MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 07f7b852dc1cd3c5527fef6c09019b723a9e17ddc6b236c16e992784940b7a81. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



FormBook


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 07f7b852dc1cd3c5527fef6c09019b723a9e17ddc6b236c16e992784940b7a81
SHA3-384 hash: dcd1e9acc412fc79a6f16e782fc8b38d5e835deb3320d5a4c248cb28fb5ca350ca9c0f5764b89b165581241dc105a457
SHA1 hash: 17d8557e5c94f59dccf6e219cc8bac013fbd040b
MD5 hash: 40eaf2b0dcbcaf685c4ba34fd816e53d
humanhash: social-freddie-victor-december
File name:ashleyx.exe
Download: download sample
Signature FormBook
File size:734'720 bytes
First seen:2020-07-29 14:54:21 UTC
Last seen:2020-07-30 05:14:30 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash e8ef47e85c79ee608837cc415c05c43b (15 x AgentTesla, 5 x NanoCore, 5 x Loki)
ssdeep 12288:jRXtpnVH9Az44BnvOCDhzcl0UdKndi2bnXcMfpFv/cxBzKa/ZPspmGbVv:jfd8z4byilBdlGXfpR/ezKGimG
Threatray 5'151 similar samples on MalwareBazaar
TLSH B3F4AF66B3E14833D1B71E389D1B57649B3ABE002E3959462FFC1C8C5F39B813866297
Reporter James_inthe_box
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
2
# of downloads :
93
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Launching a process
Creating a file in the %AppData% subdirectories
Reading critical registry keys
Launching cmd.exe command interpreter
Creating a file in the %temp% directory
Unauthorized injection to a system process
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Contains functionality to detect sleep reduction / modifications
Detected FormBook malware
Detected unpacking (changes PE section rights)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file access)
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 253741 Sample: ashleyx.exe Startdate: 30/07/2020 Architecture: WINDOWS Score: 100 27 g.msn.com 2->27 29 asf-ris-prod-neurope.northeurope.cloudapp.azure.com 2->29 39 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->39 41 Malicious sample detected (through community Yara rule) 2->41 43 Yara detected FormBook 2->43 45 2 other signatures 2->45 9 ashleyx.exe 2->9         started        signatures3 process4 signatures5 55 Detected unpacking (changes PE section rights) 9->55 57 Maps a DLL or memory area into another process 9->57 59 Tries to detect virtualization through RDTSC time measurements 9->59 61 Contains functionality to detect sleep reduction / modifications 9->61 12 ashleyx.exe 9->12         started        process6 signatures7 63 Modifies the context of a thread in another process (thread injection) 12->63 65 Maps a DLL or memory area into another process 12->65 67 Sample uses process hollowing technique 12->67 69 Queues an APC in another process (thread injection) 12->69 15 explorer.exe 12->15 injected process8 dnsIp9 31 perfomancecoaching.com 34.102.136.180, 49737, 49738, 49739 GOOGLEUS United States 15->31 33 www.endmigraine.com 204.11.56.48, 49734, 49735, 49736 CONFLUENCE-NETWORK-INCVG Virgin Islands (BRITISH) 15->33 35 4 other IPs or domains 15->35 37 System process connects to network (likely due to code injection or exploit) 15->37 19 raserver.exe 17 15->19         started        signatures10 process11 file12 23 C:\Users\user\AppData\...\3L6logrv.ini, data 19->23 dropped 25 C:\Users\user\AppData\...\3L6logri.ini, data 19->25 dropped 47 Detected FormBook malware 19->47 49 Tries to steal Mail credentials (via file access) 19->49 51 Tries to harvest and steal browser information (history, passwords, etc) 19->51 53 3 other signatures 19->53 signatures13
Threat name:
Win32.Trojan.DataStealer
Status:
Malicious
First seen:
2020-07-29 14:53:30 UTC
File Type:
PE (Exe)
Extracted files:
46
AV detection:
26 of 29 (89.66%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
spyware
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Modifies Internet Explorer settings
Suspicious use of WriteProcessMemory
Suspicious use of SendNotifyMessage
Suspicious use of SetThreadContext
Suspicious use of SetThreadContext
Checks whether UAC is enabled
Reads user/profile data of web browsers
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments