Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
14-01-2021 20:23
Static task
static1
Behavioral task
behavioral1
Sample
inss.exe
Resource
win7v20201028
General
-
Target
inss.exe
-
Size
312KB
-
MD5
b6261a6fd212f3fff1ee509c5b26ea43
-
SHA1
a9039586f41a042625ebe7609cb6802204d3f3a8
-
SHA256
02cd99f8d843c4c63d55b4bebe044e5205e81f31ad36af77b9a99734c074f0a8
-
SHA512
99f9032a300fb95c8f959d815df42255f2b15c516ddd494158cdef6293023bf53e9c78dcbd2244be9732a0da6dcaa38ddf16da1e8a64ec0f1b893f4b6f4dfa83
Malware Config
Extracted
formbook
http://www.besthandstool.icu/uds2/
hrrecruitertraining.com
pancakeroll.club
equiposddl.com
fab-9corporation.com
seanformo.com
fisika-uinam.com
cheeseburgerpasta.com
cherylkarlfineartist.com
wunderprodukte.net
3912699.com
sanitizyo.com
856381190.xyz
aprobet42.xyz
knutsfastigheter.com
disalvospizzaitalian.com
energysavingsolarpower.com
oldwonderful.com
se32688.com
samkecollection.com
colegioreynosa.com
choujiushui.com
njxgwxzx.com
bairdexotics.com
concur.design
terrenosenofertaqueretaro.com
demenageseul.com
blvdabbey.com
asghargloves.com
livesoft.xyz
dropdevil.com
goldenhills-serpong.com
haxb33.xyz
splendid-nail.com
indisburse.com
indianapolishousepainter.com
seak.xyz
prohealth.today
claudiarecom.com
mariemenor.com
surethingdesigns.com
musesgirl.com
hackmaninsurance.com
partut.com
smokeflake.com
conhecimentovivo.science
animalbiologics.com
spontaneoushomeschooler.com
thedailytrack.com
zerofive100.com
cyberfoxbat.com
thepassvacation.com
worldagroecologyalliance.com
qsnlnntxg.icu
destinationssc.com
transparentnutritions.com
millcreekimports.com
cptdesignstudio.com
isaacphotorestoration.com
daxuangou.com
redgumhomestead.com
comsodigital.com
sxweilan.com
andrewsreadingjournal.com
matchmakergenetics.com
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2480-2-0x00000000007B0000-0x00000000007DE000-memory.dmp formbook behavioral2/memory/2480-3-0x00000000007CEDA0-mapping.dmp formbook behavioral2/memory/3716-6-0x0000000000000000-mapping.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
inss.exeinss.execontrol.exedescription pid process target process PID 732 set thread context of 2480 732 inss.exe inss.exe PID 2480 set thread context of 2968 2480 inss.exe Explorer.EXE PID 3716 set thread context of 2968 3716 control.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 60 IoCs
Processes:
inss.execontrol.exepid process 2480 inss.exe 2480 inss.exe 2480 inss.exe 2480 inss.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe 3716 control.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
inss.exeinss.execontrol.exepid process 732 inss.exe 732 inss.exe 2480 inss.exe 2480 inss.exe 2480 inss.exe 3716 control.exe 3716 control.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
inss.execontrol.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 2480 inss.exe Token: SeDebugPrivilege 3716 control.exe Token: SeShutdownPrivilege 2968 Explorer.EXE Token: SeCreatePagefilePrivilege 2968 Explorer.EXE Token: SeShutdownPrivilege 2968 Explorer.EXE Token: SeCreatePagefilePrivilege 2968 Explorer.EXE Token: SeShutdownPrivilege 2968 Explorer.EXE Token: SeCreatePagefilePrivilege 2968 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 2968 Explorer.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
inss.exeExplorer.EXEcontrol.exedescription pid process target process PID 732 wrote to memory of 2480 732 inss.exe inss.exe PID 732 wrote to memory of 2480 732 inss.exe inss.exe PID 732 wrote to memory of 2480 732 inss.exe inss.exe PID 732 wrote to memory of 2480 732 inss.exe inss.exe PID 2968 wrote to memory of 3716 2968 Explorer.EXE control.exe PID 2968 wrote to memory of 3716 2968 Explorer.EXE control.exe PID 2968 wrote to memory of 3716 2968 Explorer.EXE control.exe PID 3716 wrote to memory of 508 3716 control.exe cmd.exe PID 3716 wrote to memory of 508 3716 control.exe cmd.exe PID 3716 wrote to memory of 508 3716 control.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\inss.exe"C:\Users\Admin\AppData\Local\Temp\inss.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\inss.exe"C:\Users\Admin\AppData\Local\Temp\inss.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\inss.exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/508-9-0x0000000000000000-mapping.dmp
-
memory/2480-2-0x00000000007B0000-0x00000000007DE000-memory.dmpFilesize
184KB
-
memory/2480-3-0x00000000007CEDA0-mapping.dmp
-
memory/3716-6-0x0000000000000000-mapping.dmp
-
memory/3716-7-0x0000000000C50000-0x0000000000C70000-memory.dmpFilesize
128KB
-
memory/3716-8-0x0000000000C50000-0x0000000000C70000-memory.dmpFilesize
128KB
-
memory/3716-10-0x00000000052C0000-0x00000000053A2000-memory.dmpFilesize
904KB