File name:

fb950137c6cdd6106f6a642ffa4c8073c067b2cf8a057802415310cf24f6fc8a

Full analysis: https://app.any.run/tasks/53ec6e63-5e59-4b69-b452-de63acf70e5a
Verdict: Malicious activity
Threats:

FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus.

Analysis date: January 10, 2025, 23:14:21
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
autoit
formbook
xloader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

1CE360F7532EEFF6B69B01A1F59CBBAD

SHA1:

1D4497E3469DFF17D05BE582A07AE8BCE1072DE7

SHA256:

FB950137C6CDD6106F6A642FFA4C8073C067B2CF8A057802415310CF24F6FC8A

SSDEEP:

49152:LPPkzemqoSut3Jh4+QQ/btosJwIA4hHmZlKH2Tw/Pq83zw0bCjvk9G661QGtFELh:LP/mp7t3T4+B/btosJwIA4hHmZlKH2Td

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • FORMBOOK has been detected (YARA)

      • fb950137c6cdd6106f6a642ffa4c8073c067b2cf8a057802415310cf24f6fc8a.exe (PID: 6228)
  • SUSPICIOUS

    • Executes application which crashes

      • fb950137c6cdd6106f6a642ffa4c8073c067b2cf8a057802415310cf24f6fc8a.exe (PID: 6228)
  • INFO

    • Reads mouse settings

      • fb950137c6cdd6106f6a642ffa4c8073c067b2cf8a057802415310cf24f6fc8a.exe (PID: 6228)
    • Create files in a temporary directory

      • fb950137c6cdd6106f6a642ffa4c8073c067b2cf8a057802415310cf24f6fc8a.exe (PID: 6228)
    • The sample compiled with english language support

      • fb950137c6cdd6106f6a642ffa4c8073c067b2cf8a057802415310cf24f6fc8a.exe (PID: 6228)
    • Checks supported languages

      • fb950137c6cdd6106f6a642ffa4c8073c067b2cf8a057802415310cf24f6fc8a.exe (PID: 6228)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 6548)
    • Checks proxy server information

      • WerFault.exe (PID: 6548)
    • The process uses AutoIt

      • fb950137c6cdd6106f6a642ffa4c8073c067b2cf8a057802415310cf24f6fc8a.exe (PID: 6228)
    • Reads the software policy settings

      • WerFault.exe (PID: 6548)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:12:20 14:43:07+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 14.16
CodeSize: 633856
InitializedDataSize: 520704
UninitializedDataSize: -
EntryPoint: 0x20577
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (British)
CharacterSet: Unicode
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
131
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #FORMBOOK fb950137c6cdd6106f6a642ffa4c8073c067b2cf8a057802415310cf24f6fc8a.exe svchost.exe no specs werfault.exe

Process information

PID
CMD
Path
Indicators
Parent process
6228"C:\Users\admin\AppData\Local\Temp\fb950137c6cdd6106f6a642ffa4c8073c067b2cf8a057802415310cf24f6fc8a.exe" C:\Users\admin\AppData\Local\Temp\fb950137c6cdd6106f6a642ffa4c8073c067b2cf8a057802415310cf24f6fc8a.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\appdata\local\temp\fb950137c6cdd6106f6a642ffa4c8073c067b2cf8a057802415310cf24f6fc8a.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
6440"C:\Users\admin\AppData\Local\Temp\fb950137c6cdd6106f6a642ffa4c8073c067b2cf8a057802415310cf24f6fc8a.exe" C:\Windows\SysWOW64\svchost.exefb950137c6cdd6106f6a642ffa4c8073c067b2cf8a057802415310cf24f6fc8a.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
6548C:\WINDOWS\SysWOW64\WerFault.exe -u -p 6228 -s 760C:\Windows\SysWOW64\WerFault.exe
fb950137c6cdd6106f6a642ffa4c8073c067b2cf8a057802415310cf24f6fc8a.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
Total events
3 093
Read events
3 093
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
7
Text files
2
Unknown types
1

Dropped files

PID
Process
Filename
Type
6548WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_fb950137c6cdd610_f680ca67a7108f6a18e66a5018fd7ac8bad161a4_be521f9f_725807b6-8cf8-4068-80ae-0bde3020cb6c\Report.wer
MD5:
SHA256:
6548WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\37C951188967C8EB88D99893D9D191FEder
MD5:FA84E4BCC92AA5DB735AB50711040CDE
SHA256:6D7205E794FDE4219A62D9692ECDDF612663A5CF20399E79BE87B851FCA4CA33
6548WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\21253908F3CB05D51B1C2DA8B681A785der
MD5:F6F53CD09A41E968C363419B279D3112
SHA256:6D2BB01CC7A9BADE2113B219CAC1BDA86B2733196B7E1BD0C807CE1E396B1892
6548WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER5DA4.tmp.dmpbinary
MD5:412A0D5E8D40E6769E5A398A4DDC8F80
SHA256:AA5B5DD611E72D5F98AB51813A0E53D2317C78DD487A173BBD8B22C34940AD5A
6228fb950137c6cdd6106f6a642ffa4c8073c067b2cf8a057802415310cf24f6fc8a.exeC:\Users\admin\AppData\Local\Temp\prespecialistbinary
MD5:612B4517C9DE4488477E0914E646FAD1
SHA256:FC7E841E81FA3EB30B3A67BE70B04ABFD5F1094262F4C116C221E113C08F7246
6548WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\21253908F3CB05D51B1C2DA8B681A785binary
MD5:1A66839F1BF7DA791F608041906CE337
SHA256:4DD3088A002061A3D69C1CD58048E3C2DDCDA5C1DD6D0AE68F22F6CF9A31C373
6228fb950137c6cdd6106f6a642ffa4c8073c067b2cf8a057802415310cf24f6fc8a.exeC:\Users\admin\AppData\Local\Temp\aut58E1.tmpbinary
MD5:4D24BF38605566F12089D7CFEDC64D30
SHA256:C88DF27CBC7113CFE5BB7C95B56A95FDDFC378545F1D67FB81515E692366E61A
6548WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER5F1D.tmp.xmlxml
MD5:8862472C48F222369B59E1BC8AA2DA1E
SHA256:CBA6871EE2F08CC6466FFE4947DDB37F8BC7B23C5FFFA5ACE11696C7976C48A5
6548WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FEbinary
MD5:F7ED52BE03356AAAF64EC1CAF83AA455
SHA256:564A3823C75C7A48DB3ACD6C472E562C40E9B1281C2A3FBC987E87A0527C7A64
6548WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER5EED.tmp.WERInternalMetadata.xmlxml
MD5:60F3529B980E014D3E87BD393B64FDE3
SHA256:07EAA6BC1AC2162CF5F95CAF2996AEC73CC84DD90782F07ECCF9F88A6AAE93B1
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
36
DNS requests
21
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6092
svchost.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6092
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
7080
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7080
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6548
WerFault.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
6092
svchost.exe
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
6092
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
2.23.227.208:443
www.bing.com
Ooredoo Q.S.C.
QA
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 2.16.241.12
  • 2.16.241.19
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 2.23.246.101
whitelisted
google.com
  • 142.250.186.174
whitelisted
www.bing.com
  • 2.23.227.208
  • 2.23.227.215
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.159.0
  • 20.190.159.23
  • 20.190.159.73
  • 20.190.159.4
  • 40.126.31.71
  • 20.190.159.75
  • 20.190.159.64
  • 20.190.159.71
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted

Threats

No threats detected
No debug info