新型FormBook恶意软件通过多阶段攻击获取Windows系统完全控制权
FormBook新型变种通过多阶段攻击远程控制Windows系统,利用CVE-2017-11882漏洞传播恶意文档,隐藏Payload并采用进程空洞注入技术。其采用Heaven's Gate技术执行64位代码,并通过加密函数和检测虚拟环境等反分析手段规避检测。成功感染后可窃取浏览器凭证并与C2服务器通信执行多种指令。 2025-5-28 11:37:38 Author: cybersecuritynews.com(查看原文) 阅读量:8 收藏

Windows Users

A sophisticated new variant of the FormBook malware that grants cybercriminals complete remote control over Windows systems through an elaborate multi-stage attack process. 

The latest analysis, published on May 27, 2025, reveals that this information-stealing malware has evolved significantly, incorporating advanced anti-analysis techniques and leveraging legitimate Windows processes to evade detection.

Exploiting Legacy Vulnerabilities

Fortinet reports that the new FormBook campaign initiates through carefully crafted phishing emails containing malicious Word documents that exploit the CVE-2017-11882 vulnerability in Microsoft Office’s Equation Editor. 

Google News

Upon successful exploitation, the malware downloads and decrypts a hidden FormBook payload disguised as a fake PNG file, demonstrating the attackers’ commitment to stealth operations.

The malware employs process hollowing techniques, initially targeting the “ImagingDevices.exe” process before systematically injecting itself into randomly selected child processes of explorer.exe. 

Security analyst Xiaopeng Zhang’s research revealed that the malware maintains a list of twelve encrypted process names, including “PATHPING.EXE,” “fontview.exe,” and “MuiUnattend.exe,” all residing in the “C:\Windows\SysWOW64” folder. 

Calling a function to decrypt the FormBook payload

The malware repeatedly attempts to launch these processes until one successfully executes, then performs process hollowing to inject the FormBook payload.

Heaven’s Gate Anti-Analysis Tactics

This FormBook variant demonstrates remarkable sophistication through its implementation of the Heaven’s Gate technique, which allows 32-bit processes to execute 64-bit code on Windows x64 systems. 

The malware switches execution modes by modifying the CS (Code Segment) register, transitioning from 32-bit mode (0x23) to 64-bit mode (0x33) through instructions like “jmp far 0x33:{address}”.

The malware deploys multiple anti-analysis mechanisms to frustrate security researchers. It loads a duplicated ntdll.dll in memory, calling APIs from this copy rather than the original, making analysis significantly more complex. 

Default Ntdll.dll and the duplicated Ntdll.dll in memory

Additionally, FormBook encrypts over 100 key functions that are only decrypted during execution and immediately re-encrypted afterward, presenting substantial challenges for static analysis.

The malware actively detects virtualized environments by checking for blacklisted process names including “vmwareuser.exe,” “sandboxiedcomlaunch.exe,” “procmon.exe,” and “wireshark.exe”. 

It also examines usernames and execution paths for indicators of sandbox environments, such as directories containing “\cuckoo,” “\sandbox,” or “\aswsnx”.

Heaven’s Gate Invocation

Data Harvesting Capabilities

Once established, FormBook demonstrates extensive data harvesting capabilities, targeting credentials from major web browsers including Chrome, Firefox, Internet Explorer, and Edge. 

The malware executes SQL queries such as “SELECT origin_url, username_value, password_value FROM logins” against Chrome’s SQLite databases to extract stored credentials.

The malware maintains communication with 64 Command and Control (C2) domains that undergo multi-layered obfuscation, being encrypted, Base64-encoded, and encrypted again. 

Obtained credentials saved for Chrome

Through these C2 servers, FormBook can execute nine distinct control commands ranging from file execution and system updates to complete system shutdown.

Security firm Fortinet has confirmed that customers using FortiGuard’s Anti-Botnet Service, Web Filtering, IPS, and AntiVirus services are protected against this campaign. 

Organizations should implement comprehensive endpoint protection and maintain updated security solutions to defend against this evolving threat that continues to demonstrate the persistent danger of commodity malware services.

Try in-depth sandbox malware analysis for your SOC team. Get ANY.RUN special offer only until May 31 -> Try Here


文章来源: https://cybersecuritynews.com/formbook-malware-attacking-windows-users/
如有侵权请联系:admin#unsafe.sh