: text/rtf
File info: Rich Text Format data, unknown version
MD5:

776CE2DC0C7D5950D6DC9A461838EEAC

SHA1:

5775E6FFD51AE87A009C1EFCF4A74F558DA47FC2

SHA256:

DAEDA31C5360ADD69095BBA019D41588A73129E44158478D1E9C084507BB9AB2

SSDEEP:

3072:nhjjjjvvEmjlZiYC89dKtvTaCyo9ZDeFyz:nhjjjjvMmCmiFNyo9NEyz

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Equation Editor starts application (CVE-2017-11882)

      • EQNEDT32.EXE (PID: 3500)
    • Suspicious connection from the Equation Editor

      • EQNEDT32.EXE (PID: 3500)
    • Application was dropped or rewritten from another process

      • 3.exe (PID: 3828)
      • tgem.exe (PID: 3836)
      • tgem.exe (PID: 936)
    • Downloads executable files with a strange extension

      • EQNEDT32.EXE (PID: 3500)
    • Downloads executable files from the Internet

      • EQNEDT32.EXE (PID: 3500)
    • Actions looks like stealing of personal data

      • raserver.exe (PID: 3304)
    • Changes the autorun value in the registry

      • raserver.exe (PID: 3304)
    • Formbook was detected

      • raserver.exe (PID: 3304)
      • Firefox.exe (PID: 2676)
    • FORMBOOK was detected

      • explorer.exe (PID: 2036)
    • Stealing of credential data

      • raserver.exe (PID: 3304)
    • Connects to CnC server

      • explorer.exe (PID: 2036)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • EQNEDT32.EXE (PID: 3500)
      • 3.exe (PID: 3828)
    • Creates files in the user directory

      • EQNEDT32.EXE (PID: 3500)
      • 3.exe (PID: 3828)
      • raserver.exe (PID: 3304)
    • Starts itself from another location

      • 3.exe (PID: 3828)
    • Application launched itself

      • tgem.exe (PID: 3836)
    • Loads DLL from Mozilla Firefox

      • raserver.exe (PID: 3304)
  • INFO

    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 2684)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 2684)
      • Firefox.exe (PID: 2676)
    • Starts Microsoft Office Application

      • explorer.exe (PID: 2036)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rtf | Rich Text Format (100)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
8
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start drop and start winword.exe no specs eqnedt32.exe 3.exe tgem.exe no specs tgem.exe no specs #FORMBOOK raserver.exe #FORMBOOK firefox.exe no specs #FORMBOOK explorer.exe

Process information

PID
CMD
Path
Indicators
Parent process
2684"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\776ce2dc0c7d5950d6dc9a461838eeac.rtf"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
3500"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -EmbeddingC:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
svchost.exe
User:
admin
Company:
Design Science, Inc.
Integrity Level:
MEDIUM
Description:
Microsoft Equation Editor
Exit code:
0
Version:
00110900
3828C:\Users\Public\3.exeC:\Users\Public\3.exe
EQNEDT32.EXE
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3836"C:\Users\admin\AppData\Roaming\exp\tgem.exe"C:\Users\admin\AppData\Roaming\exp\tgem.exe3.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
936"C:\Users\admin\AppData\Roaming\exp\tgem.exe"C:\Users\admin\AppData\Roaming\exp\tgem.exetgem.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3304"C:\Windows\System32\raserver.exe"C:\Windows\System32\raserver.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Remote Assistance COM Server
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2676"C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe
raserver.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
65.0.2
2036C:\Windows\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
1 388
Read events
754
Write events
0
Delete events
0

Modification events

No data
Executable files
3
Suspicious files
73
Text files
2
Unknown types
3

Dropped files

PID
Process
Filename
Type
2684WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRFAF1.tmp.cvr
MD5:
SHA256:
38283.exeC:\Users\admin\AppData\Roaming\exp\tgem.exe:ZoneIdentifier
MD5:
SHA256:
2684WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:79F9B6C51547B535D3B3BED5617AB7EB
SHA256:E0A200D60D6ADC5A33ED7D4336092FA5F372C1173382D7801C8BFAA6186223CA
3500EQNEDT32.EXEC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\admin@bit[1].txttext
MD5:83EE53432C2F4168F056C7670B52B35A
SHA256:CF3C8F5ACEDD9D8B3AA90FFBD0DFC5AE8B812E4C4EB7AC401B95DD2E779CD2E8
3500EQNEDT32.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\974103[1].pngexecutable
MD5:B88C197548822D7F190469486861B8F2
SHA256:70571AC345898BAFBF0334D20977D9798DCBE797318794E728D90B05E6C9119C
2684WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$6ce2dc0c7d5950d6dc9a461838eeac.rtfpgc
MD5:B98D5786213F7BCB3EE375057F56C3E3
SHA256:9F5EB66D04A41067F1A0AE6EEE05C551FF335A1A4286FF48B8FBE5467ADC3991
3500EQNEDT32.EXEC:\Users\Public\3.exeexecutable
MD5:B88C197548822D7F190469486861B8F2
SHA256:70571AC345898BAFBF0334D20977D9798DCBE797318794E728D90B05E6C9119C
38283.exeC:\Users\admin\AppData\Roaming\exp\tgem.exeexecutable
MD5:B88C197548822D7F190469486861B8F2
SHA256:70571AC345898BAFBF0334D20977D9798DCBE797318794E728D90B05E6C9119C
3304raserver.exeC:\Users\admin\AppData\Roaming\992307UE\992logrc.inibinary
MD5:2855A82ECDD565B4D957EC2EE05AED26
SHA256:88E38DA5B12DD96AFD9DC90C79929EC31D8604B1AFDEBDD5A02B19249C08C939
3500EQNEDT32.EXEC:\Users\admin\AppData\Roaming\Microsoft\Windows\IETldCache\index.datdat
MD5:D7A950FEFD60DBAA01DF2D85FEFB3862
SHA256:75D0B1743F61B76A35B1FEDD32378837805DE58D79FA950CB6E8164BFA72073A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
21
TCP/UDP connections
22
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2036
explorer.exe
GET
59.188.180.242:80
http://www.biyoush.com/de/?BRQl=WfAzN30z9ZDmcmyMecoHEEMLRwJiUWYXMq46VJt3j1q251VXopOhU0G3WMJmCm8mwvUzng==&VP3DU=ljndSP_H1468qfM&sql=1
HK
malicious
2036
explorer.exe
GET
301
92.53.96.162:80
http://www.selenga.info/de/?BRQl=lkKs2hRge4PG2gZ7pwtBEGur8OW6vrVfGY3Dio+a+j4uQPJThWZVXFm+XawyVZo+l3ep0A==&VP3DU=ljndSP_H1468qfM&sql=1
RU
malicious
3500
EQNEDT32.EXE
GET
301
67.199.248.11:80
http://bit.ly/2TRwq4D
US
html
124 b
shared
2036
explorer.exe
POST
23.20.239.12:80
http://www.ladybea.com/de/
US
shared
2036
explorer.exe
GET
302
23.20.239.12:80
http://www.ladybea.com/de/?BRQl=aMCh7b/NLIe4+eCZKPZcml7ljA+xibyj0QaBm5X85VeaOJGjUdqu7RuhCMNN1vMsa5pjuw==&VP3DU=ljndSP_H1468qfM&sql=1
US
html
204 b
shared
2036
explorer.exe
POST
199.192.17.204:80
http://www.verdictes.com/de/
US
malicious
2036
explorer.exe
POST
59.188.180.242:80
http://www.biyoush.com/de/
HK
malicious
2036
explorer.exe
POST
23.20.239.12:80
http://www.ladybea.com/de/
US
shared
2036
explorer.exe
POST
92.53.96.162:80
http://www.selenga.info/de/
RU
malicious
2036
explorer.exe
POST
59.188.180.242:80
http://www.biyoush.com/de/
HK
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3500
EQNEDT32.EXE
103.235.106.21:80
joomliads.in
Netmagic Datacenter Mumbai
IN
suspicious
3500
EQNEDT32.EXE
67.199.248.11:80
bit.ly
Bitly Inc
US
shared
2036
explorer.exe
59.188.180.242:80
www.biyoush.com
AS number for New World Telephone Ltd.
HK
malicious
2036
explorer.exe
92.53.96.162:80
www.selenga.info
TimeWeb Ltd.
RU
malicious
2036
explorer.exe
199.192.17.204:80
www.verdictes.com
US
malicious
2036
explorer.exe
88.150.145.167:80
www.yogainstructorguide.com
iomart Cloud Services Limited.
GB
malicious
2036
explorer.exe
23.20.239.12:80
www.ladybea.com
Amazon.com, Inc.
US
shared

DNS requests

Domain
IP
Reputation
bit.ly
  • 67.199.248.11
  • 67.199.248.10
shared
joomliads.in
  • 103.235.106.21
malicious
www.biyoush.com
  • 59.188.180.242
malicious
www.nemotoystore.com
unknown
www.apptraffictoupgradingall.win
unknown
www.us-limited-account.com
unknown
www.speedy-music.com
unknown
www.selenga.info
  • 92.53.96.162
malicious
www.ladybea.com
  • 23.20.239.12
shared
www.verdictes.com
  • 199.192.17.204
malicious

Threats

PID
Process
Class
Message
3500
EQNEDT32.EXE
Misc activity
SUSPICIOUS [PTsecurity] Cmd.Powershell.Download HTTP UserAgent (Win7)
3500
EQNEDT32.EXE
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3500
EQNEDT32.EXE
A Network Trojan was detected
ET TROJAN JS/WSF Downloader Dec 08 2016 M4
3500
EQNEDT32.EXE
A Network Trojan was detected
ET TROJAN Windows Executable Downloaded With Image Content-Type Header
3500
EQNEDT32.EXE
Misc activity
SUSPICIOUS [PTsecurity] PE as Image Content type mismatch
3500
EQNEDT32.EXE
Generic Protocol Command Decode
SURICATA STREAM excessive retransmissions
2036
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] FormBook CnC Checkin (GET)
2036
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] TrojanSpy:FormBook CnC Checkin (POST)
2036
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] TrojanSpy:FormBook CnC Checkin (POST)
2036
explorer.exe
A Network Trojan was detected
MALWARE [PTsecurity] FormBook CnC Checkin (GET)
15 ETPRO signatures available at the full report
No debug info