MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9bbebb59b74b06b6d1db59d4d33f0baa4a6d44ec18b51b4ec11b9ae210e8bff8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara Comments

SHA256 hash: 9bbebb59b74b06b6d1db59d4d33f0baa4a6d44ec18b51b4ec11b9ae210e8bff8
SHA3-384 hash: 40d600634accf2f0efb5f118122e0810a187cdd3151c50bcbb0cb4d0593269a96a65a8982380f7b26774e5b011193236
SHA1 hash: e1c8598e8308b0effd73af08bc5531f398a0a213
MD5 hash: de3e924dfe469d9d7efe3c69ece5af68
humanhash: minnesota-skylark-lemon-butter
File name:purchase order.exe
Download: download sample
Signature FormBook
File size:419'328 bytes
First seen:2020-07-31 16:05:46 UTC
Last seen:2020-07-31 16:48:57 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744
ssdeep 6144:6qQRsAyCiSxtu9LsKbH4+zncF267UlCy4pdSOo6hs8tmhIn37nyBCcWY:6XsADLiLsEH4+znqlqEpYelEIn3+f
TLSH 2394F12C22945726F12A0A7F9C751113AFB3C51FA421E68B5FB060DA197EB4C3D61FA3
Reporter @abuse_ch
Tags:exe FormBook


Twitter
@abuse_ch
Malspam distributing FormBook:

HELO: dispatchedlogistics.com
Sending IP: 103.99.1.145
From: export@dispatchedlogistics.com
Subject: Re: invoice & packing list
Attachment: invoice.rar (contains "purchase order.exe")

Intelligence


File Origin
# of uploads :
2
# of downloads :
51
Origin country :
FR FR
Mail intelligence
Geo location:
Global
Volume:
Low
Vendor Threat Intelligence
Gathering data
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Executable has a suspicious name (potential lure to open the executable)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Suspicious Svchost Process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Yara detected AntiVM_3
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 255470 Sample: purchase order.exe Startdate: 01/08/2020 Architecture: WINDOWS Score: 100 31 g.msn.com 2->31 33 asf-ris-prod-neurope.northeurope.cloudapp.azure.com 2->33 41 Malicious sample detected (through community Yara rule) 2->41 43 Yara detected AntiVM_3 2->43 45 Yara detected FormBook 2->45 47 7 other signatures 2->47 11 purchase order.exe 3 2->11         started        signatures3 process4 file5 29 C:\Users\user\...\purchase order.exe.log, ASCII 11->29 dropped 14 purchase order.exe 11->14         started        17 purchase order.exe 11->17         started        process6 signatures7 55 Modifies the context of a thread in another process (thread injection) 14->55 57 Maps a DLL or memory area into another process 14->57 59 Sample uses process hollowing technique 14->59 61 Queues an APC in another process (thread injection) 14->61 19 explorer.exe 14->19 injected process8 dnsIp9 35 www.multonin.reisen 19->35 37 www.minnesotaauto.loan 19->37 39 www.jlegitimus.com 19->39 22 svchost.exe 19->22         started        process10 signatures11 49 Modifies the context of a thread in another process (thread injection) 22->49 51 Maps a DLL or memory area into another process 22->51 53 Tries to detect virtualization through RDTSC time measurements 22->53 25 cmd.exe 1 22->25         started        process12 process13 27 conhost.exe 25->27         started       
Threat name:
Win32.Trojan.Swotter
Status:
Malicious
First seen:
2020-07-31 16:07:37 UTC
AV detection:
22 of 31 (70.97%)
Threat level
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
rat trojan spyware stealer family:formbook evasion persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: MapViewOfSection
Suspicious use of SendNotifyMessage
System policy modification
Suspicious use of FindShellTrayWindow
Modifies Internet Explorer settings
Drops file in Program Files directory
Suspicious use of SetThreadContext
Checks whether UAC is enabled
Deletes itself
Reads user/profile data of web browsers
Adds policy Run key to start application
Formbook Payload
Formbook
Threat name:
Suspicious File
Score:
0.45

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

FormBook

Executable exe 9bbebb59b74b06b6d1db59d4d33f0baa4a6d44ec18b51b4ec11b9ae210e8bff8

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments