MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e740634fa7cca3715fa9eb7fa30892467e31d044ed6f661ad25dae49298862d7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 9


Intelligence 9 IOCs YARA 3 File information Comments

SHA256 hash: e740634fa7cca3715fa9eb7fa30892467e31d044ed6f661ad25dae49298862d7
SHA3-384 hash: 8e7ad7223633b47a66225b082f5ddd62d105c9e451e4003e7d7a7ffae4d8937d2777fa2105c71716f005fde2aff15039
SHA1 hash: 925b0f70011b8caf727544c52a8ae61a2630e578
MD5 hash: f077613a9e353d561f98b74c47802f87
humanhash: delta-butter-charlie-london
File name:URGENTNÍ OBJEDNÁVKA.pdf.exe
Download: download sample
Signature Formbook
File size:790'016 bytes
First seen:2022-04-25 13:49:47 UTC
Last seen:2022-04-25 14:39:46 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'742 x AgentTesla, 19'607 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 12288:FpFkCz9VS+BQBNXd/qtBUrUanH8G9+LpVa6xKmR0pVcf11UOxPEtwIUGDYoJnULe:fFrGqtBCcfhxKmWA1Zx5GDYoJ
Threatray 15'171 similar samples on MalwareBazaar
TLSH T147F4CF477515EA8DC871B9F652409DA000A56ECF817652F228B3377969FA6C3FE003EE
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 0f3375cccc61338f (15 x AgentTesla, 11 x Formbook, 6 x SnakeKeylogger)
Reporter GovCERT_CH
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
2
# of downloads :
239
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Launching a process
Creating a process with a hidden window
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
control.exe obfuscated packed replace.exe update.exe
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Found malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Sigma detected: Suspicious Add Scheduled Task From User AppData Temp
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Uses an obfuscated file name to hide its real file extension (double extension)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 614934 Sample: URGENTN#U00cd OBJEDN#U00c1V... Startdate: 25/04/2022 Architecture: WINDOWS Score: 100 50 Found malware configuration 2->50 52 Malicious sample detected (through community Yara rule) 2->52 54 Antivirus detection for URL or domain 2->54 56 18 other signatures 2->56 10 URGENTN#U00cd OBJEDN#U00c1VKA.pdf.exe 7 2->10         started        process3 file4 36 C:\Users\user\AppData\...\AUlXJKPxWSEQg.exe, PE32 10->36 dropped 38 C:\...\AUlXJKPxWSEQg.exe:Zone.Identifier, ASCII 10->38 dropped 40 C:\Users\user\AppData\Local\...\tmp43A3.tmp, XML 10->40 dropped 42 URGENTN#U00cd OBJE...00c1VKA.pdf.exe.log, ASCII 10->42 dropped 60 Writes to foreign memory regions 10->60 62 Adds a directory exclusion to Windows Defender 10->62 64 Injects a PE file into a foreign processes 10->64 14 RegSvcs.exe 10->14         started        17 powershell.exe 24 10->17         started        19 schtasks.exe 1 10->19         started        signatures5 process6 signatures7 70 Modifies the context of a thread in another process (thread injection) 14->70 72 Maps a DLL or memory area into another process 14->72 74 Sample uses process hollowing technique 14->74 76 2 other signatures 14->76 21 explorer.exe 14->21 injected 25 conhost.exe 17->25         started        27 conhost.exe 19->27         started        process8 dnsIp9 44 swisshoneybee.com 65.21.90.199, 49760, 80 CP-ASDE United States 21->44 46 www.swisshoneybee.com 21->46 48 www.divinggarden.com 21->48 58 System process connects to network (likely due to code injection or exploit) 21->58 29 msiexec.exe 21->29         started        signatures10 process11 signatures12 66 Modifies the context of a thread in another process (thread injection) 29->66 68 Maps a DLL or memory area into another process 29->68 32 cmd.exe 1 29->32         started        process13 process14 34 conhost.exe 32->34         started       
Threat name:
Win32.Trojan.Vimditator
Status:
Malicious
First seen:
2022-04-25 13:50:08 UTC
File Type:
PE (.Net Exe)
Extracted files:
18
AV detection:
14 of 26 (53.85%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:d2g7 rat spyware stealer suricata trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
Formbook Payload
Formbook
suricata: ET MALWARE FormBook CnC Checkin (GET)
Unpacked files
SH256 hash:
55387d8366303a794ee0f3d71a04617f0f1ee9c67a55c913f9b6b870efa123b8
MD5 hash:
c7a79737aa6d4fadfac3b251d48773c4
SHA1 hash:
1afbe9593ed76bd2edb0e0dba4512eb3c8d43fb3
SH256 hash:
09cd3bc420c8982190990a9673b58c3ab01e933dff0881f1e521d3316f1b9a6b
MD5 hash:
6933707e111286a128ad0f7fa298153f
SHA1 hash:
d1121c8bed634e9684727e8c0aad3f597b0749ad
SH256 hash:
c6953f7c55a83e7c9eb68a88f78ef87a529b3972862dd10793183f8db070c444
MD5 hash:
7617c73ba8821c2a01e7be15edbbb527
SHA1 hash:
be88f3c393f7388549ede19a0b4e9316217ece17
SH256 hash:
aef256f1616ee6ef32a8ab88c3e4ffb1b0f39688261f4f7e8ea96a02959c8e04
MD5 hash:
39d19abc22ff8df60510a6f2fc033183
SHA1 hash:
7d7085d37923d09390417889ef589833b486189c
SH256 hash:
e740634fa7cca3715fa9eb7fa30892467e31d044ed6f661ad25dae49298862d7
MD5 hash:
f077613a9e353d561f98b74c47802f87
SHA1 hash:
925b0f70011b8caf727544c52a8ae61a2630e578
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pdb2
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe e740634fa7cca3715fa9eb7fa30892467e31d044ed6f661ad25dae49298862d7

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments