Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
14-01-2021 20:23
Static task
static1
Behavioral task
behavioral1
Sample
inss.exe
Resource
win7v20201028
General
-
Target
inss.exe
-
Size
312KB
-
MD5
b6261a6fd212f3fff1ee509c5b26ea43
-
SHA1
a9039586f41a042625ebe7609cb6802204d3f3a8
-
SHA256
02cd99f8d843c4c63d55b4bebe044e5205e81f31ad36af77b9a99734c074f0a8
-
SHA512
99f9032a300fb95c8f959d815df42255f2b15c516ddd494158cdef6293023bf53e9c78dcbd2244be9732a0da6dcaa38ddf16da1e8a64ec0f1b893f4b6f4dfa83
Malware Config
Extracted
formbook
http://www.besthandstool.icu/uds2/
hrrecruitertraining.com
pancakeroll.club
equiposddl.com
fab-9corporation.com
seanformo.com
fisika-uinam.com
cheeseburgerpasta.com
cherylkarlfineartist.com
wunderprodukte.net
3912699.com
sanitizyo.com
856381190.xyz
aprobet42.xyz
knutsfastigheter.com
disalvospizzaitalian.com
energysavingsolarpower.com
oldwonderful.com
se32688.com
samkecollection.com
colegioreynosa.com
choujiushui.com
njxgwxzx.com
bairdexotics.com
concur.design
terrenosenofertaqueretaro.com
demenageseul.com
blvdabbey.com
asghargloves.com
livesoft.xyz
dropdevil.com
goldenhills-serpong.com
haxb33.xyz
splendid-nail.com
indisburse.com
indianapolishousepainter.com
seak.xyz
prohealth.today
claudiarecom.com
mariemenor.com
surethingdesigns.com
musesgirl.com
hackmaninsurance.com
partut.com
smokeflake.com
conhecimentovivo.science
animalbiologics.com
spontaneoushomeschooler.com
thedailytrack.com
zerofive100.com
cyberfoxbat.com
thepassvacation.com
worldagroecologyalliance.com
qsnlnntxg.icu
destinationssc.com
transparentnutritions.com
millcreekimports.com
cptdesignstudio.com
isaacphotorestoration.com
daxuangou.com
redgumhomestead.com
comsodigital.com
sxweilan.com
andrewsreadingjournal.com
matchmakergenetics.com
Signatures
-
Formbook Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1988-2-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1080-4-0x00000000002E0000-0x0000000000305000-memory.dmp formbook behavioral1/memory/1988-3-0x000000000041EDA0-mapping.dmp formbook behavioral1/memory/1704-5-0x0000000000000000-mapping.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1628 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
inss.exeinss.exeexplorer.exedescription pid process target process PID 1080 set thread context of 1988 1080 inss.exe inss.exe PID 1988 set thread context of 1256 1988 inss.exe Explorer.EXE PID 1988 set thread context of 1256 1988 inss.exe Explorer.EXE PID 1704 set thread context of 1256 1704 explorer.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
inss.exeexplorer.exepid process 1988 inss.exe 1988 inss.exe 1988 inss.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
inss.exeinss.exeexplorer.exepid process 1080 inss.exe 1988 inss.exe 1988 inss.exe 1988 inss.exe 1988 inss.exe 1704 explorer.exe 1704 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
inss.exeexplorer.exedescription pid process Token: SeDebugPrivilege 1988 inss.exe Token: SeDebugPrivilege 1704 explorer.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1256 Explorer.EXE 1256 Explorer.EXE 1256 Explorer.EXE 1256 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1256 Explorer.EXE 1256 Explorer.EXE 1256 Explorer.EXE 1256 Explorer.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
inss.exeExplorer.EXEexplorer.exedescription pid process target process PID 1080 wrote to memory of 1988 1080 inss.exe inss.exe PID 1080 wrote to memory of 1988 1080 inss.exe inss.exe PID 1080 wrote to memory of 1988 1080 inss.exe inss.exe PID 1080 wrote to memory of 1988 1080 inss.exe inss.exe PID 1080 wrote to memory of 1988 1080 inss.exe inss.exe PID 1256 wrote to memory of 1704 1256 Explorer.EXE explorer.exe PID 1256 wrote to memory of 1704 1256 Explorer.EXE explorer.exe PID 1256 wrote to memory of 1704 1256 Explorer.EXE explorer.exe PID 1256 wrote to memory of 1704 1256 Explorer.EXE explorer.exe PID 1704 wrote to memory of 1628 1704 explorer.exe cmd.exe PID 1704 wrote to memory of 1628 1704 explorer.exe cmd.exe PID 1704 wrote to memory of 1628 1704 explorer.exe cmd.exe PID 1704 wrote to memory of 1628 1704 explorer.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\inss.exe"C:\Users\Admin\AppData\Local\Temp\inss.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\inss.exe"C:\Users\Admin\AppData\Local\Temp\inss.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\inss.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/600-9-0x000007FEF6930000-0x000007FEF6BAA000-memory.dmpFilesize
2.5MB
-
memory/1080-4-0x00000000002E0000-0x0000000000305000-memory.dmpFilesize
148KB
-
memory/1628-7-0x0000000000000000-mapping.dmp
-
memory/1704-5-0x0000000000000000-mapping.dmp
-
memory/1704-6-0x0000000000D60000-0x0000000000FE1000-memory.dmpFilesize
2.5MB
-
memory/1704-8-0x0000000000AC0000-0x0000000000B70000-memory.dmpFilesize
704KB
-
memory/1988-2-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1988-3-0x000000000041EDA0-mapping.dmp