MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6d414885d7f75777705948ed9a7134421d7cc2eabb4c4591b913864e8642850a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 13


Intelligence 13 IOCs YARA 9 File information Comments

SHA256 hash: 6d414885d7f75777705948ed9a7134421d7cc2eabb4c4591b913864e8642850a
SHA3-384 hash: 5949e4ba311dc20687a7c95aaa3ca9334fbd80ef179d7882dc1a2b30ae50895eb0764ff8f932e5f94b6dcc8f22436836
SHA1 hash: ca07478bd504d2c690948e9c21771ec5ac4de018
MD5 hash: 09ac9eae3546e42f6bbcc605242133d0
humanhash: triple-bakerloo-jig-cold
File name:6d414885d7f75777705948ed9a7134421d7cc2eabb4c4591b913864e8642850a
Download: download sample
Signature Formbook
File size:1'330'396 bytes
First seen:2024-12-05 15:52:11 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 99ee65c2db82c04251a5c24f214c8892 (34 x Formbook, 11 x RemcosRAT, 4 x SnakeKeylogger)
ssdeep 24576:iN/BUBb+tYjBFHk+/qKEKhkiM70SrdO8jO2MHoXiM0hD6di/Aea:CpUlRhkIJm08OaEIXiM0hDTY
Threatray 5'263 similar samples on MalwareBazaar
TLSH T180551202BBC48473D17215325BB29715197D7D615FA18A8B63E038BEAB319C2D732FA3
TrID 76.0% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39)
16.5% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
3.0% (.EXE) Win64 Executable (generic) (10522/11/4)
1.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.2% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
File icon (PE):PE icon
dhash icon f0e0b2aaeaf2dcd4 (5 x Formbook)
Reporter adrian__luca
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
378
Origin country :
HU HU
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
6d414885d7f75777705948ed9a7134421d7cc2eabb4c4591b913864e8642850a.exe
Verdict:
Suspicious activity
Analysis date:
2024-12-05 16:45:56 UTC
Tags:
autoit

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
autoit emotet
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Enabling the 'hidden' option for files in the %temp% directory
Creating a process from a recently created file
Running batch commands
Creating a process with a hidden window
Launching a process
Sending a UDP request
Creating a file
Launching the default Windows debugger (dwwin.exe)
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
adaptive-context adaptive-context anti-vm evasive fingerprint installer keylogger microsoft_visual_cc overlay packed packed packed packer_detected sfx
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Allocates memory in foreign processes
Contains functionality to inject code into remote processes
Found API chain indicative of sandbox detection
Injects a PE file into a foreign processes
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses ipconfig to lookup or modify the Windows network settings
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected AntiVM autoit script
Yara detected Autoit Injector
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1569431 Sample: FX6KTgnipP.exe Startdate: 05/12/2024 Architecture: WINDOWS Score: 100 87 Multi AV Scanner detection for submitted file 2->87 89 Yara detected Autoit Injector 2->89 91 Yara detected FormBook 2->91 93 8 other signatures 2->93 12 FX6KTgnipP.exe 3 29 2->12         started        16 dmqiuorkt.mp2.exe 1 1 2->16         started        18 dmqiuorkt.mp2.exe 2->18         started        process3 file4 79 C:\Users\user\AppData\Local\...\dmqiuorkt.mp2, PE32 12->79 dropped 81 C:\Users\user\AppData\Local\Temp\...\isci.vbe, Unicode 12->81 dropped 115 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 12->115 20 wscript.exe 1 12->20         started        83 C:\Users\user\...\dmqiuorkt.mp2.exe.exe, PE32 16->83 dropped 117 Found API chain indicative of sandbox detection 16->117 119 Contains functionality to inject code into remote processes 16->119 121 Writes to foreign memory regions 16->121 23 RegSvcs.exe 16->23         started        25 RegSvcs.exe 16->25         started        123 Allocates memory in foreign processes 18->123 125 Injects a PE file into a foreign processes 18->125 27 RegSvcs.exe 18->27         started        29 RegSvcs.exe 18->29         started        signatures5 process6 signatures7 95 Windows Scripting host queries suspicious COM object (likely to drop second stage) 20->95 31 cmd.exe 1 20->31         started        33 cmd.exe 1 20->33         started        36 cmd.exe 1 20->36         started        process8 signatures9 38 dmqiuorkt.mp2 1 26 31->38         started        42 conhost.exe 31->42         started        85 Uses ipconfig to lookup or modify the Windows network settings 33->85 44 conhost.exe 33->44         started        46 ipconfig.exe 1 33->46         started        48 conhost.exe 36->48         started        50 ipconfig.exe 1 36->50         started        process10 file11 71 C:\Users\user\AppData\...\dmqiuorkt.mp2.exe, PE32 38->71 dropped 73 C:\Users\user\AppData\Local\...\dmqiuorkt.mp2, PE32 38->73 dropped 75 C:\Users\user\AppData\...\dmqiuorkt.mp2.exe, PE32 38->75 dropped 77 C:\Users\user\AppData\Local\...\tdggoffi.bin, Unicode 38->77 dropped 99 Found API chain indicative of sandbox detection 38->99 101 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 38->101 103 Writes to foreign memory regions 38->103 105 2 other signatures 38->105 52 RegSvcs.exe 38->52         started        55 RegSvcs.exe 38->55         started        signatures12 process13 signatures14 97 Maps a DLL or memory area into another process 52->97 57 dmqiuorkt.mp2.exe 52->57         started        process15 signatures16 107 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 57->107 109 Writes to foreign memory regions 57->109 111 Injects a PE file into a foreign processes 57->111 60 UserAccountControlSettings.exe 57->60         started        63 RegSvcs.exe 57->63         started        65 RegSvcs.exe 57->65         started        process17 signatures18 113 Maps a DLL or memory area into another process 60->113 67 explorer.exe 60->67 injected 69 WerFault.exe 63->69         started        process19
Threat name:
Win32.Trojan.Runner
Status:
Malicious
First seen:
2024-11-21 03:25:14 UTC
File Type:
PE (Exe)
Extracted files:
72
AV detection:
27 of 38 (71.05%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery persistence
Behaviour
Gathers network information
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Unpacked files
SH256 hash:
98e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b
MD5 hash:
0adb9b817f1df7807576c2d7068dd931
SHA1 hash:
4a1b94a9a5113106f40cd8ea724703734d15f118
Detections:
AutoIT_Compiled
Parent samples :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 hash:
6d414885d7f75777705948ed9a7134421d7cc2eabb4c4591b913864e8642850a
MD5 hash:
09ac9eae3546e42f6bbcc605242133d0
SHA1 hash:
ca07478bd504d2c690948e9c21771ec5ac4de018
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:pe_detect_tls_callbacks
Rule name:RansomPyShield_Antiransomware
Author:XiAnzheng
Description:Check for Suspicious String and Import combination that Ransomware mostly abuse(can create FP)
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SelfExtractingRAR
Author:Xavier Mertens
Description:Detects an SFX archive with automatic script execution
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
GDI_PLUS_APIInterfaces with Graphicsgdiplus.dll::GdiplusStartup
gdiplus.dll::GdiplusShutdown
gdiplus.dll::GdipAlloc
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::LoadLibraryExA
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetSystemInfo
KERNEL32.dll::GetStartupInfoW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::AllocConsole
KERNEL32.dll::AttachConsole
KERNEL32.dll::WriteConsoleW
KERNEL32.dll::FreeConsole
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleMode
KERNEL32.dll::GetConsoleCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateHardLinkW
KERNEL32.dll::CreateFileW
KERNEL32.dll::CreateFileMappingW
KERNEL32.dll::DeleteFileW
KERNEL32.dll::MoveFileW
KERNEL32.dll::MoveFileExW

Comments