30 DAYS OF FORMBOOK: DAY 23, TUESDAY 2023-06-27 - CVE-2017-11882 RTF ".DOC" --> "FGH2"

NOTICE:

NOTES:

 

ASSOCIATED FILES:

 

IMAGES


Shown above:  Traffic from the infection filtered in Wireshark.

 

30 DAYS OF FORMBOOK: DAY 23, TUESDAY 2023-06-27 - CVE-2017-11882 RTF ".DOC" --> "FGH2"

INFECTION CHAIN:

- Email --> attached RTF file with .doc extension --> open RTF ".doc" file in vulnerable version of MS Word --> 
  URL for Formbook EXE --> Formbook infection --> Formbook C2

MALWARE/ARTIFACTS:

- SHA256 hash: 132c5242bb6815196b6fba93d32a22735d406b98b0fce6d17e618f3aac192645
- File size: 30,059 bytes
- File name: PO28730doc.doc
- File type: Rich Text Format data, version 1
- File description: RTF document with CVE-2017-11882 exploit for Microsoft Office

- SHA256 hash: c81c9ba400d187e3f9ddbc3c9b31a5ac9ae2d102969a30d0896b19efd1981ceb
- File size: 549,888 bytes
- File location: hxxp[:]//79.110.49[.]21/defounderzx.exe
- Persistent file location: C:\Program Files (x86)\Muxl\cfvyhl0vxeh.exe
- File type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
- File description: Windows EXE for Formbook version 4.1

PERSISTENCE:

- Windows Registry key: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
- Value name: FLJPPLEHT
- Value type: REG_SZ
- Value Data: C:\Program Files (x86)\Muxl\cfvyhl0vxeh.exe

DATA STORED FOR EXFILTRATION TO FORMBOOK C2 SERVER:

- C:\Users\[username]\AppData\Roaming\11-P7A7T\11-log.ini - 0 bytes
- C:\Users\[username]\AppData\Roaming\11-P7A7T\11-logim.jpeg  (screenshot of desktop)
- C:\Users\[username]\AppData\Roaming\11-P7A7T\11-logrc.ini  (Outlook Recovery)
- C:\Users\[username]\AppData\Roaming\11-P7A7T\11-logrf.ini  (Firefox Recovery)
- C:\Users\[username]\AppData\Roaming\11-P7A7T\11-logrg.ini  (Chrome Recovery)
- C:\Users\[username]\AppData\Roaming\11-P7A7T\11-logri.ini  (Iexplore Recovery)
- C:\Users\[username]\AppData\Roaming\11-P7A7T\11-logrv.ini  (__Vault Recovery)

- Note: All the above files were deleted after data exfiltation, except for first file at 0 bytes.

FORMBOOK HTTP GET AND POST REQUESTS:

- GET /fgh2/?[string of alphanumeric characters with the following mixed in: = _ + and /]
- POST /fgh2/

DOMAINS THAT DID NOT RESOLVE:

- DNS query for www.chk7[.]com - no response from DNS server
- DNS query for www.xn--12c1cc1b5dd4n[.]com - no response from DNS server

- DNS query for www.acadiatesol[.]com - response: No such name
- DNS query for www.aigpthome[.]net - response: No such name
- DNS query for www.betalingenpayconiq[.]com - response: No such name
- DNS query for www.developmentcollective[.]shop - response: No such name
- DNS query for www.dollarbillstore[.]com - response: No such name
- DNS query for www.dw85[.]xyz - response: No such name
- DNS query for www.fantasywagon[.]store - response: No such name
- DNS query for www.ffdreakfas514[.]com - response: No such name
- DNS query for www.magadonian[.]club - response: No such name
- DNS query for www.newenglandsign[.]company - response: No such name
- DNS query for www.oconnerflatiron[.]com - response: No such name
- DNS query for www.redluckycat[.]com - response: No such name
- DNS query for www.southfloridapaintings[.]com - response: No such name
- DNS query for www.theinfluencerlink[.]com - response: No such name
- DNS query for www.varsasenindir[.]com - response: No such name
- DNS query for www.vlokproducties[.]com - response: No such name
- DNS query for www.xionqi88[.]com - response: No such name

- DNS query for www.70555[.]top - no IP returned from DNS server
- DNS query for www.teshack[.]world - no IP returned from DNS server

DOMAINS USED FOR FORMBOOK GET REQUESTS:

- Note: These appear to be legitimate websites or parked domain pages. 

- www.33811[.]xyz
- www.aimedicarecoverage[.]com
- www.balantran[.]online
- www.borilee[.]store
- www.cdbsoi[.]com
- www.character-try[.]xyz
- www.chickos[.]bio
- www.dymovoi[.]sjte
- www.ekinarslan[.]com
- www.fensterapp[.]com
- www.fredinformatica[.]store
- www.intuityx[.]com
- www.jeple[.]xyz
- www.jmplanejamento[.]com
- www.kjszm[.]top
- www.ky55[.]xyz
- www.kzbjt[.]com
- www.loto60[.]tube
- www.mykusadasi[.]com
- www.niagaraportthorold[.]com
- www.ppzwb[.]top
- www.realjourney[.]xyz
- www.rule34[.]monster
- www.tokempoocket[.]com

DOMAINS USED FOR FORMBOOK GET AND POST REQUESTS:

- Note: These appear to be legitimate websites or parked domain pages. 

- www.artmartco[.]com
- www.asdpolw[.]xyz
- www.buygelpen[.]com
- www.clepcity[.]com
- www.gamingord[.]xyz
- www.idsc-co[.]com
- www.liza[.]world
- www.mainfocusmediacompany[.]com
- www.saltybeachtravels[.]com
- www.studioeminc[.]com
- www.winecountrywinediva[.]com

 

Click here to return to the main page.