Resubmissions

16-02-2023 22:10

230216-13ezcacc92 10

16-02-2023 21:46

230216-1mmz1sbh3t 10

General

  • Target

    CONTRACT 2023.docx

  • Size

    10KB

  • Sample

    230216-1mmz1sbh3t

  • MD5

    db41e48f7d56dbc3543d29270b14f41a

  • SHA1

    3561319bfedaa64e9468a8c452013e9a757fd111

  • SHA256

    aa47725c6f6cc10c7fb0cf630272d34456bf7eb49922fde230dbdd352819dffc

  • SHA512

    ac9a9fdf069235b07539b89b85dcfa8be4fd2d306cea4139d8bb29c75c02cd852d3532701cd9b17086eb29cc9009818a37749001b527d53891f07d4c4a7ba03a

  • SSDEEP

    192:ScIMmtP5hG/b7XN+eOY/O+5+5F7Jar/YEChI35OJ:SPXRE7XtOY/7wtar/YECO5C

Malware Config

Extracted

Rule
Microsoft Office WebSettings Relationship
C2

http:/QQQQWWWWQWWWWQWWQWQWQWQQWQWQQWQWQWQWQWQWQWQQQQQQQQOQQQQQOOOOOOOOQOQQQQOQOQOQOQOQOQQWWWWQWQWQWQWQWQWQWQWQQWQ@1332625003/O_O.DOC

Extracted

Family

formbook

Version

4.1

Campaign

ho62

Decoy

aqawonky.com

ancachsroadsideassistance.com

artologycreatlive.com

olesinfo.africa

lovebreatheandsleep.com

friendsofdragonsprings.com

homecomingmums.wiki

hg222.bet

precision-spares.co.uk

generalhospitaleu.africa

touchstone4x4.africa

dynamator.com

dental-implants-52531.com

efefear.buzz

bentonapp.net

89luxu.com

bridgesonelm.com

acesaigon.online

instantapprovals.loans

evuniverso.com

Targets

    • Target

      CONTRACT 2023.docx

    • Size

      10KB

    • MD5

      db41e48f7d56dbc3543d29270b14f41a

    • SHA1

      3561319bfedaa64e9468a8c452013e9a757fd111

    • SHA256

      aa47725c6f6cc10c7fb0cf630272d34456bf7eb49922fde230dbdd352819dffc

    • SHA512

      ac9a9fdf069235b07539b89b85dcfa8be4fd2d306cea4139d8bb29c75c02cd852d3532701cd9b17086eb29cc9009818a37749001b527d53891f07d4c4a7ba03a

    • SSDEEP

      192:ScIMmtP5hG/b7XN+eOY/O+5+5F7Jar/YEChI35OJ:SPXRE7XtOY/7wtar/YECO5C

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Abuses OpenXML format to download file from external location

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks