General

  • Target

    new order.docx

  • Size

    10KB

  • Sample

    211122-n87kbsfddk

  • MD5

    817c9dd09f7e556d0ef6ff8fb68d89de

  • SHA1

    990f6d8a8c6662fe87da9414d2b4a80e693ac9c1

  • SHA256

    e9d99b13aacd39de4a6d28fec7c97bfde4127b9746d2e1ae1fcda4f65a375309

  • SHA512

    6fbeebcd523e1d51f059832b0946b2f03d0da8bf14bdc91554f047c98056efcb40440ba87369841b618e57d41a40d37699fbcd6358479021c72ac615d08ceed4

Malware Config

Extracted

Rule
Microsoft Office WebSettings Relationship
C2

https://bitestan.com/c4fxhPYO

Extracted

Family

formbook

Version

4.1

Campaign

9gr5

C2

http://www.cuteprofessionalscrubs.com/9gr5/

Decoy

newleafcosmetix.com

richermanscastle.com

ru-remonton.com

2diandongche.com

federaldados.design

jeffreycookweb.com

facecs.online

xmeclarn.xyz

olgasmith.xyz

sneakersonlinesale.com

playboyshiba.com

angelamiglioli.com

diitaldefynd.com

whenevergames.com

mtheartcustom.com

vitalactivesupply.com

twistblogr.com

xn--i8s140at3d6u7c.tel

baudelaireelhakim.com

real-estate-miami-searcher.site

Targets

    • Target

      new order.docx

    • Size

      10KB

    • MD5

      817c9dd09f7e556d0ef6ff8fb68d89de

    • SHA1

      990f6d8a8c6662fe87da9414d2b4a80e693ac9c1

    • SHA256

      e9d99b13aacd39de4a6d28fec7c97bfde4127b9746d2e1ae1fcda4f65a375309

    • SHA512

      6fbeebcd523e1d51f059832b0946b2f03d0da8bf14bdc91554f047c98056efcb40440ba87369841b618e57d41a40d37699fbcd6358479021c72ac615d08ceed4

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • suricata: ET MALWARE WBK Download from dotted-quad Host

      suricata: ET MALWARE WBK Download from dotted-quad Host

    • Formbook Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Abuses OpenXML format to download file from external location

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks