MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 07f81a67a00edbc8511f22cadd8883117e1d6cfefee3206f477a4e74bbb602d8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 16


Intelligence 16 IOCs YARA 2 File information Comments

SHA256 hash: 07f81a67a00edbc8511f22cadd8883117e1d6cfefee3206f477a4e74bbb602d8
SHA3-384 hash: 7ff2247afdc7dbe5a787edc32502bf2a9880b36205acb111c6114c165d2402d1e31f9eb1c47526e51ac07386ab4abd94
SHA1 hash: 5b4eabe310c5c8e41cf26d553a66345124d98256
MD5 hash: 95bb9ef0aed69522a890691d2571bda7
humanhash: enemy-idaho-oklahoma-spaghetti
File name:shipping invoice documents.exe
Download: download sample
Signature Formbook
File size:461'824 bytes
First seen:2022-06-13 03:26:38 UTC
Last seen:2022-06-13 12:47:26 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'661 x AgentTesla, 19'470 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 12288:0BBafvI1LXg89J0T22lxurZQXWXVWB8rKQPBkVvVW:jfIb/J062lQdXVtPgVW
TLSH T111A412AE62B5496FCADD0BBAE882310D07F891767666E78F2C12B0F5658D3D841118B3
TrID 72.5% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.4% (.EXE) Win64 Executable (generic) (10523/12/4)
6.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.4% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon 0022a3a2b8a6e610 (16 x Formbook, 7 x AgentTesla, 6 x Loki)
Reporter GovCERT_CH
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
4
# of downloads :
280
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
shipping invoice documents.exe
Verdict:
Malicious activity
Analysis date:
2022-06-13 03:28:43 UTC
Tags:
formbook

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Searching for the window
Creating a window
Сreating synchronization primitives
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a file in the %temp% directory
Creating a process from a recently created file
Launching cmd.exe command interpreter
Enabling autorun by creating a file
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed wacatac
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Executable has a suspicious name (potential lure to open the executable)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AntiVM3
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 644201 Sample: shipping invoice documents.exe Startdate: 13/06/2022 Architecture: WINDOWS Score: 100 53 Malicious sample detected (through community Yara rule) 2->53 55 Antivirus detection for URL or domain 2->55 57 Multi AV Scanner detection for dropped file 2->57 59 14 other signatures 2->59 10 shipping invoice documents.exe 7 2->10         started        process3 file4 43 C:\Users\user\AppData\...\VljISuYiJOBt.exe, PE32 10->43 dropped 45 C:\Users\...\VljISuYiJOBt.exe:Zone.Identifier, ASCII 10->45 dropped 47 C:\Users\user\AppData\Local\...\tmpC5B2.tmp, XML 10->47 dropped 49 C:\...\shipping invoice documents.exe.log, ASCII 10->49 dropped 61 Adds a directory exclusion to Windows Defender 10->61 14 shipping invoice documents.exe 10->14         started        17 powershell.exe 25 10->17         started        19 powershell.exe 24 10->19         started        21 2 other processes 10->21 signatures5 process6 signatures7 63 Modifies the context of a thread in another process (thread injection) 14->63 65 Maps a DLL or memory area into another process 14->65 67 Sample uses process hollowing technique 14->67 69 Queues an APC in another process (thread injection) 14->69 23 explorer.exe 14->23 injected 25 conhost.exe 17->25         started        27 conhost.exe 19->27         started        29 conhost.exe 21->29         started        process8 process9 31 chkdsk.exe 23->31         started        34 autofmt.exe 23->34         started        signatures10 71 Modifies the context of a thread in another process (thread injection) 31->71 73 Maps a DLL or memory area into another process 31->73 75 Tries to detect virtualization through RDTSC time measurements 31->75 36 cmd.exe 31->36         started        38 explorer.exe 31->38         started        process11 dnsIp12 41 conhost.exe 36->41         started        51 192.168.2.1 unknown unknown 38->51 process13
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2022-06-13 01:50:14 UTC
File Type:
PE (.Net Exe)
Extracted files:
8
AV detection:
19 of 26 (73.08%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
xloader
Score:
  10/10
Tags:
family:formbook family:xloader campaign:sdzp evasion loader persistence rat spyware stealer suricata trojan
Behaviour
Creates scheduled task(s)
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
System policy modification
Enumerates physical storage devices
Drops file in Program Files directory
Suspicious use of SetThreadContext
Maps connected drives based on registry
Checks BIOS information in registry
Checks computer location settings
Deletes itself
Reads user/profile data of web browsers
Adds policy Run key to start application
Looks for VMWare Tools registry key
Looks for VirtualBox Guest Additions in registry
Xloader Payload
Formbook
Xloader
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (POST) M2
Unpacked files
SH256 hash:
ccb71b2db432c5cce84c9497f40cc185378bf0d6e75ea3465f0505808bf4753e
MD5 hash:
ef70c00df4c815463458b5b7247596b1
SHA1 hash:
27a60f111ed7ae3fc6deb13e13cdcd894898cc34
SH256 hash:
4de1a9fb9b98c9cc589e238c85d212ea50e0eac0f98e965115486a7d5ad43b36
MD5 hash:
9d50f76bd135e20ff1f40750a539df20
SHA1 hash:
1448129e3ea90bbd878a23789ee7fb9f2858170f
SH256 hash:
dec15271d422cf3b82c0a94cf147312bb5a4a4f262da4b698ffe7e6bdaf18053
MD5 hash:
79c5c39e29ebe233cd13a50987e64609
SHA1 hash:
0560314716e6519158009159c017d2b52116608e
SH256 hash:
07f81a67a00edbc8511f22cadd8883117e1d6cfefee3206f477a4e74bbb602d8
MD5 hash:
95bb9ef0aed69522a890691d2571bda7
SHA1 hash:
5b4eabe310c5c8e41cf26d553a66345124d98256
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe 07f81a67a00edbc8511f22cadd8883117e1d6cfefee3206f477a4e74bbb602d8

(this sample)

  
Dropped by
Formbook
  
Delivery method
Distributed via e-mail attachment

Comments