Edit tour
Windows
Analysis Report
New_Order.exe
Overview
General Information
Detection
FormBook
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Sigma detected: Scheduled temp file as task from temp location
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Maps a DLL or memory area into another process
Initial sample is a PE file and has a suspicious name
Writes to foreign memory regions
Machine Learning detection for sample
Performs DNS queries to domains with low reputation
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Queues an APC in another process (thread injection)
Machine Learning detection for dropped file
Adds a directory exclusion to Windows Defender
Uses schtasks.exe or at.exe to add and modify task schedules
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Abnormal high CPU Usage
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Contains functionality to read the PEB
Checks if the current process is being debugged
Binary contains a suspicious time stamp
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Classification
- System is w10x64
- New_Order.exe (PID: 7360 cmdline:
C:\Users\u ser\Deskto p\New_Orde r.exe MD5: E63F894AE694122FE230D5A91250BC1F) - powershell.exe (PID: 7536 cmdline:
C:\Windows \System32\ WindowsPow erShell\v1 .0\powersh ell.exe" A dd-MpPrefe rence -Exc lusionPath "C:\Users \user\Desk top\New_Or der.exe MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 7544 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7584 cmdline:
C:\Windows \System32\ WindowsPow erShell\v1 .0\powersh ell.exe" A dd-MpPrefe rence -Exc lusionPath "C:\Users \user\AppD ata\Roamin g\QjSljS.e xe MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 7616 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 7656 cmdline:
C:\Windows \System32\ schtasks.e xe" /Creat e /TN "Upd ates\QjSlj S" /XML "C :\Users\us er\AppData \Local\Tem p\tmpBC11. tmp MD5: 48C2FE20575769DE916F48EF0676A965) - conhost.exe (PID: 7708 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - New_Order.exe (PID: 7820 cmdline:
C:\Users\u ser\Deskto p\New_Orde r.exe MD5: E63F894AE694122FE230D5A91250BC1F) - New_Order.exe (PID: 7828 cmdline:
C:\Users\u ser\Deskto p\New_Orde r.exe MD5: E63F894AE694122FE230D5A91250BC1F) - New_Order.exe (PID: 7840 cmdline:
C:\Users\u ser\Deskto p\New_Orde r.exe MD5: E63F894AE694122FE230D5A91250BC1F) - MxIFbOJlQLdXkFqAx.exe (PID: 1856 cmdline:
"C:\Progra m Files (x 86)\PguDoa ZJsfFLgmOh BUDuBYdPQB TjzoMwDyDC ydphyRQPlA Syww\MxIFb OJlQLdXkFq Ax.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717) - wextract.exe (PID: 8188 cmdline:
C:\Windows \SysWOW64\ wextract.e xe MD5: B9CC7E24DB7DE2E75678761B1D8BAC3E) - MxIFbOJlQLdXkFqAx.exe (PID: 2492 cmdline:
"C:\Progra m Files (x 86)\PguDoa ZJsfFLgmOh BUDuBYdPQB TjzoMwDyDC ydphyRQPlA Syww\MxIFb OJlQLdXkFq Ax.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717) - firefox.exe (PID: 7832 cmdline:
C:\Program Files\Moz illa Firef ox\Firefox .exe MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
- QjSljS.exe (PID: 7860 cmdline:
C:\Users\u ser\AppDat a\Roaming\ QjSljS.exe MD5: E63F894AE694122FE230D5A91250BC1F) - schtasks.exe (PID: 8108 cmdline:
C:\Windows \System32\ schtasks.e xe" /Creat e /TN "Upd ates\QjSlj S" /XML "C :\Users\us er\AppData \Local\Tem p\tmpCEFD. tmp MD5: 48C2FE20575769DE916F48EF0676A965) - conhost.exe (PID: 8116 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - QjSljS.exe (PID: 8152 cmdline:
C:\Users\u ser\AppDat a\Roaming\ QjSljS.exe MD5: E63F894AE694122FE230D5A91250BC1F) - QjSljS.exe (PID: 8160 cmdline:
C:\Users\u ser\AppDat a\Roaming\ QjSljS.exe MD5: E63F894AE694122FE230D5A91250BC1F) - QjSljS.exe (PID: 8168 cmdline:
C:\Users\u ser\AppDat a\Roaming\ QjSljS.exe MD5: E63F894AE694122FE230D5A91250BC1F) - MxIFbOJlQLdXkFqAx.exe (PID: 5844 cmdline:
"C:\Progra m Files (x 86)\PguDoa ZJsfFLgmOh BUDuBYdPQB TjzoMwDyDC ydphyRQPlA Syww\MxIFb OJlQLdXkFq Ax.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717) - wextract.exe (PID: 3552 cmdline:
C:\Windows \SysWOW64\ wextract.e xe MD5: B9CC7E24DB7DE2E75678761B1D8BAC3E)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Formbook, Formbo | FormBook contains a unique crypter RunPE that has unique behavioral patterns subject to detection. It was initially called "Babushka Crypter" by Insidemalware. |
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_FormBook_1 | Yara detected FormBook | Joe Security | ||
Windows_Trojan_Formbook_1112e116 | unknown | unknown |
| |
JoeSecurity_FormBook_1 | Yara detected FormBook | Joe Security | ||
Windows_Trojan_Formbook_1112e116 | unknown | unknown |
| |
JoeSecurity_FormBook_1 | Yara detected FormBook | Joe Security | ||
Click to see the 19 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_FormBook_1 | Yara detected FormBook | Joe Security | ||
Windows_Trojan_Formbook_1112e116 | unknown | unknown |
| |
JoeSecurity_FormBook_1 | Yara detected FormBook | Joe Security | ||
Windows_Trojan_Formbook_1112e116 | unknown | unknown |
|
Persistence and Installation Behavior |
---|
Source: | Author: Joe Security: |
Timestamp: | 192.168.2.4185.151.30.13849744802855465 12/03/23-16:26:16.668057 |
SID: | 2855465 |
Source Port: | 49744 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.4172.67.184.7349764802855465 12/03/23-16:27:43.947745 |
SID: | 2855465 |
Source Port: | 49764 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.437.97.254.2749760802855465 12/03/23-16:27:21.256906 |
SID: | 2855465 |
Source Port: | 49760 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.4109.68.33.2549748802855465 12/03/23-16:26:38.894529 |
SID: | 2855465 |
Source Port: | 49748 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.491.195.240.9449739802855465 12/03/23-16:25:44.407183 |
SID: | 2855465 |
Source Port: | 49739 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.4202.172.28.20249768802855465 12/03/23-16:28:29.296841 |
SID: | 2855465 |
Source Port: | 49768 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.452.68.224.12649756802855465 12/03/23-16:27:06.930079 |
SID: | 2855465 |
Source Port: | 49756 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.466.29.155.5449752802855465 12/03/23-16:26:52.795950 |
SID: | 2855465 |
Source Port: | 49752 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Virustotal: | Perma Link |
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Networking |
---|
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: |
Source: | DNS query: |
Source: | ASN Name: | ||
Source: | ASN Name: |
Source: | IP Address: |
Source: | HTTP traffic detected: |