MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 af555bcf9af4d6cc249e3b6b14d73d61175bf9be40a57ce025b7b791e1c0186f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: af555bcf9af4d6cc249e3b6b14d73d61175bf9be40a57ce025b7b791e1c0186f
SHA3-384 hash: fe70e52c24a18bf83da4f8cfbe76c99f673cb41e190ed8e2e0a44f72418d5a571c6ac90442037e877ad57518cda0161d
SHA1 hash: 9d496067eb72186aaaad1c79f01d826d0ef3b987
MD5 hash: c31e614f9fa5d413f48f7de3f6b336a7
humanhash: bravo-lake-king-twelve
File name:RFQ_Specification_PO-372842997-2021-06-16.exe
Download: download sample
Signature Formbook
File size:837'120 bytes
First seen:2022-02-16 15:09:27 UTC
Last seen:2022-02-16 20:56:57 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 3bbae5474fae9ab3c9cd00f1e2cffe97 (5 x Formbook, 1 x RemcosRAT, 1 x DBatLoader)
ssdeep 24576:KW6My6w7W6VCvGC/nRiTFYvv8W01KHy/:Khc57RMQH
TLSH T14B058E62B7909836C03A15788C1BDBF4A81E7E212D559C477BE72F4E6F392813C361A7
File icon (PE):PE icon
dhash icon f468cec4d4d4d4c4 (6 x Formbook, 1 x RemcosRAT, 1 x DBatLoader)
Reporter James_inthe_box
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
4
# of downloads :
198
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Creating a file
Running batch commands
Creating a process with a hidden window
Launching a process
Launching cmd.exe command interpreter
Launching the process to interact with network services
Using the Windows Management Instrumentation requests
Searching for synchronization primitives
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
control.exe greyware keylogger packed remcos
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Gathering data
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Drops PE files to the user root directory
Found malware configuration
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 573389 Sample: RFQ_Specification_PO-372842... Startdate: 16/02/2022 Architecture: WINDOWS Score: 100 54 Found malware configuration 2->54 56 Malicious sample detected (through community Yara rule) 2->56 58 Multi AV Scanner detection for submitted file 2->58 60 2 other signatures 2->60 9 RFQ_Specification_PO-372842997-2021-06-16.exe 1 21 2->9         started        process3 dnsIp4 48 sync-shop.com 74.220.219.225, 443, 49752, 49753 UNIFIEDLAYER-AS-1US United States 9->48 44 C:\Users\usercgbxgpy.exe, PE32 9->44 dropped 46 C:\Users\usercgbxgpy.exe:Zone.Identifier, ASCII 9->46 dropped 80 Drops PE files to the user root directory 9->80 82 Writes to foreign memory regions 9->82 84 Allocates memory in foreign processes 9->84 86 2 other signatures 9->86 14 logagent.exe 9->14         started        17 cmd.exe 1 9->17         started        file5 signatures6 process7 signatures8 88 Modifies the context of a thread in another process (thread injection) 14->88 90 Maps a DLL or memory area into another process 14->90 92 Tries to detect virtualization through RDTSC time measurements 14->92 94 Queues an APC in another process (thread injection) 14->94 19 explorer.exe 4 2 14->19 injected 21 cmd.exe 1 17->21         started        23 conhost.exe 17->23         started        process9 process10 25 Ecgbxgpy.exe 13 19->25         started        29 Ecgbxgpy.exe 14 19->29         started        31 WWAHost.exe 19->31         started        33 net.exe 1 21->33         started        35 conhost.exe 21->35         started        dnsIp11 50 sync-shop.com 25->50 68 Multi AV Scanner detection for dropped file 25->68 70 Writes to foreign memory regions 25->70 72 Allocates memory in foreign processes 25->72 37 logagent.exe 25->37         started        52 sync-shop.com 29->52 74 Creates a thread in another existing process (thread injection) 29->74 76 Injects a PE file into a foreign processes 29->76 40 logagent.exe 29->40         started        78 Tries to detect virtualization through RDTSC time measurements 31->78 42 net1.exe 1 33->42         started        signatures12 process13 signatures14 62 Modifies the context of a thread in another process (thread injection) 37->62 64 Maps a DLL or memory area into another process 37->64 66 Sample uses process hollowing technique 37->66
Threat name:
Win32.Spyware.Noon
Status:
Malicious
First seen:
2022-02-16 07:48:56 UTC
File Type:
PE (Exe)
Extracted files:
125
AV detection:
20 of 28 (71.43%)
Threat level:
  2/5
Result
Malware family:
xloader
Score:
  10/10
Tags:
family:xloader campaign:nqni loader persistence rat
Behaviour
Checks processor information in registry
Modifies data under HKEY_USERS
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Suspicious use of SetThreadContext
Adds Run key to start application
Xloader Payload
Xloader
Unpacked files
SH256 hash:
bc5eab9035807d258b611c670dbc460e72b99b22c65bc13dde5e3a2c4c8c9613
MD5 hash:
721f31a2cfa45743fbbe5d65d907a254
SHA1 hash:
dc17bf82ddd688e93af709465a171cc275dc6ba1
Detections:
win_dbatloader_w0
SH256 hash:
af555bcf9af4d6cc249e3b6b14d73d61175bf9be40a57ce025b7b791e1c0186f
MD5 hash:
c31e614f9fa5d413f48f7de3f6b336a7
SHA1 hash:
9d496067eb72186aaaad1c79f01d826d0ef3b987
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments