MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2fee614c34dfea5c440c1d0b8bf14c206f82f85fe3a8db4c19dce56e48fa2172. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



FormBook


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: 2fee614c34dfea5c440c1d0b8bf14c206f82f85fe3a8db4c19dce56e48fa2172
SHA3-384 hash: 27c94a46a0fc8de824ec3a1be4a60d827a1e6b79e255e63f31cbb92aca4f495a283a73e741494ea0a89ff4f63b31fc18
SHA1 hash: b60a89524310a77007013279f8834edcfa6d849e
MD5 hash: 70eac783ade6d87bc290e660807ca335
humanhash: pluto-fix-music-pip
File name:Purchase Order.exe
Download: download sample
Signature FormBook
File size:288'256 bytes
First seen:2020-07-22 10:07:17 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 6144:Jpzy9vStMSn8Lr3NHnNiD/t2ufCdInW9VkyTh1VOo:Jw9E+TxNi7prWwydy
Threatray 2'238 similar samples on MalwareBazaar
TLSH A354C1B99BDC40BAD2DDCEB4B292EA110379E50A3405E6863BC86CC9F41FB673511B4D
Reporter abuse_ch
Tags:exe FormBook


Avatar
abuse_ch
Malspam distributing FormBook:

HELO: mail.DSPROMEDIA.COM
Sending IP: 91.151.85.120
From: Fulcrum Maritime Systems Ltd <accounts@fulcrum-maritime.com>
Subject: Purchase Order
Attachment: Purchase Order.zip (contains "Purchase Order.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
88
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Creating a file
Launching cmd.exe command interpreter
Creating a window
Setting browser functions hooks
Unauthorized injection to a system process
Unauthorized injection to a browser process
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 249848 Sample: Purchase Order.exe Startdate: 23/07/2020 Architecture: WINDOWS Score: 100 89 www.invisalign-cardiff.com 2->89 113 Malicious sample detected (through community Yara rule) 2->113 115 Multi AV Scanner detection for submitted file 2->115 117 Sigma detected: Steal Google chrome login data 2->117 119 5 other signatures 2->119 14 Purchase Order.exe 1 2->14         started        signatures3 process4 signatures5 157 Maps a DLL or memory area into another process 14->157 17 Purchase Order.exe 1 14->17         started        20 RegAsm.exe 14->20         started        process6 signatures7 97 Maps a DLL or memory area into another process 17->97 22 Purchase Order.exe 1 17->22         started        25 RegAsm.exe 17->25         started        99 Modifies the context of a thread in another process (thread injection) 20->99 101 Sample uses process hollowing technique 20->101 103 Tries to detect virtualization through RDTSC time measurements 20->103 105 Queues an APC in another process (thread injection) 20->105 27 explorer.exe 1 6 20->27 injected process8 dnsIp9 121 Maps a DLL or memory area into another process 22->121 31 Purchase Order.exe 1 22->31         started        34 RegAsm.exe 22->34         started        123 Modifies the context of a thread in another process (thread injection) 25->123 125 Sample uses process hollowing technique 25->125 91 www.patlod.com 63.250.47.235, 49735, 80 NAMECHEAP-NETUS United States 27->91 93 www.evolutionhealth.care 52.205.104.118, 49739, 49740, 49741 AMAZON-AESUS United States 27->93 95 www.xn--uiru7lj8izzeso1f.com 27->95 87 C:\Users\user\AppData\...\4hhhqpxnf8.exe, PE32 27->87 dropped 127 System process connects to network (likely due to code injection or exploit) 27->127 129 Benign windows process drops PE files 27->129 36 mstsc.exe 1 19 27->36         started        39 WWAHost.exe 27->39         started        41 NETSTAT.EXE 27->41         started        43 5 other processes 27->43 file10 signatures11 process12 file13 159 Maps a DLL or memory area into another process 31->159 45 Purchase Order.exe 31->45         started        48 RegAsm.exe 31->48         started        161 Modifies the context of a thread in another process (thread injection) 34->161 163 Sample uses process hollowing technique 34->163 81 C:\Users\user\AppData\...\JL2logrv.ini, data 36->81 dropped 83 C:\Users\user\AppData\...\JL2logri.ini, data 36->83 dropped 85 C:\Users\user\AppData\...\JL2logrf.ini, data 36->85 dropped 165 Detected FormBook malware 36->165 167 Tries to steal Mail credentials (via file access) 36->167 169 Creates autostart registry keys with suspicious names 36->169 171 Tries to harvest and steal browser information (history, passwords, etc) 36->171 50 cmd.exe 36->50         started        53 cmd.exe 1 36->53         started        173 Tries to detect virtualization through RDTSC time measurements 39->173 55 conhost.exe 43->55         started        signatures14 process15 file16 149 Maps a DLL or memory area into another process 45->149 57 Purchase Order.exe 45->57         started        60 RegAsm.exe 45->60         started        151 Modifies the context of a thread in another process (thread injection) 48->151 153 Sample uses process hollowing technique 48->153 79 C:\Users\user\AppData\Local\Temp\DB1, SQLite 50->79 dropped 155 Tries to harvest and steal browser information (history, passwords, etc) 50->155 62 conhost.exe 50->62         started        64 conhost.exe 53->64         started        signatures17 process18 signatures19 137 Maps a DLL or memory area into another process 57->137 66 Purchase Order.exe 57->66         started        69 RegAsm.exe 57->69         started        139 Modifies the context of a thread in another process (thread injection) 60->139 141 Sample uses process hollowing technique 60->141 process20 signatures21 107 Maps a DLL or memory area into another process 66->107 71 Purchase Order.exe 66->71         started        74 RegAsm.exe 66->74         started        109 Modifies the context of a thread in another process (thread injection) 69->109 111 Sample uses process hollowing technique 69->111 process22 signatures23 131 Maps a DLL or memory area into another process 71->131 76 RegAsm.exe 71->76         started        133 Modifies the context of a thread in another process (thread injection) 74->133 135 Sample uses process hollowing technique 74->135 process24 signatures25 143 Modifies the context of a thread in another process (thread injection) 76->143 145 Maps a DLL or memory area into another process 76->145 147 Sample uses process hollowing technique 76->147
Threat name:
ByteCode-MSIL.Trojan.FormBook
Status:
Malicious
First seen:
2020-07-22 10:09:06 UTC
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of SendNotifyMessage
Enumerates system info in registry
System policy modification
Gathers network information
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of FindShellTrayWindow
Modifies Internet Explorer settings
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Gathers network information
Suspicious use of WriteProcessMemory
Suspicious behavior: MapViewOfSection
Drops file in Program Files directory
Suspicious use of SetThreadContext
Suspicious use of SetThreadContext
Checks whether UAC is enabled
Reads user/profile data of web browsers
Adds policy Run key to start application
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_nymaim_g0
Author:mak, msm, CERT.pl

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

FormBook

Executable exe 2fee614c34dfea5c440c1d0b8bf14c206f82f85fe3a8db4c19dce56e48fa2172

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments