File name:

cx5ylLPZa0WXFvQ.exe

Full analysis: https://app.any.run/tasks/a0411e83-adec-4f45-bad6-201333d86805
Verdict: Malicious activity
Threats:

FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus.

Analysis date: March 24, 2025, 08:14:31
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
formbook
stealer
xloader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

7043814725252C8CACF78B12D2002B80

SHA1:

995697CA0BB9284994D56D7948EEFA616A841E3D

SHA256:

EDF824F5152829EF7BE198C97A42E4ECD5AE9BE37EF57051DEDA0435CC302063

SSDEEP:

24576:ZBs8ZvOZEKCQkcOU/QNEtIeUpJTirZt16JIlWW1c7QjJZVQOST5z15:ZC8ZvOZEKCQ/OU/QNEtIeUp9irZt16JV

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • colorcpl.exe (PID: 5392)
    • FORMBOOK has been detected (YARA)

      • colorcpl.exe (PID: 5392)
    • Connects to the CnC server

      • explorer.exe (PID: 5492)
    • FORMBOOK has been detected (SURICATA)

      • explorer.exe (PID: 5492)
  • SUSPICIOUS

    • Application launched itself

      • cx5ylLPZa0WXFvQ.exe (PID: 6488)
    • Process drops legitimate windows executable

      • cx5ylLPZa0WXFvQ.exe (PID: 6488)
    • Starts a Microsoft application from unusual location

      • cx5ylLPZa0WXFvQ.exe (PID: 6488)
      • cx5ylLPZa0WXFvQ.exe (PID: 3884)
      • cx5ylLPZa0WXFvQ.exe (PID: 6700)
    • Contacting a server suspected of hosting an CnC

      • explorer.exe (PID: 5492)
  • INFO

    • Reads the computer name

      • cx5ylLPZa0WXFvQ.exe (PID: 6488)
    • Checks supported languages

      • cx5ylLPZa0WXFvQ.exe (PID: 6488)
      • cx5ylLPZa0WXFvQ.exe (PID: 6700)
    • Reads the machine GUID from the registry

      • cx5ylLPZa0WXFvQ.exe (PID: 6488)
    • Manual execution by a user

      • colorcpl.exe (PID: 5392)
    • Reads the software policy settings

      • slui.exe (PID: 6048)
      • slui.exe (PID: 6148)
    • Create files in a temporary directory

      • colorcpl.exe (PID: 5392)
    • Reads security settings of Internet Explorer

      • colorcpl.exe (PID: 5392)
    • Checks proxy server information

      • slui.exe (PID: 6148)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (63.1)
.exe | Win64 Executable (generic) (23.8)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)
.exe | Generic Win/DOS Executable (1.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:11:28 11:22:13+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 48
CodeSize: 771072
InitializedDataSize: 2560
UninitializedDataSize: -
EntryPoint: 0xbe1fe
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: Microsoft Corporation
FileDescription: Performance Relogging
FileVersion: 1.0.0.0
InternalName: EKeb.exe
LegalCopyright: Copyright © Microsoft Corporation. All rights reserved.
LegalTrademarks: -
OriginalFileName: EKeb.exe
ProductName: Performance Relogging
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
159
Monitored processes
14
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start cx5yllpza0wxfvq.exe no specs sppextcomobj.exe no specs slui.exe cx5yllpza0wxfvq.exe no specs cx5yllpza0wxfvq.exe no specs #FORMBOOK colorcpl.exe slui.exe #FORMBOOK explorer.exe firefox.exe no specs svchost.exe ucpdmgr.exe no specs conhost.exe no specs ucpdmgr.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1660"C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\firefox.execolorcpl.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
3221225534
Version:
123.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2332"C:\WINDOWS\system32\UCPDMgr.exe"C:\Windows\System32\UCPDMgr.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
User Choice Protection Manager
Exit code:
0
Version:
1.0.0.414301
Modules
Images
c:\windows\system32\ucpdmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
3268\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeUCPDMgr.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3884"C:\Users\admin\AppData\Local\Temp\cx5ylLPZa0WXFvQ.exe"C:\Users\admin\AppData\Local\Temp\cx5ylLPZa0WXFvQ.execx5ylLPZa0WXFvQ.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Performance Relogging
Exit code:
4294967295
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\cx5yllpza0wxfvq.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
4488"C:\WINDOWS\system32\UCPDMgr.exe"C:\Windows\System32\UCPDMgr.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
User Choice Protection Manager
Exit code:
0
Version:
1.0.0.414301
Modules
Images
c:\windows\system32\ucpdmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
4692\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeUCPDMgr.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5392"C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Color Control Panel
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\colorcpl.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\colorui.dll
5492C:\WINDOWS\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\shcore.dll
6048"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
7 674
Read events
7 667
Write events
7
Delete events
0

Modification events

(PID) Process:(5392) colorcpl.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(5392) colorcpl.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(5392) colorcpl.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(5492) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{DE7B24EA-73C8-4A09-985D-5BDADCFA9017}.check.800
Operation:writeName:CheckSetting
Value:
23004100430042006C006F00620000000000000001000000800000000000000047C99E5C959CDB01000000007B00440045003700420032003400450041002D0037003300430038002D0034004100300039002D0039003800350044002D003500420044004100440043004600410039003000310037007D002E006E006F00740069006600690063006100740069006F006E002E00320000000031003800310033000000
(PID) Process:(5492) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{DE7B24EA-73C8-4A09-985D-5BDADCFA9017}.check.800
Operation:writeName:CheckSetting
Value:
23004100430042006C006F00620000000000000000000000010000000000000000000000
(PID) Process:(5492) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{DE7B24EA-73C8-4A09-985D-5BDADCFA9017}.check.800
Operation:writeName:CheckSetting
Value:
23004100430042006C006F0062000000000000000100000080000000FC7F00003260375D959CDB01000000007B00440045003700420032003400450041002D0037003300430038002D0034004100300039002D0039003800350044002D003500420044004100440043004600410039003000310037007D002E006E006F00740069006600690063006100740069006F006E002E00320000000000000000000000000000
(PID) Process:(5492) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{DE7B24EA-73C8-4A09-985D-5BDADCFA9017}.check.800
Operation:writeName:CheckSetting
Value:
23004100430042006C006F00620000000000000000000000010000006D00730000000000
Executable files
0
Suspicious files
1
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
5392colorcpl.exeC:\Users\admin\AppData\Local\Temp\72-a1FI3Qbinary
MD5:A45465CDCDC6CB30C8906F3DA4EC114C
SHA256:4412319EF944EBCCA9581CBACB1D4E1DC614C348D1DFC5D2FAAAAD863D300209
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
68
TCP/UDP connections
149
DNS requests
34
Threats
61

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
404
91.195.240.19:80
http://www.taxhwangeub.com/rre4/?DNZ0=a5jzZh2E5AmzaRHPWPg6tqoa5RKVMXckIwS4VzZgjWxtoZM+ru9b9MUqJGgstYPRP0kuMcR6BbnlMkdtSuJBwd47q9kIPGv2hw==&tTD=AZU9BTG-3Ct2sbWK
unknown
unknown
5492
explorer.exe
POST
404
49.13.77.253:80
http://www.infinite-7.com/rre4/
unknown
unknown
5492
explorer.exe
POST
404
49.13.77.253:80
http://www.infinite-7.com/rre4/
unknown
unknown
5492
explorer.exe
GET
404
49.13.77.253:80
http://www.infinite-7.com/rre4/?DNZ0=2SxzK01BkM7zVXLHq3JICzTH4cqRiy/UbhPSpgIhAwYDcRjzM7gaYv4G4JOfo98THcwN/iufb0C1mQMz3IY3hj4T1Vqcy4BKPw==&tTD=AZU9BTG-3Ct2sbWK
unknown
unknown
5492
explorer.exe
POST
404
49.13.77.253:80
http://www.terranovaservices.top/rre4/
unknown
unknown
5492
explorer.exe
POST
404
49.13.77.253:80
http://www.terranovaservices.top/rre4/
unknown
unknown
5492
explorer.exe
POST
404
49.13.77.253:80
http://www.infinite-7.com/rre4/
unknown
unknown
5492
explorer.exe
POST
404
49.13.77.253:80
http://www.terranovaservices.top/rre4/
unknown
unknown
5492
explorer.exe
POST
404
49.13.77.253:80
http://www.infinite-7.com/rre4/
unknown
unknown
5492
explorer.exe
POST
404
49.13.77.253:80
http://www.terranovaservices.top/rre4/
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
unknown
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:138
unknown
5496
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2112
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
6048
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
5492
explorer.exe
91.195.240.19:80
www.taxhwangeub.com
SEDO GmbH
DE
unknown
5492
explorer.exe
49.13.77.253:80
www.infinite-7.com
Hetzner Online GmbH
DE
unknown
3216
svchost.exe
40.115.3.253:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
unknown
google.com
  • 216.58.206.78
unknown
activation-v2.sls.microsoft.com
  • 40.91.76.224
unknown
www.taxhwangeub.com
  • 91.195.240.19
unknown
www.infinite-7.com
  • 49.13.77.253
unknown
client.wns.windows.com
  • 40.115.3.253
  • 40.113.110.67
unknown
login.live.com
  • 40.126.31.67
  • 40.126.31.129
  • 20.190.159.0
  • 20.190.159.23
  • 20.190.159.71
  • 40.126.31.131
  • 40.126.31.1
  • 40.126.31.128
unknown
arc.msn.com
  • 20.199.58.43
unknown
www.terranovaservices.top
  • 49.13.77.253
unknown
slscr.update.microsoft.com
  • 20.12.23.50
unknown

Threats

PID
Process
Class
Message
5492
explorer.exe
Malware Command and Control Activity Detected
ET MALWARE FormBook CnC Checkin (GET) M5
5492
explorer.exe
A Network Trojan was detected
STEALER [ANY.RUN] Formbook HTTP Header
5492
explorer.exe
A Network Trojan was detected
STEALER [ANY.RUN] Formbook HTTP Header
5492
explorer.exe
Malware Command and Control Activity Detected
ET MALWARE FormBook CnC Checkin (GET) M5
2196
svchost.exe
Potentially Bad Traffic
ET DNS Query to a *.top domain - Likely Hostile
5492
explorer.exe
Potentially Bad Traffic
ET INFO HTTP Request to a *.top domain
5492
explorer.exe
A Network Trojan was detected
STEALER [ANY.RUN] Formbook HTTP Header
5492
explorer.exe
A Network Trojan was detected
STEALER [ANY.RUN] Formbook HTTP Header
5492
explorer.exe
A Network Trojan was detected
STEALER [ANY.RUN] Formbook HTTP Header
5492
explorer.exe
A Network Trojan was detected
STEALER [ANY.RUN] Formbook HTTP Header
No debug info