MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b912272d7664acfa6357c7338b92ecedf0543ae230d9f78a03698458297efdc2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 11


Intelligence 11 IOCs YARA 3 File information Comments

SHA256 hash: b912272d7664acfa6357c7338b92ecedf0543ae230d9f78a03698458297efdc2
SHA3-384 hash: 0a59fc8537a617e2f5f249b295248548e829994d7970ffc53868fc14eb41332b080862ceb1af1207a72f0d23f7d7fa44
SHA1 hash: ffed99e8846ce23c8e9654590a0840b57f43d58d
MD5 hash: 23983f3fd2311635f8362b20a2661d75
humanhash: uncle-table-uranus-thirteen
File name:vbc.exe.vir
Download: download sample
Signature Formbook
File size:1'910'272 bytes
First seen:2022-06-20 17:33:32 UTC
Last seen:2022-06-20 18:43:24 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 49152:8PyXKrmYMzh38PSR1MIkayyhXoj3yQSHmkONQ65HG:8PyarqRoOnkayypk3ynUW6w
Threatray 1'662 similar samples on MalwareBazaar
TLSH T17495120575ABCAB2E6990BB7C4D24000C7B78585A1D7E32B365813F69DC37EFC982A47
TrID 69.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
9.9% (.EXE) Win64 Executable (generic) (10523/12/4)
6.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.2% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter KdssSupport
Tags:dropped exe FormBook

Intelligence


File Origin
# of uploads :
2
# of downloads :
282
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
209f06abc7e80d13989557ca6c1956c668436a4a.xlsx
Verdict:
Malicious activity
Analysis date:
2022-06-20 17:15:37 UTC
Tags:
encrypted trojan opendir exploit CVE-2017-11882 loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Sending a custom TCP request
Launching a process
Creating a file
Forced shutdown of a system process
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
clipbanker formbook packed wacatac
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spre.evad
Score:
92 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
Creates multiple autostart registry keys
Hides that the sample has been downloaded from the Internet (zone.identifier)
Infects executable files (exe, dll, sys, html)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected AntiVM3
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 649042 Sample: vbc.exe.vir Startdate: 20/06/2022 Architecture: WINDOWS Score: 92 116 Malicious sample detected (through community Yara rule) 2->116 118 Multi AV Scanner detection for submitted file 2->118 120 Yara detected AntiVM3 2->120 122 3 other signatures 2->122 13 vbc.exe.exe 3 2->13         started        16 LookupSvi.exe 2->16         started        18 AeLookupSvi.exe 2->18         started        20 2 other processes 2->20 process3 file4 112 C:\Users\user\AppData\...\vbc.exe.exe.log, ASCII 13->112 dropped 22 RegSvcs.exe 3 13->22         started        25 secdrv.exe 16->25         started        27 secdrv.exe 16->27         started        29 secdrv.exe 16->29         started        33 2 other processes 16->33 31 ProfSvc.exe 18->31         started        process5 signatures6 128 Hides that the sample has been downloaded from the Internet (zone.identifier) 22->128 35 RegSvcs.exe 2 22->35         started        38 conhost.exe 25->38         started        40 conhost.exe 27->40         started        42 conhost.exe 29->42         started        44 conhost.exe 31->44         started        46 conhost.exe 33->46         started        process7 signatures8 124 Hides that the sample has been downloaded from the Internet (zone.identifier) 35->124 48 RegSvcs.exe 2 35->48         started        process9 signatures10 114 Hides that the sample has been downloaded from the Internet (zone.identifier) 48->114 51 RegSvcs.exe 5 48->51         started        process11 file12 94 C:\Users\user\AppData\...\LookupSvi.exe, PE32 51->94 dropped 96 C:\Users\user\AppData\Roaming\...\secdrv.exe, PE32 51->96 dropped 98 C:\Users\...\eventbeacons.dat.~tmp (copy), PE32 51->98 dropped 126 Hides that the sample has been downloaded from the Internet (zone.identifier) 51->126 55 RegSvcs.exe 3 51->55         started        59 LookupSvi.exe 51->59         started        signatures13 process14 file15 108 C:\Users\user\AppData\...\AeLookupSvi.exe, PE32 55->108 dropped 110 C:\Users\user\AppData\Roaming\...\ProfSvc.exe, PE32 55->110 dropped 132 Hides that the sample has been downloaded from the Internet (zone.identifier) 55->132 134 Injects a PE file into a foreign processes 55->134 61 RegSvcs.exe 55->61         started        64 AeLookupSvi.exe 55->64         started        136 Creates multiple autostart registry keys 59->136 66 secdrv.exe 59->66         started        68 secdrv.exe 59->68         started        signatures16 process17 signatures18 138 Hides that the sample has been downloaded from the Internet (zone.identifier) 61->138 140 Injects a PE file into a foreign processes 61->140 70 RegSvcs.exe 61->70         started        142 Creates multiple autostart registry keys 64->142 74 ProfSvc.exe 64->74         started        76 ProfSvc.exe 64->76         started        78 ProfSvc.exe 64->78         started        80 ProfSvc.exe 64->80         started        82 conhost.exe 66->82         started        84 conhost.exe 68->84         started        process19 file20 100 C:\Windows\SysWOW64\7za.exe, PE32 70->100 dropped 102 C:\Program Files\...\msoia.exe, PE32 70->102 dropped 104 C:\Program Files\...\MSOHTMED.EXE, PE32 70->104 dropped 106 33 other files (10 malicious) 70->106 dropped 130 Infects executable files (exe, dll, sys, html) 70->130 86 conhost.exe 74->86         started        88 conhost.exe 76->88         started        90 conhost.exe 78->90         started        92 conhost.exe 80->92         started        signatures21 process22
Threat name:
ByteCode-MSIL.Trojan.FormBook
Status:
Malicious
First seen:
2022-06-09 01:44:22 UTC
File Type:
PE (.Net Exe)
Extracted files:
24
AV detection:
27 of 41 (65.85%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Drops autorun.inf file
Suspicious use of SetThreadContext
Adds Run key to start application
Checks computer location settings
Drops startup file
Loads dropped DLL
Uses the VBS compiler for execution
Executes dropped EXE
Unpacked files
SH256 hash:
2f7a005b9b83aec6dd19e6b53530745d9fdff0590ffca0a8ed8047dc11b3c335
MD5 hash:
927c0ce36865c9f2704cbe8c81c23e83
SHA1 hash:
cf7a9098ec615cdf62f7ccf127b1c71ed4e97550
SH256 hash:
c57394dcdf14ee5770166280e6c8535e990af404c7649cab7ba6156afe4d7983
MD5 hash:
5693725de20432aff515cacbf202b6c3
SHA1 hash:
e337f47898eeac202b08d859bd8292e4b88747c7
SH256 hash:
a8dcb3bbabfba6e7f22207492f4ff6d8976bb2bee502ce145ff0e8b33d7c42ae
MD5 hash:
4f328caa4aec70994c3f2250ae8702a7
SHA1 hash:
0f8c1b9315a9988adee3320ba77fde0e88e8774f
SH256 hash:
d8af9082f3f19b77be168fe6454bfd902f968ac41c4c107b10cf3ae0fb0a9403
MD5 hash:
1ad07c9b6b3aec92827e24d4f4d56b01
SHA1 hash:
a5b9658c7ca9f8242be18a016675ce630fbc9206
SH256 hash:
2e5b19bdc471d35f9837e20482f0ce5c315c74bdcff64270e8fa077b12775fd3
MD5 hash:
1d41c505980c9b4a53a4e840e4855c4d
SHA1 hash:
8e85f52d44fbf24f023ee25c4549d60338053c13
SH256 hash:
6421704cf1aa405b09460dea0c6ab720314022fb3a09d4c889444c81d026519e
MD5 hash:
8a7b3d638c0c61939746e8a4b72272df
SHA1 hash:
51710078397beb7a823f5dfcad58858cdbd4fdbb
SH256 hash:
4b3059a1fcd6c58c7fc4e574766133e89e95cb0fe6631b7f4aee664370c2571d
MD5 hash:
97f6ddc9c7e648e589849d8d6466bc18
SHA1 hash:
1104888244c872d5726728e0cb05ae6edaabf2bf
SH256 hash:
b912272d7664acfa6357c7338b92ecedf0543ae230d9f78a03698458297efdc2
MD5 hash:
23983f3fd2311635f8362b20a2661d75
SHA1 hash:
ffed99e8846ce23c8e9654590a0840b57f43d58d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:exploit_any_poppopret
Author:Jeff White [karttoon@gmail.com] @noottrak
Description:Identify POP -> POP -> RET opcodes for quick ROP Gadget creation in target binaries.
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Formbook

Executable exe b912272d7664acfa6357c7338b92ecedf0543ae230d9f78a03698458297efdc2

(this sample)

  
Delivery method
Distributed via web download

Comments