Report - d.hta

Formbook RAT JPEG Format
ScreenShot
Created 2023.05.25 13:18 Machine s1_win7_x6402
Filename d.hta
Type HTML document, ASCII text, with very long lines, with CRLF line terminators
AI Score Not founds Behavior Score
2.2
ZERO API file : clean
VT API (file)
md5 c808f7c2c8b88c92abf095f10afae803
sha256 95f678dbd0429decb07045c2d32a646e5d56dbf267a47c042de936be879b31d5
ssdeep 1536:IS928Eb9LPZCXztJ0TcMo+GQehfk/BsCJ5MY5/Dd5qbinFvQM3ZGPQ:IuqdCXRyxjBL5Mk/BsWFvQMEPQ
imphash
impfuzzy
  Network IP location

Signature (6cnts)

Level Description
watch Drops a binary and executes it
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Checks adapter addresses which can be used to detect virtual network interfaces
info Checks amount of memory in system
info Queries for the computername

Rules (3cnts)

Level Name Description Collection
danger Win_Trojan_Formbook_Zero Used Formbook binaries (upload)
info JPEG_Format_Zero JPEG Format binaries (download)
info Win_Backdoor_AsyncRAT_Zero Win Backdoor AsyncRAT binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
elfinindia.com US UNIFIEDLAYER-AS-1 162.241.85.104 malware
162.241.85.104 US UNIFIEDLAYER-AS-1 162.241.85.104 mailcious

Suricata ids



Similarity measure (PE file only) - Checking for service failure