General

  • Target

    Quotation.xls

  • Size

    1.2MB

  • Sample

    230306-l7yvpabf78

  • MD5

    a990a6c4696a69bb5d468b3cf4f8dd6f

  • SHA1

    9bda12a2d033a96727cf4fc600fc69e02d6bd98a

  • SHA256

    1bcc7193617e608499c5a49a55ec343748dfcb4e6e554b8f2b1d9b6ce929962c

  • SHA512

    bcc5bf35a676b130f3c936e9e43cc903c74982e1d248a859aa0f72faf65c11c58d3103400be9c6f84b1439f5d1a4689cfe224b0bb52e4cea7f8a4c96aab683df

  • SSDEEP

    24576:HLKrWQmmav30xaBqaWQmmav30xnWQmmav30xgBpgWQmmav30xx69DV0RBzgfR3:HLKKQmmQ30g2QmmQ30gQmmQ30Or1QmmE

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

g2fg

Decoy

snowcrash.website

pointman.us

newheartvalve.care

drandl.com

sandspringsramblers.com

programagubernamental.online

boja.us

mvrsnike.com

mentallyillmotherhood.com

facom.us

programagubernamental.store

izivente.com

roller-v.fr

amazonbioactives.com

metaverseapple.xyz

5gt-mobilevsverizon.com

gtwebsolutions.co

scottdunn.life

usdp.trade

pikmin.run

Targets

    • Target

      Quotation.xls

    • Size

      1.2MB

    • MD5

      a990a6c4696a69bb5d468b3cf4f8dd6f

    • SHA1

      9bda12a2d033a96727cf4fc600fc69e02d6bd98a

    • SHA256

      1bcc7193617e608499c5a49a55ec343748dfcb4e6e554b8f2b1d9b6ce929962c

    • SHA512

      bcc5bf35a676b130f3c936e9e43cc903c74982e1d248a859aa0f72faf65c11c58d3103400be9c6f84b1439f5d1a4689cfe224b0bb52e4cea7f8a4c96aab683df

    • SSDEEP

      24576:HLKrWQmmav30xaBqaWQmmav30xnWQmmav30xgBpgWQmmav30xx69DV0RBzgfR3:HLKKQmmQ30g2QmmQ30gQmmQ30Or1QmmE

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Command-Line Interface

1
T1059

Exploitation for Client Execution

1
T1203

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

System Information Discovery

4
T1082

Query Registry

3
T1012

Tasks