Resubmissions

09-02-2023 01:59

230209-cefnzaee21 7

25-07-2022 09:10

220725-k5dw3abgen 10

General

  • Target

    Quoation.docx

  • Size

    10KB

  • Sample

    220725-k5dw3abgen

  • MD5

    d0b7db914dac28f48dc17ab867230d2a

  • SHA1

    e6d0e5a89b4ceca869067bbbbfcb548405c024c4

  • SHA256

    69ed08cfd443483118cc4ad0c33957835f3a09ea2efa5044479b26468fc80e15

  • SHA512

    3152364189b61d60a9d33d3f5bc2ae8c6a55fbaa3940f2f807b3f6ffae9621eda898fd410c0ba9c1154d057473faf210b3dd2c7f1fc2f07b1b374f59d226e539

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

g2fg

Decoy

snowcrash.website

pointman.us

newheartvalve.care

drandl.com

sandspringsramblers.com

programagubernamental.online

boja.us

mvrsnike.com

mentallyillmotherhood.com

facom.us

programagubernamental.store

izivente.com

roller-v.fr

amazonbioactives.com

metaverseapple.xyz

5gt-mobilevsverizon.com

gtwebsolutions.co

scottdunn.life

usdp.trade

pikmin.run

Targets

    • Target

      Quoation.docx

    • Size

      10KB

    • MD5

      d0b7db914dac28f48dc17ab867230d2a

    • SHA1

      e6d0e5a89b4ceca869067bbbbfcb548405c024c4

    • SHA256

      69ed08cfd443483118cc4ad0c33957835f3a09ea2efa5044479b26468fc80e15

    • SHA512

      3152364189b61d60a9d33d3f5bc2ae8c6a55fbaa3940f2f807b3f6ffae9621eda898fd410c0ba9c1154d057473faf210b3dd2c7f1fc2f07b1b374f59d226e539

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

      suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    • Formbook payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Abuses OpenXML format to download file from external location

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Exploitation for Client Execution

1
T1203

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks