General

  • Target

    Quotation.xls

  • Size

    813KB

  • Sample

    221130-w2mwcagd4w

  • MD5

    c196268a0bbe6cb62aa9a304e2a5eb89

  • SHA1

    a6621f62281c559c0ca622ac64a9330d540a1cea

  • SHA256

    6f01ffd758dbda45a940a7f396fc02e29d10ea1cba8d0dbc03f3902e97821c85

  • SHA512

    03ea89f7cb5a22d29f93b6175892bdd1a6c257edf259fc7b040634d5336ec4757c166ec2f4828de714ff22c4ab34f87296339bf850148554a3d636e50d4ac8e7

  • SSDEEP

    24576:EcRFr5XXXXXXXXXXXXUXXXXXXXSXXXXXXXXpmYr5XXXXXXXXXXXXUXXXXXXXSXXN:Hw5DI

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

g2fg

Decoy

snowcrash.website

pointman.us

newheartvalve.care

drandl.com

sandspringsramblers.com

programagubernamental.online

boja.us

mvrsnike.com

mentallyillmotherhood.com

facom.us

programagubernamental.store

izivente.com

roller-v.fr

amazonbioactives.com

metaverseapple.xyz

5gt-mobilevsverizon.com

gtwebsolutions.co

scottdunn.life

usdp.trade

pikmin.run

Targets

    • Target

      Quotation.xls

    • Size

      813KB

    • MD5

      c196268a0bbe6cb62aa9a304e2a5eb89

    • SHA1

      a6621f62281c559c0ca622ac64a9330d540a1cea

    • SHA256

      6f01ffd758dbda45a940a7f396fc02e29d10ea1cba8d0dbc03f3902e97821c85

    • SHA512

      03ea89f7cb5a22d29f93b6175892bdd1a6c257edf259fc7b040634d5336ec4757c166ec2f4828de714ff22c4ab34f87296339bf850148554a3d636e50d4ac8e7

    • SSDEEP

      24576:EcRFr5XXXXXXXXXXXXUXXXXXXXSXXXXXXXXpmYr5XXXXXXXXXXXXUXXXXXXXSXXN:Hw5DI

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Exploitation for Client Execution

1
T1203

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks