Analysis

  • max time kernel
    11s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/07/2024, 23:32

General

  • Target

    EPDA - MT ALPHA MARINE.exe

  • Size

    362KB

  • MD5

    a235c71c9675b191d6ca449b905501c6

  • SHA1

    b0bf8fde00073a0dc5e91416223907954065b250

  • SHA256

    d789a675b16eca7a3d78fffd03d6dfc18a396d6eac4da2472b99700ff1cb09c7

  • SHA512

    e24c60be0a58ef0f7ee8413aa245a7752e5a2c8159c571946fad1a6144b8404e003c21801dc4bbc56b8ff91377a87e6e894c5082b612f974bcb3de4d91d3887d

  • SSDEEP

    6144:LPCganNe8wDejU1TWATT5MLgCH6NFafy8/0zh2IfyPI3CcoGkEoQAgjITMZyoECP:5anUtDJxuLgNNF4CVDDoUTjITM8oEP8d

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

xla

Decoy

v-jig.com

uniplaceservices.com

yolovely.com

demonoscarclub.com

jayanthallumalla.com

ngonclub.biz

mckendreedesign.com

acesandeightsdj.info

740manbetx.com

yiwulewo.com

wcc.ink

fkkha.info

btnij.com

pharmacyinfinitedata.com

marakez.online

sgpcrm.com

archive-fast-quick.date

akproductionstudio.studio

bfbrjgw.com

fjshuguan.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Formbook payload 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\EPDA - MT ALPHA MARINE.exe
    "C:\Users\Admin\AppData\Local\Temp\EPDA - MT ALPHA MARINE.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3696
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe Selfsupport,Pretor
      2⤵
        PID:2924
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe"
          3⤵
            PID:2944
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\SysWOW64\cmd.exe"
        1⤵
          PID:1848
          • C:\Windows\SysWOW64\cmd.exe
            /c del "C:\Windows\SysWOW64\cmd.exe"
            2⤵
              PID:1984
            • C:\Windows\SysWOW64\cmd.exe
              /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
              2⤵
                PID:3144
              • C:\Program Files\Mozilla Firefox\Firefox.exe
                "C:\Program Files\Mozilla Firefox\Firefox.exe"
                2⤵
                  PID:4480

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\DB1

                Filesize

                40KB

                MD5

                a182561a527f929489bf4b8f74f65cd7

                SHA1

                8cd6866594759711ea1836e86a5b7ca64ee8911f

                SHA256

                42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                SHA512

                9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

              • C:\Users\Admin\AppData\Local\Temp\Makimono

                Filesize

                263KB

                MD5

                8ec7b1bfb4976965a8ab0ba5bd1a5e18

                SHA1

                90cab5f90f4b4fed140e9257a607ac9318c37637

                SHA256

                a39e1d7774b9c6fa0fbabfa28cae73a16a447860a596c97726775c7eed02b739

                SHA512

                affe5cd5850a6d53706d56fa23b03582daa74bb8a1cd6f06c86f5f7be9420730c2e5813350d422ee25854484b167897b8baf1a66b508719167235234d42715d3

              • C:\Users\Admin\AppData\Local\Temp\Selfsupport.DLL

                Filesize

                18KB

                MD5

                50de2e131866324be8cc223b161a3f1a

                SHA1

                a3333c5982d50aa729f1d0c0768b06f811ec3fe5

                SHA256

                f9000f92fd7830c61c8c9ac035c47544b678a78c9b90125a922087bc86d1dab2

                SHA512

                776a8789508153881b3050e5cbcdbcc507f06dde646a65c65b5bc40857ac8757100002d329f28467d5e79ab1986aefbd3d0968a9136b5efece4246766fea251a

              • C:\Users\Admin\AppData\Roaming\1PN6T280\1PNlogrv.ini

                Filesize

                872B

                MD5

                bbc41c78bae6c71e63cb544a6a284d94

                SHA1

                33f2c1d9fa0e9c99b80bc2500621e95af38b1f9a

                SHA256

                ee83c6bcea9353c74bfc0a7e739f3c4a765ace894470e09cdcdebba700b8d4cb

                SHA512

                0aea424b57adae3e14ad6491cab585f554b4dffe601b5a17bad6ee6177d2f0f995e419cde576e2d1782b9bddc0661aada11a2c9f1454ae625d9e3223635ec9f4

              • memory/1848-28-0x0000000000540000-0x000000000059A000-memory.dmp

                Filesize

                360KB

              • memory/1848-30-0x0000000000540000-0x000000000059A000-memory.dmp

                Filesize

                360KB

              • memory/2924-21-0x00000000746C0000-0x0000000074788000-memory.dmp

                Filesize

                800KB

              • memory/2924-24-0x00000000746C0000-0x0000000074788000-memory.dmp

                Filesize

                800KB

              • memory/2924-22-0x0000000077080000-0x00000000770E3000-memory.dmp

                Filesize

                396KB

              • memory/2924-20-0x00000000010D0000-0x00000000010D2000-memory.dmp

                Filesize

                8KB

              • memory/2944-26-0x0000000000400000-0x000000000042D000-memory.dmp

                Filesize

                180KB

              • memory/2944-23-0x0000000000780000-0x0000000000786000-memory.dmp

                Filesize

                24KB

              • memory/2944-29-0x0000000000400000-0x000000000042D000-memory.dmp

                Filesize

                180KB

              • memory/3596-32-0x0000000008520000-0x000000000868A000-memory.dmp

                Filesize

                1.4MB