Analysis

  • max time kernel
    127s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    14-10-2020 17:01

General

  • Target

    han.exe

  • Size

    500KB

  • MD5

    e8a8c90d7da67da7ee790e9e49127cf7

  • SHA1

    65731d02a9a9899b1ee72e822d3dab2129fffa9a

  • SHA256

    f4427ef6b665bf0563f23fde314caf9f905ab1e049fc5c0b33384d526ec3cbf1

  • SHA512

    aa0c0cb8aa0d6864da79cee8e14c3dd70d320d42ca19b999be34a243416011aea3fb9b02a10b860234dde7abfaef6ef4fca704233258beb1b182fb0c043fb9a3

Malware Config

Signatures

  • Hancitor

    Hancitor is downloader used to deliver other malware families.

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\han.exe
    "C:\Users\Admin\AppData\Local\Temp\han.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:616
    • C:\Windows\SysWOW64\WinHost32.exe
      C:\Windows\System32\WinHost32.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1836
    • C:\Windows\SysWOW64\cmd.exe
      /c del C:\Users\Admin\AppData\Local\Temp\han.exe >> NUL
      2⤵
      • Deletes itself
      PID:1788

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1932-5-0x000007FEF7090000-0x000007FEF730A000-memory.dmp

    Filesize

    2.5MB