MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b83152fc7fc7aa9950add1de9c3d12e107e3b6eb481c1a368018ed26d3792cdc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 12


Intelligence 12 IOCs YARA 2 File information Comments

SHA256 hash: b83152fc7fc7aa9950add1de9c3d12e107e3b6eb481c1a368018ed26d3792cdc
SHA3-384 hash: 0ef7dd5a0bbbcbcd2ea6c5c94445cfe0efda6b3da33a2d7a57b6b2b97019d7c604dc6bd7aea14b163e64b291b42bbb01
SHA1 hash: 8f3b4eb58153f5b4e0f18242d1d440326c1abe09
MD5 hash: 1c2de2d34e6b111a8d34a1628a38e86c
humanhash: paris-nuts-september-arkansas
File name:Ipahtnlwocyaqoffrglyqcoirkzejlxvhh.exe
Download: download sample
Signature Formbook
File size:937'472 bytes
First seen:2022-01-24 16:44:09 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 518c8881434b4a4799e1be06dcc95f2c (1 x Formbook, 1 x DBatLoader)
ssdeep 24576:y0ifLhN+8KXXPLrmSGS/Jj+Usd5DCQ3tKT7vdGe:y0F/XqDCetg
TLSH T13B158D22E2914833D53316384C5BA7F9582ABE112E1CB99B3AF43D4C5F39641743AFA7
File icon (PE):PE icon
dhash icon b2b0f1ecccce9e98 (2 x Formbook, 1 x DBatLoader, 1 x AveMariaRAT)
Reporter James_inthe_box
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
231
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Creating a file
Launching a process
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Creating a process from a recently created file
Searching for the window
Searching for synchronization primitives
Using the Windows Management Instrumentation requests
Reading critical registry keys
Launching the default Windows debugger (dwwin.exe)
Setting browser functions hooks
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Unauthorized injection to a browser process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
control.exe fareit keylogger packed remote.exe replace.exe
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
DLL side loading technique detected
Found malware configuration
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 558975 Sample: Ipahtnlwocyaqoffrglyqcoirkz... Startdate: 24/01/2022 Architecture: WINDOWS Score: 100 76 Found malware configuration 2->76 78 Malicious sample detected (through community Yara rule) 2->78 80 Antivirus detection for dropped file 2->80 82 6 other signatures 2->82 10 Ipahtnlwocyaqoffrglyqcoirkzejlxvhh.exe 1 23 2->10         started        process3 dnsIp4 58 trh5wq.am.files.1drv.com 10->58 60 onedrive.live.com 10->60 62 am-files.fe.1drv.com 10->62 50 C:\Users\user\Contacts\propsys.dll, PE32+ 10->50 dropped 52 C:\Users\user\Contacts\Ipahtnlwoc.exe, PE32 10->52 dropped 54 C:\Users\...\Ipahtnlwoc.exe:Zone.Identifier, ASCII 10->54 dropped 56 C:\Users\user\Contacts\ComputerDefaults.exe, PE32+ 10->56 dropped 92 Writes to foreign memory regions 10->92 94 Allocates memory in foreign processes 10->94 96 Creates a thread in another existing process (thread injection) 10->96 98 Injects a PE file into a foreign processes 10->98 15 DpiScaling.exe 10->15         started        18 cmd.exe 1 10->18         started        file5 signatures6 process7 signatures8 118 Modifies the context of a thread in another process (thread injection) 15->118 120 Maps a DLL or memory area into another process 15->120 122 Sample uses process hollowing technique 15->122 124 2 other signatures 15->124 20 explorer.exe 2 15->20 injected 22 cmd.exe 4 18->22         started        25 conhost.exe 18->25         started        process9 file10 27 Ipahtnlwoc.exe 15 20->27         started        31 Ipahtnlwoc.exe 15 20->31         started        33 colorcpl.exe 20->33         started        37 3 other processes 20->37 48 C:\Windows \System32\ComputerDefaults.exe, PE32+ 22->48 dropped 35 conhost.exe 22->35         started        process11 dnsIp12 64 trh5wq.am.files.1drv.com 27->64 66 onedrive.live.com 27->66 68 am-files.fe.1drv.com 27->68 100 Multi AV Scanner detection for dropped file 27->100 102 Writes to foreign memory regions 27->102 104 Allocates memory in foreign processes 27->104 39 DpiScaling.exe 27->39         started        70 trh5wq.am.files.1drv.com 31->70 72 onedrive.live.com 31->72 74 am-files.fe.1drv.com 31->74 106 Creates a thread in another existing process (thread injection) 31->106 108 Injects a PE file into a foreign processes 31->108 42 logagent.exe 31->42         started        110 Modifies the context of a thread in another process (thread injection) 33->110 112 Maps a DLL or memory area into another process 33->112 114 DLL side loading technique detected 33->114 44 cmd.exe 1 33->44         started        116 Tries to detect virtualization through RDTSC time measurements 37->116 signatures13 process14 signatures15 84 Modifies the context of a thread in another process (thread injection) 42->84 86 Maps a DLL or memory area into another process 42->86 88 Sample uses process hollowing technique 42->88 90 Tries to detect virtualization through RDTSC time measurements 42->90 46 conhost.exe 44->46         started        process16
Threat name:
Win32.Trojan.FormBook
Status:
Malicious
First seen:
2022-01-24 16:42:53 UTC
File Type:
PE (Exe)
Extracted files:
72
AV detection:
21 of 28 (75.00%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:gmfe persistence rat spyware stealer suricata trojan
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
Formbook Payload
Formbook
suricata: ET MALWARE FormBook CnC Checkin (GET)
Unpacked files
SH256 hash:
9cebbcef1bd6016dfebf4c69f4c49501d914d5a8607777eba952d7ad40346f9a
MD5 hash:
322f2da5c29542aaecc9ee17e1fe7f00
SHA1 hash:
734c432e2595d53c82ee28604f909d3390018dd8
Detections:
win_dbatloader_w0
Parent samples :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 hash:
b83152fc7fc7aa9950add1de9c3d12e107e3b6eb481c1a368018ed26d3792cdc
MD5 hash:
1c2de2d34e6b111a8d34a1628a38e86c
SHA1 hash:
8f3b4eb58153f5b4e0f18242d1d440326c1abe09
Malware family:
FormBook
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Formbook
Author:JPCERT/CC Incident Response Group
Description:detect Formbook in memory
Reference:internal research
Rule name:win_formbook_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.formbook.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments