General

  • Target

    New Order- P- 00302001.doc

  • Size

    2.2MB

  • Sample

    220131-h8y1ashch2

  • MD5

    75990fe7c7bfbcd68e3641ced2d184a9

  • SHA1

    1227f04860ae3d3137cd5e85b771cc6b339953a7

  • SHA256

    132a53a42ec7c727a4eeef4013293ab2e4f3b42d82f7c608f15879dea2de338e

  • SHA512

    b2a66f4e40143579223e832296b9031ac9fa9ed836759597bd52add562786bcac88c267ece49551e708edf323e14b2bb7fdd1159f211ef222f43b0ddc1e7fa3f

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

u3s4

Decoy

treducation.net

picashowapk.com

puzzletourny.club

alleenas.com

xgyvsf.icu

valencia-noticias.com

xooxd.pet

kikimodel.com

familyfx.win

halosg.com

ishrcb.com

867537.icu

aadibhatt.net

purebloodbanks.com

zhongwentao.top

slot777dunia.com

lesbonbonsdemamiejeanne.com

prune.digital

zsyqfk.com

yamamichi-satoshi.com

Targets

    • Target

      New Order- P- 00302001.doc

    • Size

      2.2MB

    • MD5

      75990fe7c7bfbcd68e3641ced2d184a9

    • SHA1

      1227f04860ae3d3137cd5e85b771cc6b339953a7

    • SHA256

      132a53a42ec7c727a4eeef4013293ab2e4f3b42d82f7c608f15879dea2de338e

    • SHA512

      b2a66f4e40143579223e832296b9031ac9fa9ed836759597bd52add562786bcac88c267ece49551e708edf323e14b2bb7fdd1159f211ef222f43b0ddc1e7fa3f

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Formbook Payload

    • Blocklisted process makes network request

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks