General

  • Target

    dvswiftsend_202212390513_93310737712.xls

  • Size

    746KB

  • Sample

    221123-qxzrfsfb36

  • MD5

    213d6cdb4ba6626de9d1d4c8a022d9b2

  • SHA1

    ac1c8161acb070af77a01c99a3ee3a078a4fb40c

  • SHA256

    c8743fb6efa43940673e342940a34d36a2d1eef3262a569b0f651283fe141b7b

  • SHA512

    a8cdba85dd0d8d203acd67ac610164a62c7085e3865899c017905843064fc72d8307765cbe726b4eba6e0e5398eecdfaf87cbea24b336965663f0d387735e395

  • SSDEEP

    12288:YdNqrDx7XXXXXXXXXXXXUXXXXXXXSXXXXXXXXKTmWqmdNqrDx7XXXXXXXXXXXXU2:jr5XXXXXXXXXXXXUXXXXXXXSXXXXXXX2

Malware Config

Extracted

Family

formbook

Campaign

pgnt

Decoy

0WG18LbM4lR9iqMRa4nlBzTb

jcfGYzPgZTqFZVO9FV2yIw==

laIfrdSC8/4CNg==

Q73ilev5GIWuOrAAFV2yIw==

Q2u/pMw7pv4sPA==

TbqvIUHwlQscPo0HFV2yIw==

8PNWfGPyE8n0IQ==

WtgROxXzvY2L

PryaRBNjm4eP

Y9Hdi06Cry1um9Sj68YAu1o=

3Gulyp7CMQtR78jvLkk=

JJ3GasTVTCRQT6Tfz6S6GlI=

RnS42bhb9tI0R6UpD6wOxriNxw==

he1mi2sOGfzTRGHnuA==

eaYjCtjxVjdU5XLRtBMBLKk9quA=

k9rTeEqYzzw8WaTfz6S6GlI=

5luVQwe2vJWKEAiMdF4=

MGW14L9OVk5Y5TaR6w/DqdhYxXVY

mAsYz6k6sQkDC0/DoHj9t1RPWLSgFQ==

y5klhuMbE8n0IQ==

Extracted

Family

xloader

Version

3.�E

Campaign

pgnt

Decoy

0WG18LbM4lR9iqMRa4nlBzTb

jcfGYzPgZTqFZVO9FV2yIw==

laIfrdSC8/4CNg==

Q73ilev5GIWuOrAAFV2yIw==

Q2u/pMw7pv4sPA==

TbqvIUHwlQscPo0HFV2yIw==

8PNWfGPyE8n0IQ==

WtgROxXzvY2L

PryaRBNjm4eP

Y9Hdi06Cry1um9Sj68YAu1o=

3Gulyp7CMQtR78jvLkk=

JJ3GasTVTCRQT6Tfz6S6GlI=

RnS42bhb9tI0R6UpD6wOxriNxw==

he1mi2sOGfzTRGHnuA==

eaYjCtjxVjdU5XLRtBMBLKk9quA=

k9rTeEqYzzw8WaTfz6S6GlI=

5luVQwe2vJWKEAiMdF4=

MGW14L9OVk5Y5TaR6w/DqdhYxXVY

mAsYz6k6sQkDC0/DoHj9t1RPWLSgFQ==

y5klhuMbE8n0IQ==

Targets

    • Target

      dvswiftsend_202212390513_93310737712.xls

    • Size

      746KB

    • MD5

      213d6cdb4ba6626de9d1d4c8a022d9b2

    • SHA1

      ac1c8161acb070af77a01c99a3ee3a078a4fb40c

    • SHA256

      c8743fb6efa43940673e342940a34d36a2d1eef3262a569b0f651283fe141b7b

    • SHA512

      a8cdba85dd0d8d203acd67ac610164a62c7085e3865899c017905843064fc72d8307765cbe726b4eba6e0e5398eecdfaf87cbea24b336965663f0d387735e395

    • SSDEEP

      12288:YdNqrDx7XXXXXXXXXXXXUXXXXXXXSXXXXXXXXKTmWqmdNqrDx7XXXXXXXXXXXXU2:jr5XXXXXXXXXXXXUXXXXXXXSXXXXXXX2

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks