MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6ad7f99fc894da684e1ca13e427c11d5f3656e4687cf1c9a9748196463913826. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 15


Intelligence 15 IOCs YARA File information Comments

SHA256 hash: 6ad7f99fc894da684e1ca13e427c11d5f3656e4687cf1c9a9748196463913826
SHA3-384 hash: 902e42d44d3e6c016f841d1e36be5d1cfaf03c49b2e157e29b777b60ac8962fd43dff20c39d0faf3a67a4609c28c723b
SHA1 hash: cceb49c7976c6e2809a2fa5ca686a44d0be9da2f
MD5 hash: 4ba27d867353ac0c936a9079bc92ddb4
humanhash: double-earth-kentucky-foxtrot
File name:UPS SHIPMENT CONFIRMATION.exe
Download: download sample
Signature Formbook
File size:1'156'096 bytes
First seen:2022-03-17 12:08:40 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 066f2adf6884c84166ea572f3442e2f3 (8 x Formbook, 2 x RemcosRAT)
ssdeep 12288:RbojJKNbgMwT2NRAvS/yqenMbJjRsBp8oziAO8Iz2sVW3MFqI6F3HAhcAszeVQ18:elKiCRAvS6qOMZGBNgzvqTHAhU2
TLSH T1DD355BF2E2508832D02236784D5F5EB9B42A7D01EDE5A546BAE03F0D3F3D5B1EC21A56
File icon (PE):PE icon
dhash icon 342c6c9c97cc6492 (11 x Formbook, 9 x RemcosRAT, 1 x AveMariaRAT)
Reporter lowmal3
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
208
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
UPS SHIPMENT CONFIRMATION.exe
Verdict:
Malicious activity
Analysis date:
2022-03-18 01:58:16 UTC
Tags:
installer trojan formbook stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Creating a file
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Launching the process to interact with network services
Launching a process
Creating a file in the %AppData% subdirectories
Reading critical registry keys
Creating a file in the %temp% directory
Searching for synchronization primitives
Using the Windows Management Instrumentation requests
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckScreenResolution
CheckCmdLine
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug anti-vm control.exe keylogger replace.exe
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook DBatLoader
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Detected FormBook malware
Drops PE files to the user root directory
Found malware configuration
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Application Executed Non-Executable Extension
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Sigma detected: Execution from Suspicious Folder
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Suspicious Program Location with Network Connections
Sigma detected: Suspicious Rundll32 Without Any CommandLine Params
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected DBatLoader
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 591143 Sample: UPS SHIPMENT CONFIRMATION.exe Startdate: 17/03/2022 Architecture: WINDOWS Score: 100 75 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->75 77 Found malware configuration 2->77 79 Malicious sample detected (through community Yara rule) 2->79 81 13 other signatures 2->81 10 UPS SHIPMENT CONFIRMATION.exe 1 21 2->10         started        process3 dnsIp4 73 mexicogroups.com 198.38.82.90, 443, 49768, 49769 SERVERCENTRALUS United States 10->73 53 C:\Users\Public\Opwlngk.exe, PE32 10->53 dropped 55 C:\Users\Public\kgnlwpO.url, MS 10->55 dropped 57 C:\Users\Public\Opwlngk.exe:Zone.Identifier, ASCII 10->57 dropped 99 Writes to foreign memory regions 10->99 101 Creates a thread in another existing process (thread injection) 10->101 103 Injects a PE file into a foreign processes 10->103 15 logagent.exe 10->15         started        18 cmd.exe 1 10->18         started        file5 signatures6 process7 signatures8 119 Modifies the context of a thread in another process (thread injection) 15->119 121 Maps a DLL or memory area into another process 15->121 123 Sample uses process hollowing technique 15->123 125 2 other signatures 15->125 20 explorer.exe 2 15->20 injected 24 cmd.exe 1 18->24         started        26 conhost.exe 18->26         started        process9 dnsIp10 67 parkingpage.namecheap.com 198.54.117.210, 49839, 49841, 49842 NAMECHEAP-NETUS United States 20->67 69 therecruiterssolution.com 34.102.136.180, 49869, 49870, 49871 GOOGLEUS United States 20->69 71 5 other IPs or domains 20->71 85 System process connects to network (likely due to code injection or exploit) 20->85 87 Performs DNS queries to domains with low reputation 20->87 28 rundll32.exe 18 20->28         started        32 Opwlngk.exe 14 20->32         started        35 Opwlngk.exe 13 20->35         started        39 2 other processes 20->39 37 conhost.exe 24->37         started        signatures11 process12 dnsIp13 59 C:\Users\user\AppData\...\12Nlogrv.ini, data 28->59 dropped 61 C:\Users\user\AppData\...\12Nlogri.ini, data 28->61 dropped 105 Detected FormBook malware 28->105 107 Tries to steal Mail credentials (via file / registry access) 28->107 109 Tries to harvest and steal browser information (history, passwords, etc) 28->109 117 3 other signatures 28->117 41 cmd.exe 2 28->41         started        63 mexicogroups.com 32->63 111 Writes to foreign memory regions 32->111 113 Creates a thread in another existing process (thread injection) 32->113 115 Injects a PE file into a foreign processes 32->115 44 DpiScaling.exe 32->44         started        65 mexicogroups.com 35->65 46 DpiScaling.exe 35->46         started        file14 signatures15 process16 signatures17 89 Tries to harvest and steal browser information (history, passwords, etc) 41->89 48 conhost.exe 41->48         started        91 Modifies the context of a thread in another process (thread injection) 44->91 93 Maps a DLL or memory area into another process 44->93 95 Sample uses process hollowing technique 44->95 50 cmstp.exe 44->50         started        97 Tries to detect virtualization through RDTSC time measurements 46->97 process18 signatures19 83 Tries to detect virtualization through RDTSC time measurements 50->83
Threat name:
Win32.Trojan.SpyNoon
Status:
Malicious
First seen:
2022-03-17 20:56:18 UTC
File Type:
PE (Exe)
Extracted files:
43
AV detection:
20 of 27 (74.07%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:uc04 persistence rat spyware stealer trojan
Behaviour
Modifies Internet Explorer settings
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Reads user/profile data of web browsers
Formbook Payload
Formbook
Unpacked files
SH256 hash:
6ad7f99fc894da684e1ca13e427c11d5f3656e4687cf1c9a9748196463913826
MD5 hash:
4ba27d867353ac0c936a9079bc92ddb4
SHA1 hash:
cceb49c7976c6e2809a2fa5ca686a44d0be9da2f
Malware family:
FormBook
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe 6ad7f99fc894da684e1ca13e427c11d5f3656e4687cf1c9a9748196463913826

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments