MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 00b678e92dbc23f5d49fa664274e0896bc194d32957ce953340f078b7f740df5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 15


Intelligence 15 IOCs YARA 2 File information Comments

SHA256 hash: 00b678e92dbc23f5d49fa664274e0896bc194d32957ce953340f078b7f740df5
SHA3-384 hash: 7c1c21dc0c9794b45d483aa8ed2daca1aff81bceea0fb727c952285f03615e40b6348db140339e16a07c3131cba42127
SHA1 hash: d8bb186614cc7c385bb518f3c650908037d24214
MD5 hash: aa8c8fcc19df3268780e14a2fb948b90
humanhash: hydrogen-low-michigan-fillet
File name:invoice.exe
Download: download sample
Signature Formbook
File size:669'696 bytes
First seen:2023-05-09 08:22:36 UTC
Last seen:2023-05-09 09:27:11 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'461 x Formbook, 12'202 x SnakeKeylogger)
ssdeep 12288:a35CsTTyTGchppg+S0L+7NP10OUQfcRHFmXFreOrbNj5AySr:a3jvcGcTpTS0LgtUQ0xlOX3U
Threatray 1'801 similar samples on MalwareBazaar
TLSH T123E4E1B4A0AE49E5E20B8AB0157CBDA21FB670D3FDD505780B796105DFB7B143E8884E
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
File icon (PE):PE icon
dhash icon 0b1b9a92b4646968 (9 x Loki, 7 x AgentTesla, 5 x SnakeKeylogger)
Reporter threatcat_ch
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
5
# of downloads :
252
Origin country :
CH CH
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
invoice.exe
Verdict:
Malicious activity
Analysis date:
2023-05-09 08:24:20 UTC
Tags:
formbook xloader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Сreating synchronization primitives
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a process from a recently created file
Creating a process with a hidden window
Creating a file in the %temp% directory
Launching a process
Creating a file
Launching cmd.exe command interpreter
Enabling autorun by creating a file
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found malware configuration
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 861960 Sample: invoice.exe Startdate: 09/05/2023 Architecture: WINDOWS Score: 100 63 www.klosterbraeu-unterliezheim.com 2->63 65 www.doghospitalnearme.com 2->65 67 2 other IPs or domains 2->67 79 Snort IDS alert for network traffic 2->79 81 Found malware configuration 2->81 83 Malicious sample detected (through community Yara rule) 2->83 85 9 other signatures 2->85 11 invoice.exe 7 2->11         started        15 pBIAvksiuGW.exe 5 2->15         started        signatures3 process4 file5 51 C:\Users\user\AppData\...\pBIAvksiuGW.exe, PE32 11->51 dropped 53 C:\Users\...\pBIAvksiuGW.exe:Zone.Identifier, ASCII 11->53 dropped 55 C:\Users\user\AppData\Local\...\tmpD75D.tmp, XML 11->55 dropped 57 C:\Users\user\AppData\...\invoice.exe.log, ASCII 11->57 dropped 93 Uses schtasks.exe or at.exe to add and modify task schedules 11->93 95 Adds a directory exclusion to Windows Defender 11->95 17 RegSvcs.exe 11->17         started        20 powershell.exe 21 11->20         started        22 schtasks.exe 1 11->22         started        97 Multi AV Scanner detection for dropped file 15->97 99 Machine Learning detection for dropped file 15->99 101 Sample uses process hollowing technique 15->101 24 RegSvcs.exe 15->24         started        26 schtasks.exe 1 15->26         started        28 RegSvcs.exe 15->28         started        30 RegSvcs.exe 15->30         started        signatures6 process7 signatures8 69 Modifies the context of a thread in another process (thread injection) 17->69 71 Maps a DLL or memory area into another process 17->71 73 Sample uses process hollowing technique 17->73 75 2 other signatures 17->75 32 explorer.exe 3 6 17->32 injected 36 conhost.exe 20->36         started        38 conhost.exe 22->38         started        40 conhost.exe 26->40         started        process9 dnsIp10 59 klosterbraeu-unterliezheim.com 81.169.145.159, 49699, 80 STRATOSTRATOAGDE Germany 32->59 61 www.cassino-portugal.com 188.114.97.7, 49700, 80 CLOUDFLARENETUS European Union 32->61 77 System process connects to network (likely due to code injection or exploit) 32->77 42 colorcpl.exe 32->42         started        45 mstsc.exe 32->45         started        signatures11 process12 signatures13 87 Modifies the context of a thread in another process (thread injection) 42->87 89 Maps a DLL or memory area into another process 42->89 91 Tries to detect virtualization through RDTSC time measurements 42->91 47 cmd.exe 1 42->47         started        process14 process15 49 conhost.exe 47->49         started       
Threat name:
ByteCode-MSIL.Trojan.SnakeKeylogger
Status:
Malicious
First seen:
2023-05-09 01:12:02 UTC
File Type:
PE (.Net Exe)
Extracted files:
9
AV detection:
24 of 36 (66.67%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:m82 rat spyware stealer trojan
Behaviour
Creates scheduled task(s)
Gathers network information
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
Formbook payload
Formbook
Unpacked files
SH256 hash:
76f9c3ed177a98a5397d5507ce7efbafed0c55553ce00dec171891c54a35db77
MD5 hash:
d090b96080246effb57d59eba08ce4c8
SHA1 hash:
b77aa76796ff76824ce7c7ca4cf11378888f1d44
Detections:
FormBook win_formbook_w0 win_formbook_auto win_formbook_g0
Parent samples :
89d2909907c3d2b6d07e0b7cec15705f783ec6df833ca12ef42eeb7c147686cf
34a5fa7d85900b14812e17b83238dd9b6e8a4b65373d06c7274c2c03ab418e36
b00b40c7ac573bb276450271e73d9c30ba49a7378f5c991fd518c9d3870f6823
f874095f50064aa4f4405f045c8ca3640812609167138cd7137816cb8f774994
a25247a44c6daf029eae02060c11c9a946d0648f2eedc1a6348822c7c6590af3
b600964a8820087cca83e668feeb9096d3aa9e2dbfdaf8a6546d8ec57d52b876
895f56ac536039f2b575b9013cd2d756d48f2fd6ecab01689f33b1d18598452d
7ae7549fcc35a02ed81ab68dbb4997b955edd32cc0207f9e58199200d82e281a
7b222afd2a90cd509e30c2d7bb748e2de92feaba064da9acfa84ac7684768d72
338c24b4e755ad15fa3fba95c2a4df09d8fe2aa343b13dc8d5506013ba8bb94a
d9e6629d10acc5f2c14986434a8ecf599c025ea5250015cb15dea536f05b61e8
787749eb7f58d153e79642ec221d253fc05da6fe31db65e423f14d02ab4d87e5
b8f118372fddf19c9ec290fb43e0c3f8154f45c1d8ec9c119ebd0c8d83b606f0
da43a0b65a0e93951f23754a21119c40e4928cf9c9a6b8d77481b631a01bc9a9
96f77abb1ac5786997e5bbe93b32245c169590855924a12a92c014051758ec8a
24380c6d7b340557a8e71c58078bd0ed311e3c42b975a75d23a0056210e2ad3e
d30f415758c3cab377c63b3dd5a043d83d153c47a8f6aae56e88c5868d090556
c80a78a69b180edbd9c52c5828d7adabfba05645618ed23d9728d1ea8ab394b1
bf6a195481cb4cba11f09c03c4fca9be90f011fc883dad09b8b79a4b94e3aafc
fe8988a0ee2b5c321d3538ed71519c3f3a73746a4a1adc9c84b3ce574fd353c3
21037d3de36ca089fdc638c7a3a09a00568d5d56e16aebdc2f30398e4eabffa6
5532787ca87e4586e69a4b8ef22e23faefcd66a1bef5864d1cbf8e6c4df1989c
22dcbd98f140f60b488ee8413a8a16b7d1d99b22ded2e82f5aad36cf454384a2
c4261e2c68f2fed74c9fc7d89f64ca53ed9bcaca51e870f8d760167b8e2e6186
3dca60e7a32bc81165f399bab2162271332156e05c490ed4af3972713a1cb0f4
e28bce0b6ccf49e32050baa8539c9b91cbbbd9dbd8382be57f6e8c44bab74956
7d32b52e3465e4c07cc727fa95fd264c07091fc0adf65ea0ed01ec0245836bf5
6f505344ed0b63ea1ca3b058da81bd53069385a4fec5b94f7e97ecd3e53bf57f
ece8d55b66fdd470a1037290b30a2e6e66d0ff38fa366ec37a2b0a330364093e
ee4ff10990ca92dca3a0ee6feeff6930f5dbeb239e747cf69ab4560a65a9fd0e
7d0fdf3abd56e00933c0fa8cf573b948a4c9d85248915249f1909e6775f75e75
6982ab1d029213bfcfbc542eee0d955b770f5c0df083dc94463c441e2de35fe5
c1a8208a8af8fb2ab397e586ea8a7f265921e6f21eb592af42a8f5c805d18557
cfe9062e6bd88ae993c3e8b295386c2e5e9aa7d8b9ceb168f56ccd3e0e5cbe36
f6bb03b4bffe8e0ab71cd8e26a65b3baa5f870cee4e974851dce6d8140316c84
00b678e92dbc23f5d49fa664274e0896bc194d32957ce953340f078b7f740df5
a9c993b79501ed32742c5ccfd04e3c47d75fd26795fd87bb3dfc288384de7be3
ecfa6953a0d70eac807833f74a201fc694a325cfa964303e82348abf082dfaa5
d549aca33462425f1f32e75b6635986df724a63b6f738247d4be19de580bc899
2484f3b9e112f39471b0375d98ac190b4ffe3e29a295bcecdb8fd7b71af0094b
3fe2c04c33423019af7464d50b3df0775a565e9a31e1a289b49e4e180585ab00
114f4e62ec2b81ab45799a56b183ef282b2bc5c172fd9831af33c154b23034ea
a1fc12e0b11dc727c1e4f58da908d512b2ea1fb69cc317e024390440807d62eb
68688eb3a301e7b383bf631b7dc95dbeedf6f1fe23d7e3a6b8e0e45fccf6b8e6
2f63ebbdab728b4add526836bbe063788228b48240179035db13f85b9836559d
b9bdf17b0783f5b073ba007091604c0407e825b17ae8ae90bf53d2a2140341ba
4b400ae71cf7cf4f1125e27b683861b698fa6ade4f8fdeba92c0ac819b72bcb6
5a056284d1d1ed301db9889707086b4f90527b0e22965fc3a01cc1abd97a2972
362365797a625ef308f4071bc408a35c5cf5db4c2e6847bb854b995eec8e658b
7af072164e5fc3c39c58fe100e422e079c2b98ab185065962569ac8b12c7517c
9296272090597bd4d2723682f9ab6923356efad185125ad318eb778637b36cff
74ed6e04325307fef674714dbd65803fe7a4d5d784522c7b65cf5f9953b2042c
a28cb539852da2e100484ab8cee9613a28b2e68d409b99d80e27f4fb7f238b5d
6a904048b9d948e087012a190d07d2acf4ed6b1ae0d666d4f6da310d1863a1c4
0368b2ffa6991460a59b03edcd2ef71c423a27d4902b2222248bc0935776614d
3017b026d0925919ad8085d523f83235fa84ead58d1399576e60e6183003820e
7cdbc9e74ca8d6119202864a709809712505bac9f32b6d60c552f01a1ac090c3
6d8cd5b437db834821da59ec82032cb88c459cb614382e4125c208f42c35a7bd
02b060c393fbc76a082ef0411f28e2be60bce1af80ea2df91f003e9b8a762b88
64e9e76c9c64aa89f98ba7a6413df1c33fd3e5efeb35a7d52cb9b8b4fbe6f443
93a9ea827dd8635158be7b107a40feeb50a52566698915f0c499a5f50c157200
1cc318613830f916bdbd91c8bba57d82473262361b46abfb9c41bc4bae0687ff
SH256 hash:
3ab1dcc37e7c5c643bf41e9f0f81f816f24974fbddde95e2af52426e3374dd35
MD5 hash:
8a2c496875c0871aecc16aae768b323f
SHA1 hash:
f5423a32125c70b512de301c5616c7b75477e2e7
SH256 hash:
c46bd78ab2201ef2b164a0495a5fbb7b2001de77a85c41ba2812e85b34ea3714
MD5 hash:
aec2d7a35ce08153314770b0501d42c6
SHA1 hash:
aff92a299bb51e04a0b464e46afd280ecc3ea888
SH256 hash:
c5a505f7b1d4c1f55da6a05ab91e3621185b60f016a946c6b55b57d3ddc69278
MD5 hash:
a07d610bf01a5d435625dcc2f0d7428c
SHA1 hash:
12e0ce523836f57581a77226aa20c911fea55e74
SH256 hash:
1f72b3e963594132734ca83686a29ebcfc59891b49720f0c1231452054461f7d
MD5 hash:
3c1c5c336bd5110c3f062292d0330433
SHA1 hash:
0f4407abdb0d74eec7e343c122269623fa9aa9bd
SH256 hash:
00b678e92dbc23f5d49fa664274e0896bc194d32957ce953340f078b7f740df5
MD5 hash:
aa8c8fcc19df3268780e14a2fb948b90
SHA1 hash:
d8bb186614cc7c385bb518f3c650908037d24214
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe 00b678e92dbc23f5d49fa664274e0896bc194d32957ce953340f078b7f740df5

(this sample)

  
Dropped by
formbook
  
Delivery method
Distributed via e-mail attachment

Comments