General

  • Target

    Oferty CZ1083377236U.xls

  • Size

    848KB

  • Sample

    221118-2lj3eabc92

  • MD5

    af617f50e862c8e33e60f89e0af666b2

  • SHA1

    50774a2bb661085ecd9df7e2c8fff87391998bc4

  • SHA256

    53f1625cb7085fb0659fbf76e8f60d3a9233d8c1bd074daf0a725c149d036f20

  • SHA512

    8e80a34f4bf6fe0d7dff3b7dc098f3aa64a290887eb50c909f7f92f40f957af234e4976010c49449f64b14d09dc0f4268fbd247bda9f3233d4fcb7bcaa7cbcb5

  • SSDEEP

    24576:Hr5XXXXXXXXXXXXUXXXXXXXrXXXXXXXXYzmDr5XXXXXXXXXXXXUXXXXXXXrXXXXL:fQBNe

Malware Config

Extracted

Family

formbook

Campaign

f4ca

Decoy

omFHB5ajfJi1UEIEV9XcoRw=

UBjJkmQPyprdhcFF/bdCWQ==

evGKkBUj1je+otcfpw==

KgvGVeOATSt3nug0BIOm2JvOQycB

Lv6o3K0r9aSjI0lr9fg1txw=

LH1jJb/HieQpsEdqWCQTvX2PmsDVIeg=

99dte0XauJfk6Xv+uQxJFgA1gMktBA==

21FkkGB9gMniDQw2ffu6

r4lKBM/q6TZwVZfS

F+14qHeVWi56KdQ=

BgWXRsVoICMvvQ==

I+EozFl0Uy56KdQ=

xoXCgEllKEbWfjFCCLo=

qo9G1lXvvGt5GkxrLQWw

ORNlYic0PJ2ip4geEFSv

Yj+GFpvFxy0uVYx1fLI/XQ==

XL+veIKPjOTe4fjvFs+n

D2JKVAfuakXCAyoEvw==

voWJU81tH56wvt/vImbCcgVd

dVEcwFrmb8bZ4vXvFs+n

Targets

    • Target

      Oferty CZ1083377236U.xls

    • Size

      848KB

    • MD5

      af617f50e862c8e33e60f89e0af666b2

    • SHA1

      50774a2bb661085ecd9df7e2c8fff87391998bc4

    • SHA256

      53f1625cb7085fb0659fbf76e8f60d3a9233d8c1bd074daf0a725c149d036f20

    • SHA512

      8e80a34f4bf6fe0d7dff3b7dc098f3aa64a290887eb50c909f7f92f40f957af234e4976010c49449f64b14d09dc0f4268fbd247bda9f3233d4fcb7bcaa7cbcb5

    • SSDEEP

      24576:Hr5XXXXXXXXXXXXUXXXXXXXrXXXXXXXXYzmDr5XXXXXXXXXXXXUXXXXXXXrXXXXL:fQBNe

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks