Resubmissions

23-03-2022 12:41

220323-pwrh1sebh9 10

23-03-2022 12:40

220323-pwdl6aebh4 10

23-03-2022 12:36

220323-pszp8aaegq 10

General

  • Target

    3e3ccb3b130c86bb2d82a52f8a7e191efa9499577ba0a3d3f335d5a1e1597b76

  • Size

    995KB

  • Sample

    220323-pwdl6aebh4

  • MD5

    17f33985f4763acfb314795dd000287a

  • SHA1

    24e3a6d5037f18a306ea61f883323df0be119340

  • SHA256

    3e3ccb3b130c86bb2d82a52f8a7e191efa9499577ba0a3d3f335d5a1e1597b76

  • SHA512

    4fe53e131792dc5fa45354fad03301c929935bb711a69a3f7d8c937ef3027cbf261c4b1940aebde1df7ef556dd99227c525e2fc9e4d76437ab85f436105df420

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

g2e7

Decoy

onlinebankaccess.com

dekannabesetale.com

cevaszakszervezet.com

barok-music.com

civitanova.info

projectpeaks.tech

orderoaxacarestaurant.com

lazatee.com

mufduds.com

ivyfitfun.com

justtwotrade.com

dnvkcpe.com

ecomnabe.com

digitalcourse.biz

placemonthwaylife.biz

redfoxbet.info

realitysweetz.com

angyhouse.com

bapqnm.com

parsmicron.com

Targets

    • Target

      3e3ccb3b130c86bb2d82a52f8a7e191efa9499577ba0a3d3f335d5a1e1597b76

    • Size

      995KB

    • MD5

      17f33985f4763acfb314795dd000287a

    • SHA1

      24e3a6d5037f18a306ea61f883323df0be119340

    • SHA256

      3e3ccb3b130c86bb2d82a52f8a7e191efa9499577ba0a3d3f335d5a1e1597b76

    • SHA512

      4fe53e131792dc5fa45354fad03301c929935bb711a69a3f7d8c937ef3027cbf261c4b1940aebde1df7ef556dd99227c525e2fc9e4d76437ab85f436105df420

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Modifies system executable filetype association

    • Registers COM server for autorun

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Formbook Payload

    • Creates new service(s)

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Registry Run Keys / Startup Folder

2
T1060

New Service

1
T1050

Browser Extensions

1
T1176

Hidden Files and Directories

1
T1158

Privilege Escalation

New Service

1
T1050

Defense Evasion

Modify Registry

7
T1112

File Permissions Modification

1
T1222

Install Root Certificate

1
T1130

Hidden Files and Directories

1
T1158

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

6
T1012

System Information Discovery

6
T1082

Security Software Discovery

1
T1063

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Impact

Defacement

1
T1491

Tasks