File name: | SecuriteInfo.com.Exploit.CVE-2018-0798.4.2225.2886 |
Full analysis: | https://app.any.run/tasks/431d18dc-4818-47ac-8e75-c3c4bff4b142 |
Verdict: | Malicious activity |
Threats: | FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus. |
Analysis date: | August 24, 2023, 09:28:10 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
Tags: | |
Indicators: | |
MIME: | text/rtf |
File info: | Rich Text Format data, version 1 |
MD5: | 89C1A747633C6879F7E633457D14B78A |
SHA1: | 7C78265B0650DCA3B734749B990D3D220EF1F6FF |
SHA256: | E4ACB36FB68CFCAF788EE4FFB0573403CEC1D9EF97CD88C122D06B1E5472E176 |
SSDEEP: | 1536:3wAlRAvn5D4fG5zxXxC06UXRzjYRsG2u20RtE6a7+x1duhnGtSAOSUIxMv:3wAlmvn5D4iVxCtUXRzjYRsG120RtE6U |
.rtf | | | Rich Text Format (100) |
---|
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
616 | "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding | C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE | svchost.exe | ||||||||||||
User: admin Company: Design Science, Inc. Integrity Level: MEDIUM Description: Microsoft Equation Editor Exit code: 0 Version: 00110900 Modules
| |||||||||||||||
1604 | /c del "C:\Users\admin\AppData\Roaming\obimygf6896.exe" | C:\Windows\SysWOW64\cmd.exe | — | msiexec.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
1908 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Exploit.CVE-2018-0798.4.2225.2886.rtf" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Exit code: 0 Version: 14.0.5123.5000 Modules
| |||||||||||||||
1924 | C:\Windows\Explorer.EXE | C:\Windows\explorer.exe | — | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
1992 | "C:\Windows\SysWOW64\msiexec.exe" | C:\Windows\SysWOW64\msiexec.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows® installer Exit code: 0 Version: 5.0.7600.16385 (win7_rtm.090713-1255) Modules
Formbook(PID) Process(1992) msiexec.exe C2www.gaoxiba150.com/oy30/ Strings (79)USERNAME LOCALAPPDATA USERPROFILE APPDATA TEMP ProgramFiles CommonProgramFiles ALLUSERSPROFILE /c copy " /c del " \Run \Policies \Explorer \Registry\User \Registry\Machine \SOFTWARE\Microsoft\Windows\CurrentVersion Office\15.0\Outlook\Profiles\Outlook\ NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\ \SOFTWARE\Mozilla\Mozilla \Mozilla Username: Password: formSubmitURL usernameField encryptedUsername encryptedPassword \logins.json \signons.sqlite \Microsoft\Vault\ SELECT encryptedUsername, encryptedPassword, formSubmitURL FROM moz_logins \Google\Chrome\User Data\Default\Login Data SELECT origin_url, username_value, password_value FROM logins .exe .com .scr .pif .cmd .bat ms win gdi mfc vga igfx user help config update regsvc chkdsk systray audiodg certmgr autochk taskhost colorcpl services IconCache ThumbCache Cookies SeDebugPrivilege SeShutdownPrivilege \BaseNamedObjects config.php POST HTTP/1.1 Host: Connection: close Content-Length: Cache-Control: no-cache Origin: http:// User-Agent: Mozilla Firefox/4.0 Content-Type: application/x-www-form-urlencoded Accept: */* Referer: http:// Accept-Language: en-US Accept-Encoding: gzip, deflate
dat= f-start f-end Decoy C2 (64)rfc234.top danielcavalari.com elperegrinocabo.com aryor.info surelistening.com premium-numero-telf.buzz orlynyml.click tennislovers-ro.com holdmytracker.com eewapay.com jaimesinstallglass.com damactrade.net swapspecialities.com perfumesrffd.today salesfactory.pro supportive-solutions.com naiol.com khoyr.com kalendeargpt44.com web-tech-spb.store lodjireal.online ultraflooringmore.com iwantbundles.com theroofer.lat qwxry.fun faserfreunde.com body-for-living.com welnessfit.com clublucky.store nlast.cyou gkoders.com okxmttwa.click nodesofty.com alemania-paredes.com travel-insuranceprice.shop thechaay.com formulavsupplements.com gstringtheory.com ruopenai.com evi-based.com danleugers.com lojinhaevelyn.com denzaimivsem.buzz izmn2vd8.click asliy.top kawitrack.com brandiai.com ssssne.com asianewsgood.online proloop.work dhikaedwina.com onemarinallc.com realmpabq.com boswells.biz jpxiaoxi.top ishirink.com thundershorts.com rainydayroofs.com atatra.com hftroi.xyz fundamentplus.com gsvaedpzugtdn.com mic-reform.info vacuumbagsuppliers.com | |||||||||||||||
2284 | "C:\Users\admin\AppData\Roaming\obimygf6896.exe" | C:\Users\admin\AppData\Roaming\obimygf6896.exe | — | obimygf6896.exe | |||||||||||
User: admin Company: KI Integrity Level: MEDIUM Description: Cluster MGF 2.0 Exit code: 4294967295 Version: 1.0.0.0 Modules
| |||||||||||||||
2692 | "C:\Users\admin\AppData\Roaming\obimygf6896.exe" | C:\Users\admin\AppData\Roaming\obimygf6896.exe | — | obimygf6896.exe | |||||||||||
User: admin Company: KI Integrity Level: MEDIUM Description: Cluster MGF 2.0 Exit code: 4294967295 Version: 1.0.0.0 Modules
| |||||||||||||||
3532 | "C:\Users\admin\AppData\Roaming\obimygf6896.exe" | C:\Users\admin\AppData\Roaming\obimygf6896.exe | — | obimygf6896.exe | |||||||||||
User: admin Company: KI Integrity Level: MEDIUM Description: Cluster MGF 2.0 Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
3840 | "C:\Users\admin\AppData\Roaming\obimygf6896.exe" | C:\Users\admin\AppData\Roaming\obimygf6896.exe | — | obimygf6896.exe | |||||||||||
User: admin Company: KI Integrity Level: MEDIUM Description: Cluster MGF 2.0 Exit code: 4294967295 Version: 1.0.0.0 Modules
| |||||||||||||||
4032 | "C:\Users\admin\AppData\Roaming\obimygf6896.exe" | C:\Users\admin\AppData\Roaming\obimygf6896.exe | — | EQNEDT32.EXE | |||||||||||
User: admin Company: KI Integrity Level: MEDIUM Description: Cluster MGF 2.0 Exit code: 0 Version: 1.0.0.0 Modules
|
(PID) Process: | (1924) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0 |
Operation: | write | Name: | CheckSetting |
Value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| |||
(PID) Process: | (1908) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
Operation: | write | Name: | 1033 |
Value: On | |||
(PID) Process: | (1908) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
Operation: | write | Name: | 1041 |
Value: On | |||
(PID) Process: | (1908) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
Operation: | write | Name: | 1042 |
Value: On | |||
(PID) Process: | (1908) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
Operation: | write | Name: | 1046 |
Value: On | |||
(PID) Process: | (1908) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
Operation: | write | Name: | 1036 |
Value: On | |||
(PID) Process: | (1908) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
Operation: | write | Name: | 1031 |
Value: On | |||
(PID) Process: | (1908) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
Operation: | write | Name: | 1040 |
Value: On | |||
(PID) Process: | (1908) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
Operation: | write | Name: | 1049 |
Value: On | |||
(PID) Process: | (1908) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
Operation: | write | Name: | 3082 |
Value: On |
PID | Process | Filename | Type | |
---|---|---|---|---|
1908 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRA61.tmp.cvr | — | |
MD5:— | SHA256:— | |||
1908 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$curiteInfo.com.Exploit.CVE-2018-0798.4.2225.2886.rtf | binary | |
MD5:167F196F1FD8F1CA5F55C4AC3C216F3C | SHA256:FC7084AC8C1A1B9E9A3D6A43BD2BA99AB30107049262914D6CD4391AD774E700 | |||
616 | EQNEDT32.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HQYU0XHJ\obizx[1].exe | executable | |
MD5:9D79C0CDB630B6ED8E40DAD1A523E598 | SHA256:59347C2464428BB947C2CF150653B66592CA52DA2CA4C4C48441663B4E7120FE | |||
616 | EQNEDT32.EXE | C:\Users\admin\AppData\Roaming\obimygf6896.exe | executable | |
MD5:9D79C0CDB630B6ED8E40DAD1A523E598 | SHA256:59347C2464428BB947C2CF150653B66592CA52DA2CA4C4C48441663B4E7120FE |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
1924 | explorer.exe | GET | — | 188.114.97.3:80 | http://www.jpxiaoxi.top/oy30/?t8o4n4p=LRt97ZNMP1eTGd6D9gFyTzgl4AcXQEIUEicMpgfuObYy835r0QR0OisCRas2qDWrEzNVdw==&jPj8q=Klh8 | US | — | — | malicious |
1924 | explorer.exe | GET | — | 43.228.76.51:80 | http://www.gaoxiba150.com/oy30/?t8o4n4p=3psgububiWTTQunP4gRCFhBDvSuk2GZQgU9iWNF+aDcrgxeN3AJ9p0zfG/CNzlPYsuhlRQ==&jPj8q=Klh8 | CN | — | — | malicious |
616 | EQNEDT32.EXE | GET | 200 | 163.123.143.201:80 | http://163.123.143.201/_errorpages/obizx.exe | unknown | executable | 636 Kb | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
1208 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
332 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
— | — | 192.168.100.255:138 | — | — | — | whitelisted |
1924 | explorer.exe | 43.228.76.51:80 | www.gaoxiba150.com | CHINANET Yunnan province IDC1 network | CN | malicious |
616 | EQNEDT32.EXE | 163.123.143.201:80 | — | Delis LLC | US | malicious |
1924 | explorer.exe | 188.114.97.3:80 | www.jpxiaoxi.top | CLOUDFLARENET | NL | malicious |
Domain | IP | Reputation |
---|---|---|
www.gaoxiba150.com |
| malicious |
www.jpxiaoxi.top |
| malicious |
PID | Process | Class | Message |
---|---|---|---|
— | — | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 17 |
— | — | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
— | — | A Network Trojan was detected | ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 |
— | — | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
— | — | A Network Trojan was detected | ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 |
— | — | Potentially Bad Traffic | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |
— | — | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |
— | — | Potentially Bad Traffic | ET INFO HTTP Request to a *.top domain |
— | — | Malware Command and Control Activity Detected | ET MALWARE FormBook CnC Checkin (GET) |
— | — | Potentially Bad Traffic | ET HUNTING Request to .TOP Domain with Minimal Headers |