Overview
overview
10Static
static
3EPDA - MT ...NE.exe
windows7-x64
10EPDA - MT ...NE.exe
windows10-2004-x64
10$APPDATA/E...PS.dll
windows7-x64
1$APPDATA/E...PS.dll
windows10-2004-x64
1$APPDATA/E...60.dll
windows7-x64
1$APPDATA/E...60.dll
windows10-2004-x64
1$APPDATA/E...60.dll
windows7-x64
1$APPDATA/E...60.dll
windows10-2004-x64
1$APPDATA/E...ib.dll
windows7-x64
1$APPDATA/E...ib.dll
windows10-2004-x64
1$APPDATA/E...ct.dll
windows7-x64
1$APPDATA/E...ct.dll
windows10-2004-x64
1$APPDATA/E...lp.dll
windows7-x64
1$APPDATA/E...lp.dll
windows10-2004-x64
1$APPDATA/E...ti.dll
windows7-x64
3$APPDATA/E...ti.dll
windows10-2004-x64
3$APPDATA/E...rc.dll
windows7-x64
3$APPDATA/E...rc.dll
windows10-2004-x64
3$TEMP/Selfsupport.dll
windows7-x64
3$TEMP/Selfsupport.dll
windows10-2004-x64
3Analysis
-
max time kernel
11s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
29/07/2024, 23:32
Static task
static1
Behavioral task
behavioral1
Sample
EPDA - MT ALPHA MARINE.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
EPDA - MT ALPHA MARINE.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$APPDATA/Events/2.COMServerPS.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$APPDATA/Events/2.COMServerPS.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$APPDATA/Events/41.opends60.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$APPDATA/Events/41.opends60.dll
Resource
win10v2004-20240729-en
Behavioral task
behavioral7
Sample
$APPDATA/Events/82.opends60.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$APPDATA/Events/82.opends60.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
$APPDATA/Events/Interop.BankObjectsLib.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$APPDATA/Events/Interop.BankObjectsLib.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$APPDATA/Events/MicrosoftVisualStudioVCProject.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
$APPDATA/Events/MicrosoftVisualStudioVCProject.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
$APPDATA/Events/MicrosoftVisualStudioVSHelp.dll
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
$APPDATA/Events/MicrosoftVisualStudioVSHelp.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
$APPDATA/Events/rcxdti.dll
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
$APPDATA/Events/rcxdti.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
$APPDATA/Events/sbsmscorrc.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
$APPDATA/Events/sbsmscorrc.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
$TEMP/Selfsupport.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
$TEMP/Selfsupport.dll
Resource
win10v2004-20240709-en
General
-
Target
EPDA - MT ALPHA MARINE.exe
-
Size
362KB
-
MD5
a235c71c9675b191d6ca449b905501c6
-
SHA1
b0bf8fde00073a0dc5e91416223907954065b250
-
SHA256
d789a675b16eca7a3d78fffd03d6dfc18a396d6eac4da2472b99700ff1cb09c7
-
SHA512
e24c60be0a58ef0f7ee8413aa245a7752e5a2c8159c571946fad1a6144b8404e003c21801dc4bbc56b8ff91377a87e6e894c5082b612f974bcb3de4d91d3887d
-
SSDEEP
6144:LPCganNe8wDejU1TWATT5MLgCH6NFafy8/0zh2IfyPI3CcoGkEoQAgjITMZyoECP:5anUtDJxuLgNNF4CVDDoUTjITM8oEP8d
Malware Config
Extracted
formbook
4.1
xla
v-jig.com
uniplaceservices.com
yolovely.com
demonoscarclub.com
jayanthallumalla.com
ngonclub.biz
mckendreedesign.com
acesandeightsdj.info
740manbetx.com
yiwulewo.com
wcc.ink
fkkha.info
btnij.com
pharmacyinfinitedata.com
marakez.online
sgpcrm.com
archive-fast-quick.date
akproductionstudio.studio
bfbrjgw.com
fjshuguan.com
zhuoyu-china.com
forumlingerie.com
gifplatform.com
vitelstars-pasangan.site
vbmsy.info
selmaspa.net
gardenorr.net
flight.ltd
yaredaijifeng.com
deepscanner.net
bridgeandbroadcast.com
picare247.com
worldlovepoem.net
keppkn.com
jikueyvoutpeeping.review
cgultkd.com
lqbus.com
hotelssydney.online
nodirectionrocks.com
existential.world
pacenet.healthcare
louisvoyage.com
netbankkontol.com
360vrcommunity.com
23northgroup.com
islom-karimov.site
weirucheng.com
izzhome.com
photozil.com
iexmyf.info
caperecifemusicfestival.com
art-yoshidamachi.com
whoperty.com
breakmyheart.supply
brasserielebistro.com
suizku.com
academywrap.com
shsn69.com
brookeforgovernor.com
charlestonmetrohouses.com
brenneraccounting.net
fulewang.net
saludarailtrail.com
start.lease
lodipytu.com
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/2944-26-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral2/memory/2944-29-0x0000000000400000-0x000000000042D000-memory.dmp formbook -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EPDA - MT ALPHA MARINE.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\EPDA - MT ALPHA MARINE.exe"C:\Users\Admin\AppData\Local\Temp\EPDA - MT ALPHA MARINE.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3696 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe Selfsupport,Pretor2⤵PID:2924
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵PID:2944
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"1⤵PID:1848
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\cmd.exe"2⤵PID:1984
-
-
C:\Windows\SysWOW64\cmd.exe/c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V2⤵PID:3144
-
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"2⤵PID:4480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
263KB
MD58ec7b1bfb4976965a8ab0ba5bd1a5e18
SHA190cab5f90f4b4fed140e9257a607ac9318c37637
SHA256a39e1d7774b9c6fa0fbabfa28cae73a16a447860a596c97726775c7eed02b739
SHA512affe5cd5850a6d53706d56fa23b03582daa74bb8a1cd6f06c86f5f7be9420730c2e5813350d422ee25854484b167897b8baf1a66b508719167235234d42715d3
-
Filesize
18KB
MD550de2e131866324be8cc223b161a3f1a
SHA1a3333c5982d50aa729f1d0c0768b06f811ec3fe5
SHA256f9000f92fd7830c61c8c9ac035c47544b678a78c9b90125a922087bc86d1dab2
SHA512776a8789508153881b3050e5cbcdbcc507f06dde646a65c65b5bc40857ac8757100002d329f28467d5e79ab1986aefbd3d0968a9136b5efece4246766fea251a
-
Filesize
872B
MD5bbc41c78bae6c71e63cb544a6a284d94
SHA133f2c1d9fa0e9c99b80bc2500621e95af38b1f9a
SHA256ee83c6bcea9353c74bfc0a7e739f3c4a765ace894470e09cdcdebba700b8d4cb
SHA5120aea424b57adae3e14ad6491cab585f554b4dffe601b5a17bad6ee6177d2f0f995e419cde576e2d1782b9bddc0661aada11a2c9f1454ae625d9e3223635ec9f4