MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 77dc20ac123646040725522265e3144772f5bfc77b8aa7896fa33e6c601ff498. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 14


Intelligence 14 IOCs YARA 2 File information Comments

SHA256 hash: 77dc20ac123646040725522265e3144772f5bfc77b8aa7896fa33e6c601ff498
SHA3-384 hash: 9d5363ac3883eb13c382d959f44d87e252dacf8aa7585700da1e881845ce638f06f0d7d6bee72ac7656fea5a1182f314
SHA1 hash: 0705497325e8ed2e83792ac2c08b0ee7cbeecd72
MD5 hash: 4f3ef54cc2a4028e954eb275760a8203
humanhash: failed-may-cardinal-mississippi
File name:nuevo_pedido.docx.exe
Download: download sample
Signature Formbook
File size:1'075'712 bytes
First seen:2022-12-01 13:23:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'750 x AgentTesla, 19'653 x Formbook, 12'248 x SnakeKeylogger)
ssdeep 24576:wlOqaEByj4HVHONLZkjwf5uwGPnTiwAAgEEY4:w4kHclZMwBZ2TQp
TLSH T148357C65A770E44EF823C8BEA6DC5E505C6410D246A98906CC133D945E3CCABF9FC9FA
TrID 60.4% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.8% (.SCR) Windows screen saver (13097/50/3)
8.7% (.EXE) Win64 Executable (generic) (10523/12/4)
5.4% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
Reporter Anonymous
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
176
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
nuevo_pedido.docx.exe
Verdict:
Malicious activity
Analysis date:
2022-12-01 13:24:08 UTC
Tags:
formbook xloader trojan stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
DNS request
Launching a process
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Deletes itself after installation
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses an obfuscated file name to hide its real file extension (double extension)
Uses netsh to modify the Windows network and firewall settings
Yara detected AntiVM3
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 758111 Sample: nuevo_pedido.docx.exe Startdate: 01/12/2022 Architecture: WINDOWS Score: 100 31 www.writer2point0.com 2->31 37 Multi AV Scanner detection for domain / URL 2->37 39 Malicious sample detected (through community Yara rule) 2->39 41 Antivirus detection for URL or domain 2->41 43 8 other signatures 2->43 9 nuevo_pedido.docx.exe 3 2->9         started        signatures3 process4 file5 23 C:\Users\user\...\nuevo_pedido.docx.exe.log, ASCII 9->23 dropped 53 Detected unpacking (changes PE section rights) 9->53 55 Detected unpacking (overwrites its own PE header) 9->55 13 nuevo_pedido.docx.exe 9->13         started        signatures6 process7 signatures8 57 Modifies the context of a thread in another process (thread injection) 13->57 59 Maps a DLL or memory area into another process 13->59 61 Sample uses process hollowing technique 13->61 63 Queues an APC in another process (thread injection) 13->63 16 explorer.exe 13->16 injected process9 dnsIp10 25 maestrotaitacabalcom.com 162.241.61.244, 49721, 49722, 80 UNIFIEDLAYER-AS-1US United States 16->25 27 www.dakaliuxue.com 103.204.108.38, 49720, 80 HENGTONG-IDC-LLCUS Hong Kong 16->27 29 www.maestrotaitacabalcom.com 16->29 33 System process connects to network (likely due to code injection or exploit) 16->33 35 Uses netsh to modify the Windows network and firewall settings 16->35 20 netsh.exe 13 16->20         started        signatures11 process12 signatures13 45 Tries to steal Mail credentials (via file / registry access) 20->45 47 Tries to harvest and steal browser information (history, passwords, etc) 20->47 49 Deletes itself after installation 20->49 51 2 other signatures 20->51
Threat name:
Win32.Trojan.Leonem
Status:
Malicious
First seen:
2022-12-01 07:28:36 UTC
File Type:
PE (.Net Exe)
Extracted files:
12
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:qwlo rat spyware stealer trojan
Behaviour
Gathers network information
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Checks computer location settings
Loads dropped DLL
Formbook
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
d2fa226b94eae728be7688a352a09181a2ecc49f9bee86cbb9157908a2ecd9b1
MD5 hash:
afde1c449997a88aef0f6439d3b16173
SHA1 hash:
0d7a20f4200eef35ef629d85f07566875119c13d
Detections:
XLoader win_formbook_auto win_formbook_g0
SH256 hash:
ef00f7c3905fe902de5a9f62f9de97216f7d6f810c4cc1003df7870fa4451c42
MD5 hash:
7203b0088eda14fa8de452c77ac72352
SHA1 hash:
6ed53d0231dd0511cb4d46b0245e0654e23f4cbf
SH256 hash:
3624268b1bf67fd3f560f345e5171f3a2f8968a776c23816ea76fc0ef41b0f03
MD5 hash:
1619753b625e58c25b73fbf1f0bff482
SHA1 hash:
c0d7922bdbc10ef0ee1606a40c2dedd22cb180d4
SH256 hash:
4ffcdc477381ad50230642d918a2b008ebf079eae72568093841b20d891455d9
MD5 hash:
0c7976c6c5c35e57ea8c69dfbb21b9a5
SHA1 hash:
a41db6ce989df5f48527d427ce3adf8d2211f46f
SH256 hash:
db051debda772c30c491fb6b66de05e04fd07f0f2f58df82202a4c1d5eb37976
MD5 hash:
f263d9d016ef3907c2c21c2dcb31f8db
SHA1 hash:
9cd7d924ac45fe4a6a774442c79cb6fdce25ffd5
SH256 hash:
ddb4b9708827cb344d5c08c6b07571d0d6a38fd4b594bcbdb73fa4e0104b274d
MD5 hash:
4709d80b2fe48a1401137beae6f231c7
SHA1 hash:
53856da064431f669e254da51bf4a3e7db634120
SH256 hash:
77dc20ac123646040725522265e3144772f5bfc77b8aa7896fa33e6c601ff498
MD5 hash:
4f3ef54cc2a4028e954eb275760a8203
SHA1 hash:
0705497325e8ed2e83792ac2c08b0ee7cbeecd72
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments