MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 14396b7f11bff744b29b018378cb72925a33039ed4ed804f2b2e63df2ea1f66e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DBatLoader


Vendor detections: 16


Intelligence 16 IOCs YARA 14 File information Comments

SHA256 hash: 14396b7f11bff744b29b018378cb72925a33039ed4ed804f2b2e63df2ea1f66e
SHA3-384 hash: fe47aa68d8a8384d487027df05e9afce4ebe8e3b0b874547970134a85c6b120418542c7e906fe3d39bbcf02da568bbe7
SHA1 hash: 60c915c00ee4c615c57f22fbd35a2f0513a5f53a
MD5 hash: c4fb4c31e721d98b27e271ee0bd54348
humanhash: ceiling-wisconsin-alanine-pennsylvania
File name:PURCHASE INQUIRY #180222-IN24 & #160222-IN71.exe
Download: download sample
Signature DBatLoader
File size:1'133'056 bytes
First seen:2023-09-18 06:49:12 UTC
Last seen:2023-09-18 07:41:15 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash c2ad891bcde9025eb987ac7b7c972a6f (2 x DBatLoader, 2 x RemcosRAT, 1 x Formbook)
ssdeep 24576:MbrDmg606ige8Nl24myHD6GfZX8H5tav:0tqw
Threatray 3'558 similar samples on MalwareBazaar
TLSH T196357D25B30268B1D017B935C807A694E1EA7DD17E1D48CE51AC7A362EF93E33E1C58B
TrID 50.1% (.EXE) InstallShield setup (43053/19/16)
15.2% (.SCR) Windows screen saver (13097/50/3)
12.2% (.EXE) Win64 Executable (generic) (10523/12/4)
7.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
5.2% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 30828c8c8c864840 (2 x DBatLoader, 2 x RemcosRAT, 1 x Formbook)
Reporter abuse_ch
Tags:DBatLoader exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
317
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
PURCHASE INQUIRY #180222-IN24 & #160222-IN71.exe
Verdict:
Malicious activity
Analysis date:
2023-09-18 11:20:50 UTC
Tags:
dbatloader formbook xloader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Creating a file
Running batch commands
Creating a process with a hidden window
Launching a process
Searching for the window
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Gathering data
Verdict:
Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
control keylogger lolbin masquerade
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
DBatLoader, FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates many large memory junks
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
DLL side loading technique detected
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with a suspicious file extension
Found malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected DBatLoader
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1309806 Sample: PURCHASE_INQUIRY_#180222-IN... Startdate: 18/09/2023 Architecture: WINDOWS Score: 100 93 Found malware configuration 2->93 95 Malicious sample detected (through community Yara rule) 2->95 97 Antivirus detection for URL or domain 2->97 99 7 other signatures 2->99 11 PURCHASE_INQUIRY_#180222-IN24_&_#160222-IN71.exe 1 7 2->11         started        16 Clafwpgm.PIF 2->16         started        18 Clafwpgm.PIF 2->18         started        process3 dnsIp4 77 web.fe.1drv.com 11->77 79 onedrive.live.com 11->79 85 2 other IPs or domains 11->85 65 C:\Users\Public\Libraries\netutils.dll, PE32+ 11->65 dropped 67 C:\Users\Public\Libraries\easinvoker.exe, PE32+ 11->67 dropped 69 C:\Users\Public\Libraries\Clafwpgm.PIF, PE32 11->69 dropped 123 Drops PE files with a suspicious file extension 11->123 125 Writes to foreign memory regions 11->125 127 Allocates memory in foreign processes 11->127 20 cmd.exe 1 11->20         started        23 colorcpl.exe 2 11->23         started        81 web.fe.1drv.com 16->81 87 3 other IPs or domains 16->87 129 Allocates many large memory junks 16->129 131 Injects a PE file into a foreign processes 16->131 25 colorcpl.exe 16->25         started        83 web.fe.1drv.com 18->83 89 3 other IPs or domains 18->89 133 Antivirus detection for dropped file 18->133 135 Multi AV Scanner detection for dropped file 18->135 27 colorcpl.exe 18->27         started        file5 signatures6 process7 signatures8 101 Uses ping.exe to sleep 20->101 103 Drops executables to the windows directory (C:\Windows) and starts them 20->103 105 Uses ping.exe to check the status of other devices and networks 20->105 29 easinvoker.exe 20->29         started        31 PING.EXE 1 20->31         started        34 xcopy.exe 2 20->34         started        39 8 other processes 20->39 107 Maps a DLL or memory area into another process 23->107 109 Queues an APC in another process (thread injection) 23->109 37 KVJWfLBfmnmIbkLqYmb.exe 23->37 injected process9 dnsIp10 41 cmd.exe 1 29->41         started        91 127.0.0.1 unknown unknown 31->91 61 C:\Windows \System32\easinvoker.exe, PE32+ 34->61 dropped 44 chkdsk.exe 13 37->44         started        63 C:\Windows \System32\netutils.dll, PE32+ 39->63 dropped file11 process12 signatures13 113 Adds a directory exclusion to Windows Defender 41->113 46 cmd.exe 1 41->46         started        49 conhost.exe 41->49         started        115 Tries to steal Mail credentials (via file / registry access) 44->115 117 Tries to harvest and steal browser information (history, passwords, etc) 44->117 119 Modifies the context of a thread in another process (thread injection) 44->119 121 2 other signatures 44->121 51 explorer.exe 44->51 injected 54 KVJWfLBfmnmIbkLqYmb.exe 44->54 injected process14 dnsIp15 137 Adds a directory exclusion to Windows Defender 46->137 56 powershell.exe 23 46->56         started        71 www.purelyunorthodox.com 154.204.19.73, 49777, 49778, 49779 SKHT-ASShenzhenKatherineHengTechnologyInformationCo Seychelles 51->71 73 transportlogistcs.com 216.246.46.167, 49756, 80 SERVERCENTRALUS United States 51->73 75 8 other IPs or domains 51->75 139 System process connects to network (likely due to code injection or exploit) 51->139 signatures16 process17 signatures18 111 DLL side loading technique detected 56->111 59 conhost.exe 56->59         started        process19
Threat name:
Win32.Trojan.Remcos
Status:
Malicious
First seen:
2023-09-18 06:13:07 UTC
File Type:
PE (Exe)
Extracted files:
72
AV detection:
26 of 38 (68.42%)
Threat level:
  5/5
Result
Malware family:
modiloader
Score:
  10/10
Tags:
family:modiloader persistence trojan
Behaviour
Enumerates system info in registry
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Adds Run key to start application
Executes dropped EXE
Loads dropped DLL
ModiLoader Second Stage
ModiLoader, DBatLoader
Unpacked files
SH256 hash:
f8ba27bbd758c4386ff323f1f91ca041065ede75d6eac12b21313f70741ac64b
MD5 hash:
a19413f277305b252c4596722c6f8c65
SHA1 hash:
ad4942d0486ebbdb483982ceccfcf35d9f841cb3
Detections:
win_dbatloader_g1
SH256 hash:
7bcdc2e607abc65ef93afd009c3048970d9e8d1c2a18fc571562396b13ebb301
MD5 hash:
c116d3604ceafe7057d77ff27552c215
SHA1 hash:
452b14432fb5758b46f2897aeccd89f7c82a727d
SH256 hash:
14396b7f11bff744b29b018378cb72925a33039ed4ed804f2b2e63df2ea1f66e
MD5 hash:
c4fb4c31e721d98b27e271ee0bd54348
SHA1 hash:
60c915c00ee4c615c57f22fbd35a2f0513a5f53a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BobSoftMiniDelphiBoBBobSoft
Author:malware-lu
Rule name:Borland
Author:malware-lu
Rule name:DebuggerCheck__GlobalFlags
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Active
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Thread
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

DBatLoader

Executable exe 14396b7f11bff744b29b018378cb72925a33039ed4ed804f2b2e63df2ea1f66e

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments