Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 11:35
Static task
static1
Behavioral task
behavioral1
Sample
Creative Artists Agency.exe
Resource
win7-20240903-en
General
-
Target
Creative Artists Agency.exe
-
Size
675KB
-
MD5
aaa655302b6609a7b315fa61817de31d
-
SHA1
ac8d992f82e2b959c12e570eafef8e8ad751fe80
-
SHA256
e3b137b034830c5189138a584ad99c6710a65e30d94779c92a1610c3d7de97ad
-
SHA512
fdc0b8163622b9471b44857cbf791e25e142ad1dbe9e56d3ca8bc994d33dc8069abf0c244f84c0153182de52415a95c636cd0a2384d98b6cc9d6244cba6186cc
-
SSDEEP
12288:Gqux1UoIG5MPUXaewhSi2FWMTaiPNhkl5Wq2xChiss1dVxunRgjcbGq965c:gUobysaewhSi4TNPNhkl59WChNCBugj8
Malware Config
Extracted
formbook
4.1
j01s
ransportationmtsmtpro.top
v-camper-motorhomes-77740.bond
vrepairmumbai.shop
hocosmooth.xyz
etirementplanning01.today
ompralojaonline.shop
ransportationmpmptpro.top
hehomeownermanuel.info
oppr.fit
ilmynadin.cfd
ontrol-bipolar-treatments.club
eorge-saaab.buzz
ose-ferrer.online
16au612ch.bond
y0015.net
ksdnhe58w.top
epression-treatment-75701.bond
illagin.shop
xahf.top
vzpbty.buzz
ussian-dating-17781.bond
eogiue.shop
azorlabs.xyz
indow-replacement-54906.bond
remiumcart.cloud
ep-km.online
90kw81ii.bond
ucas-paaab.buzz
3syt.shop
mions.tokyo
76yakindikasihtau.click
mpteamtoto88.xyz
redit-wsp.top
bh278.fun
dcvrt.xyz
rtistictrendx.shop
hoenixnest.cyou
ealthcare-software-22427.bond
echvenus.xyz
zcwe3f.live
20px796kn.autos
dapp9.xyz
kwhtcwa.shop
km8m.shop
lanet.ventures
ayawaya.win
athroom-remodeling-83696.bond
amra-capital.net
entalimplantscheap2.bond
galax.net
wsnpzrkreg9.asia
88413.xyz
ohbeauty-thai.online
t026.xyz
ebastian-seitz.allfinanz
avada-ga-34.press
herosefoundationusa.net
rbestbeauty.online
4d0c7.digital
ndiechannels.xyz
4nr9.shop
lussales.live
ijang.click
ankguard.shop
sfsd.digital
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/3296-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3296-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1048-23-0x00000000004D0000-0x00000000004FF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 404 set thread context of 3296 404 Creative Artists Agency.exe 95 PID 3296 set thread context of 3476 3296 Creative Artists Agency.exe 56 PID 1048 set thread context of 3476 1048 rundll32.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Creative Artists Agency.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 404 Creative Artists Agency.exe 404 Creative Artists Agency.exe 404 Creative Artists Agency.exe 404 Creative Artists Agency.exe 3296 Creative Artists Agency.exe 3296 Creative Artists Agency.exe 3296 Creative Artists Agency.exe 3296 Creative Artists Agency.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3296 Creative Artists Agency.exe 3296 Creative Artists Agency.exe 3296 Creative Artists Agency.exe 1048 rundll32.exe 1048 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 404 Creative Artists Agency.exe Token: SeDebugPrivilege 3296 Creative Artists Agency.exe Token: SeDebugPrivilege 1048 rundll32.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3476 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 404 wrote to memory of 1836 404 Creative Artists Agency.exe 94 PID 404 wrote to memory of 1836 404 Creative Artists Agency.exe 94 PID 404 wrote to memory of 1836 404 Creative Artists Agency.exe 94 PID 404 wrote to memory of 3296 404 Creative Artists Agency.exe 95 PID 404 wrote to memory of 3296 404 Creative Artists Agency.exe 95 PID 404 wrote to memory of 3296 404 Creative Artists Agency.exe 95 PID 404 wrote to memory of 3296 404 Creative Artists Agency.exe 95 PID 404 wrote to memory of 3296 404 Creative Artists Agency.exe 95 PID 404 wrote to memory of 3296 404 Creative Artists Agency.exe 95 PID 3476 wrote to memory of 1048 3476 Explorer.EXE 101 PID 3476 wrote to memory of 1048 3476 Explorer.EXE 101 PID 3476 wrote to memory of 1048 3476 Explorer.EXE 101 PID 1048 wrote to memory of 2016 1048 rundll32.exe 102 PID 1048 wrote to memory of 2016 1048 rundll32.exe 102 PID 1048 wrote to memory of 2016 1048 rundll32.exe 102
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\Creative Artists Agency.exe"C:\Users\Admin\AppData\Local\Temp\Creative Artists Agency.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Local\Temp\Creative Artists Agency.exe"C:\Users\Admin\AppData\Local\Temp\Creative Artists Agency.exe"3⤵PID:1836
-
-
C:\Users\Admin\AppData\Local\Temp\Creative Artists Agency.exe"C:\Users\Admin\AppData\Local\Temp\Creative Artists Agency.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3296
-
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:832
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:4568
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2768
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:3468
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:3428
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Creative Artists Agency.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2016
-
-