Managed XDR
Group-IB MDP Report
File info
Filename: banned-20240920t080802-01569-10
File Type: SMTP mail, ASCII text
File Size: 1018.8 KB
Env info
win7/x86 en
Hashes
SHA1: 2b4a0109e2f9fd2f0a1abe3039ef23be8c6ff138
SHA256: 9fa2f40782e8a6a1c9097a9393f3587afcd54228078bfcc381116d20c339d0ed
MD5: ed68cc1721eb59462af6160574933591
Malwares
FormBookFormgrabber
Signatures
Execution
T1059 autoit: AutoIt script execution detected
T1059.003 suspicious_process: Spawns a suspicious process
Privilege Escalation
T1055.012 injection_runpe: Injects code into another process
T1055 sets_debug_registers: Sets debug registers for a thread in a different process
T1134 sets_privilegies_via_adjusttokenprivileges: Sets process privilege via AdjustTokenPrivileges
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Defense Evasion
T1055.012 injection_runpe: Injects code into another process
T1027.002 unnamed_memory_regions_contains_pe: One or several unnamed memory regions are PE files
T1027.002 unnamed_memory_regions: Code was executed in unnamed regions
T1055 sets_debug_registers: Sets debug registers for a thread in a different process
T1497 antidbg_query_system: Checks for kernel debugger (SystemKernelDebuggerInformation)
T1497 antidbg_query_process: Checks if the process is being debugged (ProcessDebugPort)
T1497.003 antisandbox_sleep: The process attempted to slow down analysis
T1027.002 packer_upx: The executable file is compressed using UPX
T1134 sets_privilegies_via_adjusttokenprivileges: Sets process privilege via AdjustTokenPrivileges
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
T1027.002 packer_entropy: Probably contains compressed or encrypted data
T1070 stealth_window: A process created a hidden window
Discovery
T1497 antidbg_query_system: Checks for kernel debugger (SystemKernelDebuggerInformation)
T1497 antidbg_query_process: Checks if the process is being debugged (ProcessDebugPort)
T1497.003 antisandbox_sleep: The process attempted to slow down analysis
Other
yara_rules: Static rules
ce_info: Formbook Configuration Data found
formbook: FormBook stealer found
dns_without_resolve: DNS query without a response
no_graphical_activity: No graphic activity
creates_suspended_process: Creates suspended process
pe_overlay: PE file contains overlay
Managed XDR