General

  • Target

    Quotation.xls

  • Size

    1.1MB

  • Sample

    230224-trpwvahg9t

  • MD5

    919c0f851b252a6c834b5ba9470e6c0d

  • SHA1

    df40f89bbc105c96aa93ce2465a3ed06cb7e065a

  • SHA256

    8be101509461d8954f93b6898c1fe407f6a95c78de3b64392e5b785ce55df5b0

  • SHA512

    ca41ce37d8d30a6549847df759dc810ea11d9b598a776bac28660c811fc479f7a6563004a851c1d786755ed0d94995e2086dd0d924f71d853c0d7c623f2cef9f

  • SSDEEP

    24576:iFetUMdicm7bVFee59y5hm10LPHjAqbnpQ2IHYQRrGrdXXXXXXXXXXXXoXXXXXXf:ifRbHdybLbfnevHYQRz

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

g2fg

Decoy

snowcrash.website

pointman.us

newheartvalve.care

drandl.com

sandspringsramblers.com

programagubernamental.online

boja.us

mvrsnike.com

mentallyillmotherhood.com

facom.us

programagubernamental.store

izivente.com

roller-v.fr

amazonbioactives.com

metaverseapple.xyz

5gt-mobilevsverizon.com

gtwebsolutions.co

scottdunn.life

usdp.trade

pikmin.run

Targets

    • Target

      Quotation.xls

    • Size

      1.1MB

    • MD5

      919c0f851b252a6c834b5ba9470e6c0d

    • SHA1

      df40f89bbc105c96aa93ce2465a3ed06cb7e065a

    • SHA256

      8be101509461d8954f93b6898c1fe407f6a95c78de3b64392e5b785ce55df5b0

    • SHA512

      ca41ce37d8d30a6549847df759dc810ea11d9b598a776bac28660c811fc479f7a6563004a851c1d786755ed0d94995e2086dd0d924f71d853c0d7c623f2cef9f

    • SSDEEP

      24576:iFetUMdicm7bVFee59y5hm10LPHjAqbnpQ2IHYQRrGrdXXXXXXXXXXXXoXXXXXXf:ifRbHdybLbfnevHYQRz

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Exploitation for Client Execution

1
T1203

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

3
T1012

Tasks