BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details
7
Global rank
12 infographic chevron month
Month rank
14 infographic chevron week
Week rank
27544
IOCs

FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus.

Stealer
Type
Unknown
Origin
1 January, 2016
First seen
19 April, 2024
Last seen
Also known as
Xloader

How to analyze Formbook with ANY.RUN

Type
Unknown
Origin
1 January, 2016
First seen
19 April, 2024
Last seen

IOCs

IP addresses
82.180.175.114
172.67.177.75
149.100.155.162
154.23.147.231
38.40.172.217
212.24.127.107
154.23.134.144
206.188.193.90
54.150.239.82
172.67.215.254
152.199.21.175
45.196.105.38
192.175.100.228
45.122.135.248
65.109.117.196
46.242.157.30
103.14.122.66
172.67.160.165
154.80.192.235
178.20.227.11
Hashes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mail.adityagroup.co
mail.zoomfilms-cz.com
warbakup5577ebn.duckdns.org
mail.boyyem.com.tr
mail.exportersglobe.com
37collingwoodst.com
gangqinqu123.net
private-clicks.com
mcluxuryrentals.com
mymelada.com
ninoxins.com
echafa.com
doctors4change.net
dubaiexoticdogs.com
apexworldlaunch.tv
goldstespresso.com
stateofbiotech.com
game2plays.com
fahrzeughero.online
diagnosiscovid.online
URLs
http://www.lunazone.us/m07a/
http://www.lolabeautystudios.com/gs12/
http://www.c936c952.icu/a23w/
http://www.silkskyncare.com/uu09/
http://www.fight4yourhappiness.com/dd20/
http://www.tinmapco.com/0sc0/
http://www.budget-harmony.com/ij84/
http://www.posycbd.com/tdet/
http://www.purifyelements.com/fs83/
http://www.venusbackend.live/dz25/
http://www.echoesdesing.com/fs44/
http://www.gltip2le.shop/kh11/
http://www.patlod.com/31o/
http://www.pacomarquez.space/rsgu/
http://www.kudochhattisgarh.org/pdac/
http://www.a2zglobalimports.com/kmge/
http://www.13201f.com/bqiu/
http://www.grupooceanique.com/ns03/
http://www.ellentscm.info/ob/
http://www.georgiemakeup.com/dz11/
Last Seen at

Recent blog posts

post image
New PowerShell Script Tracer: Analyze PowerSh...
watchers 310
comments 0
post image
Dmitry Marinov: ANY.RUN’s CTO on TI Lookup, S...
watchers 184
comments 0
post image
Malware Trends Report: Q1, 2024
watchers 1605
comments 0

What is FormBook malware?

FormBook stealer is an infostealer‍ trojan available as a malware-as-service. This malware is often used by attackers with low technical literacy and little programming knowledge. FormBook can be used to steal various information from infected machines.

Despite how easy it is to set up and use, the malware has advanced stealing and evasion functions including the ability to pull stored and recorded user input. In addition, the FormBook stealer is capable of searching for, viewing, and interacting with files, and taking screenshots. Even though the stealing capability of this virus can be considered somewhat average, its ease of operation, the injection schema, and a set of effective measures that the malware takes to avoid detection by antivirus software made FormBook a popular virus in the hacker community and, unfortunately, its popularity is only continuing to rise in 2019.

General description of the FormBook stealer

Written in C and x86 assembly language, FormBook is sold as a PHP control panel and can be purchased on highly accessible online forums for merely 30 dollars.

Uniquely, unlike the majority of existing viruses that exploit the latest vulnerabilities or zero-days, FormBook can inject into processes and set up function hooks utilizing already known issues. Hence the claim made by the makers, that the virus will work flawlessly regardless of the Windows version.

Together with its stealer functionality and evasion techniques, the virus knows how to execute instructions from a control server that includes starting new processes, their injection, and rebooting the victim’s PC. What’s more, the virus is able to record Windows’ ntdll.dll module into memory and call it directly, which makes API monitoring and user-mode hooking almost insufficient.

Get started today for free

Easily analyze emerging malware with ANY.RUN interactive online sandbox

Register for free

FormBook malware analysis

A video simulation recorded on the ANY.RUN interactive malware analysis service allows us to take an in-depth look at the behavior of this clever virus and other malware such as Dridex and Lokibot with their elaborate anti-evasion techniques.

formbook execution process graph

Figure 1: Processes created by FormBook during execution as shown by ANY.RUN simulation

  • As shown by the ANY.RUN simulation, firstly the virus established connection to the CnC server;
  • After this, a malicious executable file, in this analysis's case pretending to be a .png is being dropped or overwritten and executed;
  • Then, FormBook proceeds to steal the personal data and change the autorun value in the registry. Also, the virus loads DLL from Mozilla Firefox creates files in the user directory, and starts CMD.EXE to set up persistence and later begin process injection;
  • Finally, injected Firefox.exe is executed for logging keystrokes, stealing clipboard data, and extracting authentication information from browser HTTP sessions.

Distribution of the FormBook stealer

According to FormBook analysis, malware is usually distributed via email campaigns that utilized a wide array of infecting mechanisms and can contain a number of various file attachments. Among the most commonly observed attachments are either PDFs, DOC or EXE, or ZIP, RAR, ACE, and ISO files.

Campaigns in which the virus is distributed through files with PDF extensions are known to utilize shipping-related themes and usually include a download link that points at the malicious code instead of the actual virus. DOC and EXE campaigns utilize macros to install and run the virus. Often, the virus is retrieved as a .PDF file in such a case. Finally, archive campaigns are considered to be the most common attack vector for this virus and usually revolve around a business-related theme, such as a payment order. In the case of this attack vector, attachments either contain a link to the FormBook stealer EXE file or install and run the virus on victims' PCs directly.

In 2020 Formbook has become quite popular as it used Covid-themed emails for decoys with subject headings such as “Government Response to Coronavirus Covid-19”.

FormBook execution process

Sandbox simulation performed on the ANY.RUN interactive malware hunting service allows us to detect and investigate the behavior of FormBook in a lot of detail.

text report of the formbook malware analysis

Figure 2: A text report generated by ANY.RUN

After downloading the malicious file the only thing needed to start the contamination is for the file to be opened. In a case when Microsoft Office file (doc, xls, rtf) is used as an infection source, after it is opened the malware exploits the CVE-2017-11882 vulnerability, thus Microsoft Office Equation Editor proceeds to download a malicious executable file and run it.

After infecting the victim's PC, the virus copies and renames itself into a directory that differs based on the privileges of the user. If an admin account is used, the virus installs itself in either %ProgramFiles% or %CommonProgramFiles%. On the other hand, if the privileges are not elevated, then the virus will copy itself into %TEMP% or %APPDATA.

Also, Formbook trojan changes the autorun value in the registry depending on is it was running with normal or elevated privileges. Next, the malware copies itself into a directory it proceeds to check if it’s being run on a virtual machine or analyzed, evaluating the best anti-evasion option that can be utilized in a particular situation. Meanwhile, the virus will try to evaluate the USERNAME environment variable to find out if it’s launched in simulation, while also checking for the presence of debuggers. It should be noted that the malware uses particularly clever techniques while performing an analysis, for example, all shared strings such as command server names are decoded only briefly if they are absolutely required, which makes FormBook highly elusive. In the next step, the virus uses the same injection method to an active explorer.exe process which is only employed as a non-permanent staging ground.

The virus occasionally performs injections into web browser processes and explorer.exe. After injecting into the process, the virus chooses a random application from a static list. Then, the virus proceeds to run the chosen application in suspended mode and copy itself in the address space of the suspended process, thus mimicking a genuine Microsoft process. Next, the virus exits the original process which leaves FormBook's dead code in explorer.exe as a result. From this stage, new FormBook processes can inject targeted applications like web browser processes, which in the case of this particular ANY.RUN simulation is Firefox.

Depending on the objective process, the virus can establish various function hooks. Being run from inside the context of an already generated process, the virus starts to go through every currently active process, trying to identify targeted programs. As soon as a target is found, FormBook will inject itself into it and install a particular set of API hooks, that are based on the target program. The data is then saved in files in the %APPDATA% directory until it is sent to the C&C server. Pay attention to this function to detect malware.

How to avoid infection by FormBook?

The best counteraction technique is to exhibit caution when receiving emails with attachments from unknown senders. Attackers usually use social engineering to trick victims into downloading and opening infected files.

Deleting any suspicious emails from the inbox is a good way to stay safe. If the infection is already detected, a good practice is to carry out an analysis of all devices connected to the network for established CnC or potentially malicious URL connections. Once a suspicious email is received, perimeter settings can be adjusted to block all related emails in the future. Finally, if an infected file is already downloaded, the host should be quarantined until the threat is completely mitigated.

How to detect Formbook using ANY.RUN?

Formbook trojan usually injects into explorer.exe and another processes from the list, such as firefox.exe and msiexec.exe. Knowing this malware's function you can take a look at the process tree after a while during execution and easily determine either the sample is Formbook or not.

formbook execution process tree Figure 3: A tree of processes created by Formbook during its execution

Conclusion

Thanks to extreme ease of use and low cost, FormBook is gaining traction in the criminal community. Not only is the virus's functionality freely accessible for download on open hacker forums and easy to set up without any programming knowledge, but it also comes equipped with some highly advanced anti-evasion techniques, that make detecting it with anti-virus software ultra-difficult. ANY.RUN interactive malware hunting service enables to study FormBook in detail from a secure environment and implement cybersecurity measures accordingly.

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More

Our website uses cookies. By visiting the pages of the site, you agree to our Privacy Policy