General

  • Target

    ORDER.docx

  • Size

    10KB

  • Sample

    221129-l8xzsacf8x

  • MD5

    4a703e4cdcdb820ba8fb7a4885944e83

  • SHA1

    9161b9fa57542ccd1857597e5e13e2ad89dbd2bf

  • SHA256

    266fe6d2cf821cc2615448990b72401ee2772b8f8548e96482c2e9697e694f76

  • SHA512

    278b9ce372564d1de8227fdd724d4934522ecb5c814316058d4cf663593ef4cd2278b285e9543948e0089cca732e5bcf86fe92e6994a0e5669d0770f38512365

  • SSDEEP

    192:ScIMmtP8ar5G/bfIdTO2namWBX8ex6y3dvR:SPXt4ATO2nosMdp

Malware Config

Extracted

Rule
Microsoft Office WebSettings Relationship
C2

http://0000000000100000000010000000000000010000000000000001000@185.216.71.16/ewe/document_0944000039.doc

Extracted

Family

formbook

Campaign

dcn0

Decoy

ZVx68vDtAMBCwg==

oBMBvsNORkM/O/ox

Ff9pISWkm6eG4lByIspp

c2T42c6CIIF6B8xTxm9XzpVw

bvjhxRbnAC183w==

0lTttSNG4HUDNflyIspp

hPXFlstqiHA/O/ox

WLR+MeerxZ0cNn1ja+IQAYo=

IHRn4xXOVKi477zarG+ObSy7YJA=

Xhf3e+tdAC183w==

Xk0ZAezv2rWH

kngo+vBeSRN7AszNwam3Osmguuqc0MoC

a2Qp7a+E8fSw7LDjpnqEKjsRZA==

3zjy4E7+QM48wg==

YcCmqT3OUNAigVott2pBKiy7YJA=

4+SMeX1juat/5cZ1AZihcyy7YJA=

/+m7sro0OBTl3TMpCw==

i2ctEfe4//a64yklMsgS2J90

+loZ2QKGX0UWgpvErMs=

b9BNCnJWQJS8IfsR0uR3bCy7YJA=

Targets

    • Target

      ORDER.docx

    • Size

      10KB

    • MD5

      4a703e4cdcdb820ba8fb7a4885944e83

    • SHA1

      9161b9fa57542ccd1857597e5e13e2ad89dbd2bf

    • SHA256

      266fe6d2cf821cc2615448990b72401ee2772b8f8548e96482c2e9697e694f76

    • SHA512

      278b9ce372564d1de8227fdd724d4934522ecb5c814316058d4cf663593ef4cd2278b285e9543948e0089cca732e5bcf86fe92e6994a0e5669d0770f38512365

    • SSDEEP

      192:ScIMmtP8ar5G/bfIdTO2namWBX8ex6y3dvR:SPXt4ATO2nosMdp

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Abuses OpenXML format to download file from external location

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Collection

Data from Local System

1
T1005

Tasks