MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2c1f7f0978626db12ac76acd5c10d55d13976c43483baa257e8bd59c337c0b69. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 2c1f7f0978626db12ac76acd5c10d55d13976c43483baa257e8bd59c337c0b69
SHA3-384 hash: f9b37221399862173cd1991dd05c75aa3464e7f388a2b62e87758c2fdb511ed17f2d9192e60ae1d543ea1086cdfcbfab
SHA1 hash: ea1fd8087cff0cb8f0d244e8031a54c1c9c82e6b
MD5 hash: 44513b713624ce7c18c9865eda2ae820
humanhash: march-missouri-grey-monkey
File name:AW904824083731.xll
Download: download sample
Signature Formbook
File size:1'368'064 bytes
First seen:2022-05-12 07:24:28 UTC
Last seen:Never
File type:Excel file xll
MIME type:application/x-dosexec
imphash 7e569b564dba0b34119990efd3d9dfc6 (4 x Formbook)
ssdeep 24576:CnnncnKW2MGX1QXzQfN/0q0QnbhlEMFN/iNo8+L6Kaqm:xKWDQAUb7A
Threatray 15'698 similar samples on MalwareBazaar
TLSH T12B55F157E3D7FA71E6ED52BA86B1D63C176EB4A29169B74D7B404CCC29213038928F03
TrID 58.0% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
34.3% (.OCX) Windows ActiveX control (116521/4/18)
3.0% (.EXE) Win64 Executable (generic) (10523/12/4)
1.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.3% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter abuse_ch
Tags:FormBook xll

Intelligence


File Origin
# of uploads :
1
# of downloads :
137
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malicious
File Type:
Office Add-Ins - Suspicious
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Document exploit detected (creates forbidden files)
Document exploit detected (drops PE files)
Document exploit detected (process start blacklist hit)
Encrypted powershell cmdline option found
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Office process drops PE file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Snort IDS alert for network traffic
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Yara detected FormBook
Yara detected MSILDownloaderGeneric
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 625245 Sample: AW904824083731.xll Startdate: 12/05/2022 Architecture: WINDOWS Score: 100 59 www.netflixmas.com 2->59 61 www.boopai.top 2->61 63 ext-sq.squarespace.com 2->63 75 Snort IDS alert for network traffic 2->75 77 Found malware configuration 2->77 79 Malicious sample detected (through community Yara rule) 2->79 81 8 other signatures 2->81 13 cmd.exe 7 2 2->13         started        signatures3 process4 process5 15 EXCEL.EXE 22 21 13->15         started        19 conhost.exe 13->19         started        file6 57 C:\Users\user\...\AudioAppHDZRADVYXX.exe, PE32 15->57 dropped 73 Document exploit detected (creates forbidden files) 15->73 21 AudioAppHDZRADVYXX.exe 16 6 15->21         started        signatures7 process8 dnsIp9 71 cdn.discordapp.com 162.159.129.233, 443, 49775, 49805 CLOUDFLARENETUS United States 21->71 55 C:\Users\user\AppData\Roaming\...\Csrzy.exe, PE32 21->55 dropped 91 Multi AV Scanner detection for dropped file 21->91 93 Machine Learning detection for dropped file 21->93 95 Encrypted powershell cmdline option found 21->95 97 2 other signatures 21->97 26 InstallUtil.exe 21->26         started        29 powershell.exe 15 21->29         started        file10 signatures11 process12 signatures13 99 Modifies the context of a thread in another process (thread injection) 26->99 101 Maps a DLL or memory area into another process 26->101 103 Sample uses process hollowing technique 26->103 105 2 other signatures 26->105 31 explorer.exe 26->31 injected 33 conhost.exe 29->33         started        process14 process15 35 Csrzy.exe 14 3 31->35         started        39 Csrzy.exe 31->39         started        41 raserver.exe 31->41         started        dnsIp16 65 cdn.discordapp.com 35->65 83 Multi AV Scanner detection for dropped file 35->83 85 Machine Learning detection for dropped file 35->85 87 Encrypted powershell cmdline option found 35->87 43 powershell.exe 35->43         started        67 162.159.134.233, 443, 49806 CLOUDFLARENETUS United States 39->67 69 cdn.discordapp.com 39->69 45 powershell.exe 39->45         started        89 Tries to detect virtualization through RDTSC time measurements 41->89 47 cmd.exe 41->47         started        signatures17 process18 process19 49 conhost.exe 43->49         started        51 conhost.exe 45->51         started        53 conhost.exe 47->53         started       
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2022-05-12 07:25:11 UTC
File Type:
PE (Dll)
Extracted files:
2
AV detection:
15 of 26 (57.69%)
Threat level:
  5/5
Result
Malware family:
xloader
Score:
  10/10
Tags:
family:xloader campaign:ptm9 loader persistence rat suricata
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
Xloader Payload
Xloader
suricata: ET MALWARE FormBook CnC Checkin (GET)
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Excel file xll 2c1f7f0978626db12ac76acd5c10d55d13976c43483baa257e8bd59c337c0b69

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments