MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fed743ba97ee8b48a3925816de1b2665d2a73bbf3bc75083fb9ade2855afc0ce. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 15


Intelligence 15 IOCs YARA 4 File information Comments

SHA256 hash: fed743ba97ee8b48a3925816de1b2665d2a73bbf3bc75083fb9ade2855afc0ce
SHA3-384 hash: ef022322a44a0b079da5ae0447dbfc2be13164be2fbb1f33f6f2605742304e5a71461354eaa268319642b2d3d9f6c0ea
SHA1 hash: 8f4ce81c820d9b39b5930bdb8178e1e8d728378e
MD5 hash: 23f22ab208306d5c6d9ad9e344c446c0
humanhash: jig-wolfram-thirteen-india
File name:23f22ab208306d5c6d9ad9e344c446c0.exe
Download: download sample
Signature Formbook
File size:1'208'033 bytes
First seen:2022-10-21 08:55:23 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash fcf1390e9ce472c7270447fc5c61a0c1 (863 x DCRat, 118 x NanoCore, 94 x njrat)
ssdeep 24576:gAOcZXQOQyB4o63Ia5tgKWPMgobTuj5HHeg/cbGOSMId:+HEfWdW8TO5HdYGOSMe
Threatray 15'660 similar samples on MalwareBazaar
TLSH T10A451201B6DE8471D0B219316935AB1E6D3B7D202EF4C51FE3E4596FDAF02916220BAF
TrID 91.0% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39)
3.6% (.EXE) Win64 Executable (generic) (10523/12/4)
1.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.5% (.EXE) Win32 Executable (generic) (4505/5/1)
0.6% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon 8463e0e9e9e06204 (3 x AgentTesla, 1 x Formbook)
Reporter abuse_ch
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
275
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
INV_telex_advice_copy_2010202200000000000000020.xls
Verdict:
Malicious activity
Analysis date:
2022-10-20 12:48:16 UTC
Tags:
macros trojan opendir exploit cve-2017-11882 loader formbook stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Enabling the 'hidden' option for files in the %temp% directory
Creating a process from a recently created file
Creating a file
Adding an access-denied ACE
Launching a process
DNS request
Sending an HTTP GET request
Reading critical registry keys
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Forced shutdown of a system process
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
EvasionQueryPerformanceCounter
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware nanocore overlay packed setupapi.dll shdocvw.dll shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
64 / 100
Signature
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AntiVM autoit script
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 727395 Sample: CqU4TWumd2.exe Startdate: 21/10/2022 Architecture: WINDOWS Score: 64 57 Multi AV Scanner detection for submitted file 2->57 59 Yara detected AntiVM autoit script 2->59 13 CqU4TWumd2.exe 3 77 2->13         started        16 hmjqaxtrtt.exe 1 1 2->16         started        18 hmjqaxtrtt.exe 2->18         started        20 hmjqaxtrtt.exe 2->20         started        process3 file4 55 C:\Users\user\AppData\...\hmjqaxtrtt.exe, PE32 13->55 dropped 22 wscript.exe 1 13->22         started        24 wscript.exe 16->24         started        26 wscript.exe 18->26         started        28 wscript.exe 20->28         started        process5 process6 30 hmjqaxtrtt.exe 1 4 22->30         started        33 hmjqaxtrtt.exe 24->33         started        35 hmjqaxtrtt.exe 26->35         started        37 hmjqaxtrtt.exe 28->37         started        signatures7 61 Multi AV Scanner detection for dropped file 30->61 39 wscript.exe 1 30->39         started        41 wscript.exe 33->41         started        process8 process9 43 hmjqaxtrtt.exe 1 39->43         started        45 hmjqaxtrtt.exe 41->45         started        process10 47 wscript.exe 43->47         started        process11 49 hmjqaxtrtt.exe 47->49         started        process12 51 wscript.exe 49->51         started        process13 53 hmjqaxtrtt.exe 51->53         started       
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2022-10-20 15:34:24 UTC
File Type:
PE (Exe)
Extracted files:
203
AV detection:
22 of 26 (84.62%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:ubpr persistence rat spyware stealer trojan
Behaviour
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Adds Run key to start application
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Formbook
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
a9b9dd5b3026334533297a592465c4b85d04fc64bed66a7ac8aaf7d91341e40a
MD5 hash:
e56e615404ddfc441c20857a11d7583c
SHA1 hash:
0e7a639fc705523faf113cec3ae5fe87af039859
SH256 hash:
2716ec3d834e91d3fb6d31e0bed982ad4684601270165b453ad87420dd83baae
MD5 hash:
eedd5d580df332bbc4e178bdc09e3be3
SHA1 hash:
421d1b45301e0b14c23fed5c9ce2c0f0012d4474
SH256 hash:
fed743ba97ee8b48a3925816de1b2665d2a73bbf3bc75083fb9ade2855afc0ce
MD5 hash:
23f22ab208306d5c6d9ad9e344c446c0
SHA1 hash:
8f4ce81c820d9b39b5930bdb8178e1e8d728378e
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:sfx_pdb
Author:@razvialex
Description:Detect interesting files containing sfx with pdb paths.
Rule name:sfx_pdb_winrar_restrict
Author:@razvialex
Description:Detect interesting files containing sfx with pdb paths.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Formbook

Executable exe fed743ba97ee8b48a3925816de1b2665d2a73bbf3bc75083fb9ade2855afc0ce

(this sample)

Comments