MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6c13b65c7ffaef21388c60cc2be3370b35a729eb9e8986ce1abd3303e144896f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 17


Intelligence 17 IOCs YARA 7 File information Comments

SHA256 hash: 6c13b65c7ffaef21388c60cc2be3370b35a729eb9e8986ce1abd3303e144896f
SHA3-384 hash: ac4093036b94c09cd35d60df45c52f816a979872c3236980cfd8a646c5d8617c5092692c622f51086ce027965d61cb18
SHA1 hash: 2e78d6968f547a5d70e5795ce89cbd51a06a90fa
MD5 hash: 5097fe796d4bca99a3d79998c27116cd
humanhash: thirteen-vermont-avocado-steak
File name:6c13b65c7ffaef21388c60cc2be3370b35a729eb9e8986ce1abd3303e144896f
Download: download sample
Signature Formbook
File size:1'052'450 bytes
First seen:2024-11-05 14:52:16 UTC
Last seen:2024-11-07 14:18:23 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 99ee65c2db82c04251a5c24f214c8892 (34 x Formbook, 11 x RemcosRAT, 4 x SnakeKeylogger)
ssdeep 24576:hN/BUBb+tYjBFHNhz6FI9Dh7WinTX1zJ54D+q0lPBzkFy:jpUlRhPzna4X1zJ5w+JPBAy
Threatray 2'214 similar samples on MalwareBazaar
TLSH T1A9251202B7C584B2D57229321BB597A0163CB5306F62C9DF53E069AD9F709C2D632FA3
TrID 76.0% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39)
16.5% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
3.0% (.EXE) Win64 Executable (generic) (10522/11/4)
1.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.2% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
File icon (PE):PE icon
dhash icon 4d0d1d591f1f1179 (2 x Formbook)
Reporter adrian__luca
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
3
# of downloads :
387
Origin country :
HU HU
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
6c13b65c7ffaef21388c60cc2be3370b35a729eb9e8986ce1abd3303e144896f
Verdict:
Malicious activity
Analysis date:
2024-11-05 14:54:29 UTC
Tags:
formbook stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
97.4%
Tags:
powershell autoit emotet
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Enabling the 'hidden' option for files in the %temp% directory
Creating a process from a recently created file
Running batch commands
Creating a process with a hidden window
Launching a process
Sending a UDP request
Creating a file
Enabling the 'hidden' option for recently created files
Launching cmd.exe command interpreter
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm evasive fingerprint installer keylogger microsoft_visual_cc overlay packed packed packer_detected rijndael sfx
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Double Extension Files
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to resolve many domain names, but no domain seems valid
Uses ipconfig to lookup or modify the Windows network settings
Uses netstat to query active network connections and open ports
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected AntiVM autoit script
Yara detected Autoit Injector
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1549395 Sample: mJIvCBk5vF.exe Startdate: 05/11/2024 Architecture: WINDOWS Score: 100 93 www.ybokiesite.online 2->93 95 www.xs5.buzz 2->95 97 8 other IPs or domains 2->97 101 Found malware configuration 2->101 103 Malicious sample detected (through community Yara rule) 2->103 105 Multi AV Scanner detection for submitted file 2->105 107 13 other signatures 2->107 14 mJIvCBk5vF.exe 3 29 2->14         started        signatures3 process4 file5 87 C:\Users\user\AppData\Local\...\gbkusncub.ppt, PE32 14->87 dropped 89 C:\Users\user\AppData\Local\Temp\...\rwwk.vbe, Unicode 14->89 dropped 91 C:\Users\user\AppData\Local\...\hcmdvu.msc, data 14->91 dropped 153 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 14->153 18 wscript.exe 1 14->18         started        signatures6 process7 signatures8 99 Windows Scripting host queries suspicious COM object (likely to drop second stage) 18->99 21 cmd.exe 1 18->21         started        23 cmd.exe 1 18->23         started        26 cmd.exe 1 18->26         started        process9 signatures10 28 gbkusncub.ppt 1 27 21->28         started        32 conhost.exe 21->32         started        125 Uses ipconfig to lookup or modify the Windows network settings 23->125 34 conhost.exe 23->34         started        36 ipconfig.exe 1 23->36         started        38 conhost.exe 26->38         started        40 ipconfig.exe 1 26->40         started        process11 file12 79 C:\Users\user\llkd\gbkusncub.ppt.exe, PE32 28->79 dropped 81 C:\Users\user\AppData\...\gbkusncub.ppt.exe, PE32 28->81 dropped 83 C:\Users\user\llkd\hcmdvu.msc, data 28->83 dropped 85 2 other files (none is malicious) 28->85 dropped 145 Contains functionality to inject code into remote processes 28->145 147 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 28->147 149 Writes to foreign memory regions 28->149 151 2 other signatures 28->151 42 RegSvcs.exe 28->42         started        45 RegSvcs.exe 28->45         started        signatures13 process14 signatures15 127 Modifies the context of a thread in another process (thread injection) 42->127 129 Maps a DLL or memory area into another process 42->129 131 Sample uses process hollowing technique 42->131 135 2 other signatures 42->135 47 explorer.exe 72 2 42->47 injected 133 Tries to detect virtualization through RDTSC time measurements 45->133 process16 signatures17 155 Uses netstat to query active network connections and open ports 47->155 50 gbkusncub.ppt.exe 2 47->50         started        54 gbkusncub.ppt.exe 47->54         started        56 gbkusncub.ppt.exe 47->56         started        58 5 other processes 47->58 process18 file19 77 C:\Users\user\llkd\gbkusncub.ppt.exe.exe, PE32 50->77 dropped 109 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 50->109 111 Writes to foreign memory regions 50->111 113 Allocates memory in foreign processes 50->113 60 RegSvcs.exe 50->60         started        63 RegSvcs.exe 50->63         started        115 Injects a PE file into a foreign processes 54->115 65 RegSvcs.exe 54->65         started        67 RegSvcs.exe 54->67         started        69 RegSvcs.exe 56->69         started        71 RegSvcs.exe 56->71         started        117 Modifies the context of a thread in another process (thread injection) 58->117 119 Maps a DLL or memory area into another process 58->119 121 Tries to detect virtualization through RDTSC time measurements 58->121 123 Switches to a custom stack to bypass stack traces 58->123 73 cmd.exe 1 58->73         started        signatures20 process21 signatures22 137 Modifies the context of a thread in another process (thread injection) 60->137 139 Maps a DLL or memory area into another process 60->139 141 Sample uses process hollowing technique 60->141 143 Found direct / indirect Syscall (likely to bypass EDR) 63->143 75 conhost.exe 73->75         started        process23
Threat name:
Win32.Trojan.Generic
Status:
Malicious
First seen:
2024-10-08 05:50:09 UTC
File Type:
PE (Exe)
Extracted files:
55
AV detection:
22 of 38 (57.89%)
Threat level:
  2/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:o52o discovery persistence rat spyware stealer trojan
Behaviour
Gathers network information
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Formbook payload
Formbook
Formbook family
Unpacked files
SH256 hash:
98e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b
MD5 hash:
0adb9b817f1df7807576c2d7068dd931
SHA1 hash:
4a1b94a9a5113106f40cd8ea724703734d15f118
Detections:
AutoIT_Compiled
Parent samples :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 hash:
6c13b65c7ffaef21388c60cc2be3370b35a729eb9e8986ce1abd3303e144896f
MD5 hash:
5097fe796d4bca99a3d79998c27116cd
SHA1 hash:
2e78d6968f547a5d70e5795ce89cbd51a06a90fa
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:pe_detect_tls_callbacks
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SelfExtractingRAR
Author:Xavier Mertens
Description:Detects an SFX archive with automatic script execution
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
GDI_PLUS_APIInterfaces with Graphicsgdiplus.dll::GdiplusStartup
gdiplus.dll::GdiplusShutdown
gdiplus.dll::GdipAlloc
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::LoadLibraryExA
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetSystemInfo
KERNEL32.dll::GetStartupInfoW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::AllocConsole
KERNEL32.dll::AttachConsole
KERNEL32.dll::WriteConsoleW
KERNEL32.dll::FreeConsole
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleMode
KERNEL32.dll::GetConsoleCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateHardLinkW
KERNEL32.dll::CreateFileW
KERNEL32.dll::CreateFileMappingW
KERNEL32.dll::DeleteFileW
KERNEL32.dll::MoveFileW
KERNEL32.dll::MoveFileExW

Comments