General

  • Target

    KP_22-15-1201-8_ALM Tech_05.12.2022.xls

  • Size

    1.5MB

  • Sample

    221206-hr3xxsgf6x

  • MD5

    278bd1188d5eb79992f50301e9c04011

  • SHA1

    7f067b15020d3bd92b2c81ec9544a331e31bca8d

  • SHA256

    0e8f31c511f0c4d2ab952cf42f4b6e2d21ed4612c054873a098e1075c8c76909

  • SHA512

    1188302b674db1f0c65e73db7abe69b20c5e0c4f0f685c650e978ab0a6390b2ad025f308b4891f6c8b2779d46c259bbdba73a1051c137f4ad375dc8d25290cf8

  • SSDEEP

    24576:MzxXXXXXXXXXXXXUXXXXXXXXXXXXXXXXD/mlsr5XXXXXXXXXXXXUXXXXXXXrXXXu:ZMzzXtHY

Malware Config

Extracted

Family

formbook

Campaign

henz

Decoy

IxWMb+jVsoinShuZJzk=

TPfKgQZ//oGnKr/J

EsK0WxD5kY65XOW1Td/5CxSUpCUytR7M

KebSmiCP9p8yUw==

HAt/ljkEuqMLHOLCi53Pv8MKX9qk

CY4ogZTwJc4vSw==

WWDIx5UYUDyepntE0YIAPca3/rI=

+Pkr01Lfb2rME7bL

S5nyK0p8jS2xdwQ=

W/oqvlO57LfkLcLHnQ==

zrrwtqkTLwxulm4l8FGopw==

AqucYext8bzFbOKthIm8E6gfVkUHxKY=

OfnjeDs78+RTcz4OHRl+

XKf1wwpZR5hLLjHgmUGOpQ==

JMyhSLoJPTCwn5o9zX2d8i1+

Wk54MBsDhWSVbnIRkQ==

7aaYR/tOhh9piTw5/KHSRwuK2iqgafw7pQ==

hH/EYxN+jC2xdwQ=

S0F4ORqDjS2xdwQ=

0o/UwXnuJ+sJp0cOHRl+

Targets

    • Target

      KP_22-15-1201-8_ALM Tech_05.12.2022.xls

    • Size

      1.5MB

    • MD5

      278bd1188d5eb79992f50301e9c04011

    • SHA1

      7f067b15020d3bd92b2c81ec9544a331e31bca8d

    • SHA256

      0e8f31c511f0c4d2ab952cf42f4b6e2d21ed4612c054873a098e1075c8c76909

    • SHA512

      1188302b674db1f0c65e73db7abe69b20c5e0c4f0f685c650e978ab0a6390b2ad025f308b4891f6c8b2779d46c259bbdba73a1051c137f4ad375dc8d25290cf8

    • SSDEEP

      24576:MzxXXXXXXXXXXXXUXXXXXXXXXXXXXXXXD/mlsr5XXXXXXXXXXXXUXXXXXXXrXXXu:ZMzzXtHY

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Collection

Data from Local System

1
T1005

Tasks