MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 630ea8ccea4f9f5667c356a897a037538288d57b4ca6464b3d90d17f3ba182d1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 630ea8ccea4f9f5667c356a897a037538288d57b4ca6464b3d90d17f3ba182d1
SHA3-384 hash: 04896a4f3ec00c49a42c01819f563af01007fa74f95d0b19f506f13a38537eb972b0d2886353b43f36955abf4d7b8dcb
SHA1 hash: f93448764fccbf21b2f94711bf09310809298e43
MD5 hash: 599f3da4fcceeff012fb72ed22ba20f1
humanhash: ink-arkansas-fifteen-skylark
File name:SecuriteInfo.com.Win64.PWSX-gen.5874.22719
Download: download sample
Signature Formbook
File size:564'224 bytes
First seen:2022-12-08 14:36:59 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 12288:JuN7XJPGa/5LplH5PN3r86eXEONa9iJ8jr4H:Juj+4zZO6Qnyn
TLSH T1F0C48CE5C1A15FA8E58832FE495958CC43188B68D0CC588DB8F5FF6DB1736D92218ECE
TrID 56.5% (.EXE) Win64 Executable (generic) (10523/12/4)
11.0% (.ICL) Windows Icons Library (generic) (2059/9)
10.9% (.EXE) OS/2 Executable (generic) (2029/13)
10.7% (.EXE) Generic Win/DOS Executable (2002/3)
10.7% (.EXE) DOS Executable Generic (2000/1)
File icon (PE):PE icon
dhash icon 2609090e0e2e2608 (16 x Formbook, 2 x AgentTesla)
Reporter SecuriteInfoCom
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
172
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a service
Loading a system driver
Launching a process
Сreating synchronization primitives
Launching cmd.exe command interpreter
Creating a file
Searching for synchronization primitives
Setting browser functions hooks
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun for a service
Unauthorized injection to a system process
Unauthorized injection to a browser process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
expl.evad
Score:
92 / 100
Signature
.NET source code contains very large array initializations
Creates autostart registry keys with suspicious names
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample is not signed and drops a device driver
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected AntiVM3
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 763570 Sample: SecuriteInfo.com.Win64.PWSX... Startdate: 08/12/2022 Architecture: WINDOWS Score: 92 45 Malicious sample detected (through community Yara rule) 2->45 47 Multi AV Scanner detection for submitted file 2->47 49 Yara detected UAC Bypass using CMSTP 2->49 51 4 other signatures 2->51 8 SecuriteInfo.com.Win64.PWSX-gen.5874.22719.exe 5 1 2->8         started        12 SecuriteInfo.com.Win64.PWSX-gen.5874.22719.exe 2 1 2->12         started        14 SecuriteInfo.com.Win64.PWSX-gen.5874.22719.exe 1 2->14         started        process3 file4 43 C:\Users\user\AppData\Local\Temp\?????.sys, PE32+ 8->43 dropped 53 Creates autostart registry keys with suspicious names 8->53 55 Sample is not signed and drops a device driver 8->55 16 cmd.exe 2 12->16         started        18 cmd.exe 2 14->18         started        signatures5 process6 process7 20 fodhelper.exe 12 16->20         started        22 conhost.exe 16->22         started        24 fodhelper.exe 16->24         started        26 fodhelper.exe 16->26         started        28 fodhelper.exe 12 18->28         started        30 conhost.exe 18->30         started        32 fodhelper.exe 18->32         started        34 fodhelper.exe 18->34         started        process8 36 SecuriteInfo.com.Win64.PWSX-gen.5874.22719.exe 20->36         started        39 SecuriteInfo.com.Win64.PWSX-gen.5874.22719.exe 28->39         started        file9 41 SecuriteInfo.com.W....5874.22719.exe.log, CSV 36->41 dropped
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2022-12-08 11:39:42 UTC
File Type:
PE+ (.Net Exe)
Extracted files:
12
AV detection:
20 of 26 (76.92%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:urde persistence rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: LoadsDriver
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Sets service image path in registry
Formbook payload
Formbook
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
630ea8ccea4f9f5667c356a897a037538288d57b4ca6464b3d90d17f3ba182d1
MD5 hash:
599f3da4fcceeff012fb72ed22ba20f1
SHA1 hash:
f93448764fccbf21b2f94711bf09310809298e43
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments