MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cfe9062e6bd88ae993c3e8b295386c2e5e9aa7d8b9ceb168f56ccd3e0e5cbe36. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 16


Intelligence 16 IOCs YARA 2 File information Comments

SHA256 hash: cfe9062e6bd88ae993c3e8b295386c2e5e9aa7d8b9ceb168f56ccd3e0e5cbe36
SHA3-384 hash: 841e02fe0853abdd368f2cfe7b32cbcaa76ae0ccfd84c2e37f16f148fc37230352b96132a35372016abd11da0a029e47
SHA1 hash: 1f7e9ecf6af1ad967edd59aeb79494b4b0b8fa2f
MD5 hash: f8bb833541c11d6047b83b5139c794ea
humanhash: thirteen-uncle-beryllium-pizza
File name:Inv_7623980.exe
Download: download sample
Signature Formbook
File size:656'384 bytes
First seen:2023-05-09 02:31:28 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 12288:syhuMA80Mgixbs+aZvPrMygTI6iNiP59swToysTNin:syhjA8pxbsHZ4pJiNiPrswzsT
Threatray 2'899 similar samples on MalwareBazaar
TLSH T1E0D4F111B2E9BF51E43E4BF8381471440BF2716760E4E72E8DA760D87AE6F810A45E6F
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter threatcat_ch
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
259
Origin country :
CH CH
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
Inv_7623980.exe
Verdict:
Malicious activity
Analysis date:
2023-05-09 02:33:43 UTC
Tags:
formbook xloader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Сreating synchronization primitives
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a process from a recently created file
Creating a process with a hidden window
Creating a file in the %temp% directory
Launching a process
Launching cmd.exe command interpreter
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
comodo jigsaw packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Scheduled temp file as task from temp location
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Uses ipconfig to lookup or modify the Windows network settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 861778 Sample: Inv_7623980.exe Startdate: 09/05/2023 Architecture: WINDOWS Score: 100 63 www.patrick-daggitt.com 2->63 77 Found malware configuration 2->77 79 Malicious sample detected (through community Yara rule) 2->79 81 Antivirus detection for URL or domain 2->81 83 7 other signatures 2->83 11 Inv_7623980.exe 7 2->11         started        15 WTlsRQtwWJZBlb.exe 5 2->15         started        signatures3 process4 file5 55 C:\Users\user\AppData\...\WTlsRQtwWJZBlb.exe, PE32 11->55 dropped 57 C:\...\WTlsRQtwWJZBlb.exe:Zone.Identifier, ASCII 11->57 dropped 59 C:\Users\user\AppData\Local\...\tmp22DB.tmp, XML 11->59 dropped 61 C:\Users\user\AppData\...\Inv_7623980.exe.log, ASCII 11->61 dropped 91 Uses schtasks.exe or at.exe to add and modify task schedules 11->91 93 Writes to foreign memory regions 11->93 95 Allocates memory in foreign processes 11->95 97 Adds a directory exclusion to Windows Defender 11->97 17 RegSvcs.exe 11->17         started        20 schtasks.exe 1 11->20         started        22 powershell.exe 17 11->22         started        99 Multi AV Scanner detection for dropped file 15->99 101 Machine Learning detection for dropped file 15->101 103 Injects a PE file into a foreign processes 15->103 24 RegSvcs.exe 15->24         started        26 schtasks.exe 1 15->26         started        28 RegSvcs.exe 15->28         started        signatures6 process7 signatures8 69 Modifies the context of a thread in another process (thread injection) 17->69 71 Maps a DLL or memory area into another process 17->71 73 Sample uses process hollowing technique 17->73 75 2 other signatures 17->75 30 explorer.exe 5 1 17->30 injected 34 conhost.exe 20->34         started        36 conhost.exe 22->36         started        38 conhost.exe 26->38         started        process9 dnsIp10 65 www.heatbling.com 30->65 67 www.executivepresencetrainer.com 30->67 105 System process connects to network (likely due to code injection or exploit) 30->105 107 Uses ipconfig to lookup or modify the Windows network settings 30->107 40 WWAHost.exe 30->40         started        43 ipconfig.exe 30->43         started        45 autoconv.exe 30->45         started        47 MpCmdRun.exe 1 34->47         started        signatures11 process12 signatures13 85 Modifies the context of a thread in another process (thread injection) 40->85 87 Maps a DLL or memory area into another process 40->87 89 Tries to detect virtualization through RDTSC time measurements 40->89 49 cmd.exe 1 40->49         started        51 conhost.exe 47->51         started        process14 process15 53 conhost.exe 49->53         started       
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-05-09 02:32:06 UTC
File Type:
PE (.Net Exe)
Extracted files:
51
AV detection:
18 of 24 (75.00%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:m82 rat spyware stealer trojan
Behaviour
Creates scheduled task(s)
Gathers network information
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
Formbook payload
Formbook
Unpacked files
SH256 hash:
76f9c3ed177a98a5397d5507ce7efbafed0c55553ce00dec171891c54a35db77
MD5 hash:
d090b96080246effb57d59eba08ce4c8
SHA1 hash:
b77aa76796ff76824ce7c7ca4cf11378888f1d44
Detections:
FormBook win_formbook_w0 win_formbook_auto win_formbook_g0
Parent samples :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 hash:
c2049986c5ffe4561975b2320867bafabb64de353b3d5604e55ac60ad197307d
MD5 hash:
cb73f03be08f75c8ba25009a2295f0ee
SHA1 hash:
6ae6b0862206e1e0e6ef6881a33a66416108d727
SH256 hash:
b52c29ba9ef8996bdf721950d900db96f1befb9883eb38c2075528e60c7aabd4
MD5 hash:
7b6143d9d94c8b80d191b77d8b6d1ba2
SHA1 hash:
1c91704ff6da2a9dd8aaa2ff2d5a5f69a445f76b
SH256 hash:
7d4d2727af16bd43a8b84684fcf9471ffac7adb5a99bab3476951c16dcdfa4c3
MD5 hash:
48f25f70764858909ab7fa96721f9d01
SHA1 hash:
1a8628d1c7ea6cf1d06dbfc58cbca14d32139fbd
SH256 hash:
ffd31455c8c124bc5d55bf77550521ad1e6f31947826313dd53a6c6775b39fd0
MD5 hash:
806408ccc566cfaa2c9de2bf33501344
SHA1 hash:
0f1aa0c72f918ad8e4964b592a06587135d59e65
SH256 hash:
cfe9062e6bd88ae993c3e8b295386c2e5e9aa7d8b9ceb168f56ccd3e0e5cbe36
MD5 hash:
f8bb833541c11d6047b83b5139c794ea
SHA1 hash:
1f7e9ecf6af1ad967edd59aeb79494b4b0b8fa2f
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe cfe9062e6bd88ae993c3e8b295386c2e5e9aa7d8b9ceb168f56ccd3e0e5cbe36

(this sample)

  
Dropped by
formbook
  
Delivery method
Distributed via e-mail attachment

Comments