MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7f6242e9dcb1ce45c70b22d3c87b36b04fbc0b65d7f7ec07b008693d8763b66b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 11


Intelligence 11 IOCs YARA 6 File information Comments

SHA256 hash: 7f6242e9dcb1ce45c70b22d3c87b36b04fbc0b65d7f7ec07b008693d8763b66b
SHA3-384 hash: f336f0e44933ac7bc27b2b8e94830816d7b75b1f4688ac27b2ba46d4c00c8370efd38fdb027c12c0926fe47d33bdf8fc
SHA1 hash: b2d154e767b2d7986fc9a48b179f7b7c3cab85d1
MD5 hash: 77582e81081ce2f61021a53f0529a5d0
humanhash: friend-arizona-green-stream
File name:soa-jun22.exe
Download: download sample
Signature Formbook
File size:1'039'872 bytes
First seen:2022-06-17 06:41:21 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 24576:QrDbZ83pqp5lT5qBtKaH0MW/IbxQYC7H5Ju2:QrDt5bqKaUM9mx7H5Ju
TLSH T1B025078D7F54A98EDC95C63549BFFA33F541AEB4700A8307D6803FE6327A0986E41672
TrID 72.5% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.4% (.EXE) Win64 Executable (generic) (10523/12/4)
6.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.4% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon 31b0d89692d87031 (6 x AgentTesla, 4 x Formbook, 1 x RedLineStealer)
Reporter cocaman
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
260
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Launching a process
Sending an HTTP GET request
Sending a custom TCP request
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 647430 Sample: soa-jun22.exe Startdate: 17/06/2022 Architecture: WINDOWS Score: 100 97 Multi AV Scanner detection for domain / URL 2->97 99 Malicious sample detected (through community Yara rule) 2->99 101 Antivirus detection for URL or domain 2->101 103 7 other signatures 2->103 10 soa-jun22.exe 1 5 2->10         started        process3 file4 73 C:\Users\user\AppData\Roaming\...\Vnphqa.exe, PE32 10->73 dropped 75 C:\Users\user\...\Vnphqa.exe:Zone.Identifier, ASCII 10->75 dropped 77 C:\Users\user\AppData\...\soa-jun22.exe.log, ASCII 10->77 dropped 113 Writes to foreign memory regions 10->113 115 Injects a PE file into a foreign processes 10->115 14 InstallUtil.exe 10->14         started        17 InstallUtil.exe 10->17         started        19 cmd.exe 1 10->19         started        21 powershell.exe 15 10->21         started        signatures5 process6 signatures7 117 Modifies the context of a thread in another process (thread injection) 14->117 119 Maps a DLL or memory area into another process 14->119 121 Sample uses process hollowing technique 14->121 123 Queues an APC in another process (thread injection) 14->123 23 explorer.exe 14->23 injected 125 Tries to detect virtualization through RDTSC time measurements 17->125 27 conhost.exe 19->27         started        29 timeout.exe 1 19->29         started        31 conhost.exe 21->31         started        process8 dnsIp9 79 digitalsurf.community 160.153.136.3, 80 GODADDY-AMSDE United States 23->79 81 www.digitalsurf.community 23->81 105 System process connects to network (likely due to code injection or exploit) 23->105 33 Vnphqa.exe 2 23->33         started        36 systray.exe 23->36         started        38 Vnphqa.exe 1 23->38         started        40 rundll32.exe 23->40         started        signatures10 process11 signatures12 83 Multi AV Scanner detection for dropped file 33->83 85 Machine Learning detection for dropped file 33->85 87 Writes to foreign memory regions 33->87 42 InstallUtil.exe 33->42         started        45 cmd.exe 33->45         started        47 powershell.exe 14 33->47         started        49 InstallUtil.exe 33->49         started        89 Modifies the context of a thread in another process (thread injection) 36->89 91 Maps a DLL or memory area into another process 36->91 93 Tries to detect virtualization through RDTSC time measurements 36->93 51 cmd.exe 36->51         started        95 Injects a PE file into a foreign processes 38->95 53 cmd.exe 38->53         started        55 powershell.exe 38->55         started        57 InstallUtil.exe 38->57         started        process13 signatures14 107 Modifies the context of a thread in another process (thread injection) 42->107 109 Maps a DLL or memory area into another process 42->109 111 Sample uses process hollowing technique 42->111 59 conhost.exe 45->59         started        61 timeout.exe 45->61         started        63 conhost.exe 47->63         started        65 conhost.exe 51->65         started        67 conhost.exe 53->67         started        69 timeout.exe 53->69         started        71 conhost.exe 55->71         started        process15
Threat name:
ByteCode-MSIL.Spyware.Noon
Status:
Malicious
First seen:
2022-06-16 12:58:46 UTC
File Type:
PE (.Net Exe)
Extracted files:
20
AV detection:
21 of 26 (80.77%)
Threat level:
  2/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:fs44 persistence rat spyware stealer suricata trojan
Behaviour
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Checks computer location settings
Formbook Payload
Formbook
suricata: ET MALWARE FormBook CnC Checkin (GET)
Unpacked files
SH256 hash:
86dacf814ca96d5ef463f338ce46749cc31a5213b02940289ddbd00da63c5919
MD5 hash:
13afebe5c0a112e3442a7d7f4eb64220
SHA1 hash:
08d59e7c3f28182f7283884e0ab00e15c2bb6d5c
Detections:
win_formbook_g0 win_formbook_auto
SH256 hash:
9f01d9f2ed07e630ec078efa5d760762c3c8ad3b06e9e8a9062a37d63d57b026
MD5 hash:
9fbb8cec55b2115c00c0ba386c37ce62
SHA1 hash:
e2378a1c22c35e40fd1c3e19066de4e33b50f24a
SH256 hash:
4682bc6479a2778163e8b1f6346ee8d5605d3f19dd5efeda3671f4d389ca0c75
MD5 hash:
b2f807249a7997e82439d3ddf7ba1ed8
SHA1 hash:
579707cc80ec8d65d4a01c25a2250da882fe4e0d
SH256 hash:
7f6242e9dcb1ce45c70b22d3c87b36b04fbc0b65d7f7ec07b008693d8763b66b
MD5 hash:
77582e81081ce2f61021a53f0529a5d0
SHA1 hash:
b2d154e767b2d7986fc9a48b179f7b7c3cab85d1
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:exploit_any_poppopret
Author:Jeff White [karttoon@gmail.com] @noottrak
Description:Identify POP -> POP -> RET opcodes for quick ROP Gadget creation in target binaries.
Rule name:INDICATOR_EXE_Packed_SmartAssembly
Author:ditekSHen
Description:Detects executables packed with SmartAssembly
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Typical_Malware_String_Transforms
Author:Florian Roth
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research
Rule name:Typical_Malware_String_Transforms_RID3473
Author:Florian Roth
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe 7f6242e9dcb1ce45c70b22d3c87b36b04fbc0b65d7f7ec07b008693d8763b66b

(this sample)

Comments