MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 22da6798edf7ecbc018e132ff61dff54b38704226c0f4693e8981b112e69eafc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 14


Intelligence 14 IOCs YARA 3 File information Comments

SHA256 hash: 22da6798edf7ecbc018e132ff61dff54b38704226c0f4693e8981b112e69eafc
SHA3-384 hash: 7cb989d42bcbb72b3e9f128d104ac1626bba3a7965dd4636775c05f44f6256a039d7031d8cc0b6ae170e02247602a91c
SHA1 hash: 428f3ab10037c2c5e18356f9b72c8d95cd0548a6
MD5 hash: ed2fce4f08d4b4ebbc737100e1a9f656
humanhash: fourteen-whiskey-one-comet
File name:Purchase Order No.1364.exe
Download: download sample
Signature Formbook
File size:641'024 bytes
First seen:2023-10-30 14:03:48 UTC
Last seen:2023-10-30 16:49:49 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 12288:G8669yqLzvwX/MaKXMo8nby+dCTikUSBnf6WeBPgVBANPXeVUoKACYxhw1V:+6X3IXhKXM1NCTlpxCBPgVyNPXehKYxy
Threatray 18 similar samples on MalwareBazaar
TLSH T101D4224231AA6F01C77CE3B55AB2916463F64B298B33DB6D1DDC22CB49B3B5803A5743
TrID 63.0% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
11.2% (.SCR) Windows screen saver (13097/50/3)
9.0% (.EXE) Win64 Executable (generic) (10523/12/4)
5.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon c4c6a2202e223684 (12 x AgentTesla, 8 x Formbook, 2 x Loki)
Reporter cocaman
Tags:exe FormBook payment

Intelligence


File Origin
# of uploads :
3
# of downloads :
338
Origin country :
CH CH
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
Purchase Order No.1364.exe
Verdict:
Malicious activity
Analysis date:
2023-10-30 15:02:00 UTC
Tags:
formbook xloader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Сreating synchronization primitives
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a process with a hidden window
Creating a file in the %temp% directory
Launching a process
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Using the Windows Management Instrumentation requests
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
masquerade packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Antivirus detection for URL or domain
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sigma detected: Scheduled temp file as task from temp location
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1334295 Sample: Purchase_Order_No.1364.exe Startdate: 30/10/2023 Architecture: WINDOWS Score: 100 64 www.peedeecarcredit.com 2->64 66 www.miraculousstore.com 2->66 68 6 other IPs or domains 2->68 72 Malicious sample detected (through community Yara rule) 2->72 74 Antivirus detection for URL or domain 2->74 76 Sigma detected: Scheduled temp file as task from temp location 2->76 78 6 other signatures 2->78 10 Purchase_Order_No.1364.exe 7 2->10         started        14 YJCLStpmojN.exe 5 2->14         started        signatures3 process4 file5 54 C:\Users\user\AppData\...\YJCLStpmojN.exe, PE32 10->54 dropped 56 C:\Users\user\AppData\Local\...\tmp6480.tmp, XML 10->56 dropped 90 Uses schtasks.exe or at.exe to add and modify task schedules 10->90 92 Adds a directory exclusion to Windows Defender 10->92 16 Purchase_Order_No.1364.exe 10->16         started        19 powershell.exe 23 10->19         started        21 schtasks.exe 1 10->21         started        94 Multi AV Scanner detection for dropped file 14->94 23 YJCLStpmojN.exe 14->23         started        25 schtasks.exe 1 14->25         started        27 YJCLStpmojN.exe 14->27         started        signatures6 process7 signatures8 70 Maps a DLL or memory area into another process 16->70 29 hzfGSocIUsVFDgSkjCkQROv.exe 16->29 injected 31 conhost.exe 19->31         started        33 conhost.exe 21->33         started        35 hzfGSocIUsVFDgSkjCkQROv.exe 23->35 injected 38 conhost.exe 25->38         started        process9 signatures10 40 cscript.exe 13 29->40         started        43 Magnify.exe 29->43         started        80 Maps a DLL or memory area into another process 35->80 45 cscript.exe 35->45         started        47 Magnify.exe 35->47         started        process11 signatures12 82 Tries to steal Mail credentials (via file / registry access) 40->82 84 Tries to harvest and steal browser information (history, passwords, etc) 40->84 86 Writes to foreign memory regions 40->86 88 3 other signatures 40->88 49 hzfGSocIUsVFDgSkjCkQROv.exe 40->49 injected 52 firefox.exe 40->52         started        process13 dnsIp14 58 www.d356.top 154.197.7.163, 80 YISUCLOUDLTD-AS-APYISUCLOUDLTDHK Seychelles 49->58 60 www.usxqe6.cfd 142.4.124.174, 49741, 49742, 49743 PEGTECHINCUS United States 49->60 62 4 other IPs or domains 49->62
Threat name:
ByteCode-MSIL.Trojan.FormBook
Status:
Malicious
First seen:
2023-10-30 11:05:15 UTC
File Type:
PE (.Net Exe)
Extracted files:
19
AV detection:
23 of 38 (60.53%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Creates scheduled task(s)
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
Loads dropped DLL
Unpacked files
SH256 hash:
3cf5244373ee8df75cd064504728ce3cafc7348a66c607b6736db849a2bd9e8d
MD5 hash:
1eb27fb8f23e1219d092e75909f3d141
SHA1 hash:
b591d10302be513f2a5280537cd3c2819504a6de
Detections:
win_formbook_w0 win_formbook_g0
SH256 hash:
7b6cca1a9c079f7f76277d13db9e1dfed79a841d44b69ac93e174cc0c69cbcd6
MD5 hash:
a6cca21cdb4c1ef1a42b1627dbdc55f4
SHA1 hash:
bd95003d41e6e610a60d1c8cc3723e8434e16f03
SH256 hash:
d01f3dea3851602ba5a0586c60430d286adf6fcc7e17aab080601a66630606e5
MD5 hash:
579197d4f760148a9482d1ebde113259
SHA1 hash:
cf6924eb360c7e5a117323bebcb6ee02d2aec86d
SH256 hash:
a311c67e0bb00a74da93860302adb22926bedbf253cccd412609e8865aaa3577
MD5 hash:
4d9a190baac47411916c5ea0c62ebe91
SHA1 hash:
c54bb84403c45557daa8ddfc23ab94b507b332b9
SH256 hash:
e731bbf86517a1c2c8521a6c4bab1c01d93211367a3acb7835d4fb5f9b1cc001
MD5 hash:
41fd343b470a74bf1fd882b660154853
SHA1 hash:
691c9357edbe5ef60d5cfbc555432796b8bb5354
SH256 hash:
21af1da66ba21fc40f2961b617093ec15974252b08cae9657effe8c017b86683
MD5 hash:
40ff176dd73d4de2a0dd29bc987b5efe
SHA1 hash:
f4ced7ec9179dfc50de7ea5c932491e67c6a1a3a
SH256 hash:
35b13fa0cd5253e7e5995a548573ca84ebc01e5cd283625a1b3b2d060cae841b
MD5 hash:
6151edcc2c1947cefb9425cf99cb526b
SHA1 hash:
961277bf9af51c3972e47a0e6d540f6c0bc2aa69
SH256 hash:
9a7fc071322ab7814d0fbd2b99b86b623eaa8ba5cf9f78ad440d21beb6acd92e
MD5 hash:
9591a84c18a19c3bfcb64c738b02338c
SHA1 hash:
688c5e5bb353630028131435050fd06a8b4498b8
SH256 hash:
5eb78212b3ac91446f4b36c9a291c1f6537b20ba2dce9f5c691f41e9df0595bb
MD5 hash:
9ffbdefcdbd8512c04e048ee3e4d3d37
SHA1 hash:
4628d8fe848a87f9089bffc1372a0d039356ab39
SH256 hash:
e4936139cb1b38bda7fad9b96e17fc13b5d9141a87e36fc6d3e3e50869bb45ba
MD5 hash:
b1056306548c7fbf98d7ef145d0a5957
SHA1 hash:
1ff1609312863531d3fee622c9cdd84dbe1ef615
SH256 hash:
9f0780c5b2d4b203a4a0428da96448c3fbfd134b408419220a76f9ac8a5fd2bf
MD5 hash:
21375bef49e93315939bffe6cce416b0
SHA1 hash:
0a2e95668a63fcc40054e56a3aace49a57435b70
SH256 hash:
22da6798edf7ecbc018e132ff61dff54b38704226c0f4693e8981b112e69eafc
MD5 hash:
ed2fce4f08d4b4ebbc737100e1a9f656
SHA1 hash:
428f3ab10037c2c5e18356f9b72c8d95cd0548a6
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe 22da6798edf7ecbc018e132ff61dff54b38704226c0f4693e8981b112e69eafc

(this sample)

Comments