MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9504b7d70560189218da2f73a816ed686e6f52373dd025a79ddbc1a0e74cf33c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 14


Intelligence 14 IOCs YARA 6 File information Comments

SHA256 hash: 9504b7d70560189218da2f73a816ed686e6f52373dd025a79ddbc1a0e74cf33c
SHA3-384 hash: 4f1fffb3979018ddde0441dc4ad435867af8e65b6d52b3631d2e58b5b0a9d7c302e332adbd5b2281584d193145c9791f
SHA1 hash: b641dab0d919f1cd480100098e7f45301ceced90
MD5 hash: 26269d2bc67df72d0e25d9d65e26d404
humanhash: california-orange-asparagus-fifteen
File name:waybill Number HY740558851FR.exe
Download: download sample
Signature Formbook
File size:1'496'576 bytes
First seen:2022-04-19 00:53:33 UTC
Last seen:2022-04-20 10:21:45 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'657 x AgentTesla, 19'468 x Formbook, 12'206 x SnakeKeylogger)
ssdeep 24576:/EmgGBOqS+adEnLg7Bf6kIXpgoFtEwQVIr89T:/vgGJ2MglCgQtE3Iw5
TLSH T132654B09760B8E99F9508330FAB3EB1457A4C6B6C911B383E3A5363DD51F3BD0AA1716
TrID 72.5% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.4% (.EXE) Win64 Executable (generic) (10523/12/4)
6.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.4% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon b28b87cba3b2f8f4 (4 x AsyncRAT, 1 x Formbook, 1 x XWorm)
Reporter GovCERT_CH
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
2
# of downloads :
286
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Creating a file
Unauthorized injection to a recently created process
Searching for synchronization primitives
Sending a custom TCP request
Launching cmd.exe command interpreter
Сreating synchronization primitives
Setting browser functions hooks
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Forced shutdown of a system process
Unauthorized injection to a system process
Unauthorized injection to a browser process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
control.exe obfuscated packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found malware configuration
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 611008 Sample: waybill Number HY740558851FR.exe Startdate: 19/04/2022 Architecture: WINDOWS Score: 100 54 Multi AV Scanner detection for domain / URL 2->54 56 Found malware configuration 2->56 58 Malicious sample detected (through community Yara rule) 2->58 60 9 other signatures 2->60 10 waybill Number HY740558851FR.exe 1 5 2->10         started        process3 file4 40 C:\Users\user\AppData\Local\optional.exe, PE32 10->40 dropped 42 C:\Users\...\optional.exe:Zone.Identifier, ASCII 10->42 dropped 44 C:\...\waybill Number HY740558851FR.exe.log, ASCII 10->44 dropped 13 waybill Number HY740558851FR.exe 10->13         started        process5 signatures6 74 Modifies the context of a thread in another process (thread injection) 13->74 76 Maps a DLL or memory area into another process 13->76 78 Sample uses process hollowing technique 13->78 80 Queues an APC in another process (thread injection) 13->80 16 explorer.exe 3 13->16 injected 20 systray.exe 13->20         started        process7 dnsIp8 46 kshidara.com 133.167.8.160, 49813, 80 SAKURA-CSAKURAInternetIncJP Japan 16->46 48 www.kshidara.com 16->48 50 System process connects to network (likely due to code injection or exploit) 16->50 22 optional.exe 3 16->22         started        25 wlanext.exe 16->25         started        27 optional.exe 2 16->27         started        29 2 other processes 16->29 52 Tries to detect virtualization through RDTSC time measurements 20->52 signatures9 process10 signatures11 62 Antivirus detection for dropped file 22->62 64 Multi AV Scanner detection for dropped file 22->64 66 Machine Learning detection for dropped file 22->66 31 optional.exe 22->31         started        68 Modifies the context of a thread in another process (thread injection) 25->68 70 Maps a DLL or memory area into another process 25->70 72 Tries to detect virtualization through RDTSC time measurements 25->72 34 cmd.exe 1 25->34         started        36 optional.exe 27->36         started        process12 signatures13 82 Modifies the context of a thread in another process (thread injection) 31->82 84 Maps a DLL or memory area into another process 31->84 86 Sample uses process hollowing technique 31->86 38 conhost.exe 34->38         started        process14
Threat name:
ByteCode-MSIL.Spyware.Noon
Status:
Malicious
First seen:
2022-04-18 23:46:34 UTC
AV detection:
20 of 26 (76.92%)
Threat level:
  2/5
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:w83h persistence rat spyware stealer suricata trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Deletes itself
Formbook Payload
Formbook
suricata: ET MALWARE FormBook CnC Checkin (GET)
Unpacked files
SH256 hash:
e0847b7527a1968777ea353b71661fafbfea170fb46832820d93238a753ddc19
MD5 hash:
8e15a4c67f082dd832b1d4c86957c0d4
SHA1 hash:
cc960c84a3ce3919af01126489327f0ee6b1c03f
Detections:
win_formbook_g0
SH256 hash:
790fc20e174dce46334c90fe4ed8805dd7b7fe31981848c98f7b29a35c5a6743
MD5 hash:
c15288560cc40c5703a145418cbe6f97
SHA1 hash:
2e7ea8d3b1435c32bde2dc847c1ab0baf256cfba
SH256 hash:
9504b7d70560189218da2f73a816ed686e6f52373dd025a79ddbc1a0e74cf33c
MD5 hash:
26269d2bc67df72d0e25d9d65e26d404
SHA1 hash:
b641dab0d919f1cd480100098e7f45301ceced90
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:malware_Formbook_strings
Author:JPCERT/CC Incident Response Group
Description:detect Formbook in memory
Reference:internal research
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Typical_Malware_String_Transforms
Author:Florian Roth
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research
Rule name:Typical_Malware_String_Transforms_RID3473
Author:Florian Roth
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research
Rule name:win_formbook_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.formbook.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe 9504b7d70560189218da2f73a816ed686e6f52373dd025a79ddbc1a0e74cf33c

(this sample)

  
Dropped by
formbook
  
Delivery method
Distributed via e-mail attachment

Comments