Analysis
-
max time kernel
127s -
max time network
126s -
platform
windows7_x64 -
resource
win7 -
submitted
14-10-2020 17:01
Static task
static1
Behavioral task
behavioral1
Sample
han.exe
Resource
win7
Behavioral task
behavioral2
Sample
han.exe
Resource
win10v200722
General
-
Target
han.exe
-
Size
500KB
-
MD5
e8a8c90d7da67da7ee790e9e49127cf7
-
SHA1
65731d02a9a9899b1ee72e822d3dab2129fffa9a
-
SHA256
f4427ef6b665bf0563f23fde314caf9f905ab1e049fc5c0b33384d526ec3cbf1
-
SHA512
aa0c0cb8aa0d6864da79cee8e14c3dd70d320d42ca19b999be34a243416011aea3fb9b02a10b860234dde7abfaef6ef4fca704233258beb1b182fb0c043fb9a3
Malware Config
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Executes dropped EXE 1 IoCs
Processes:
WinHost32.exepid process 1836 WinHost32.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1788 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
han.exepid process 616 han.exe 616 han.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
han.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinHost32 = "C:\\Windows\\System32\\WinHost32.exe" han.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org -
Drops file in System32 directory 1 IoCs
Processes:
han.exedescription ioc process File created C:\Windows\SysWOW64\WinHost32.exe han.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
han.exeWinHost32.exepid process 616 han.exe 1836 WinHost32.exe 1836 WinHost32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
han.exedescription pid process target process PID 616 wrote to memory of 1836 616 han.exe WinHost32.exe PID 616 wrote to memory of 1836 616 han.exe WinHost32.exe PID 616 wrote to memory of 1836 616 han.exe WinHost32.exe PID 616 wrote to memory of 1836 616 han.exe WinHost32.exe PID 616 wrote to memory of 1788 616 han.exe cmd.exe PID 616 wrote to memory of 1788 616 han.exe cmd.exe PID 616 wrote to memory of 1788 616 han.exe cmd.exe PID 616 wrote to memory of 1788 616 han.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\han.exe"C:\Users\Admin\AppData\Local\Temp\han.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\SysWOW64\WinHost32.exeC:\Windows\System32\WinHost32.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1836
-
-
C:\Windows\SysWOW64\cmd.exe/c del C:\Users\Admin\AppData\Local\Temp\han.exe >> NUL2⤵
- Deletes itself
PID:1788
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
e8a8c90d7da67da7ee790e9e49127cf7
SHA165731d02a9a9899b1ee72e822d3dab2129fffa9a
SHA256f4427ef6b665bf0563f23fde314caf9f905ab1e049fc5c0b33384d526ec3cbf1
SHA512aa0c0cb8aa0d6864da79cee8e14c3dd70d320d42ca19b999be34a243416011aea3fb9b02a10b860234dde7abfaef6ef4fca704233258beb1b182fb0c043fb9a3
-
MD5
e8a8c90d7da67da7ee790e9e49127cf7
SHA165731d02a9a9899b1ee72e822d3dab2129fffa9a
SHA256f4427ef6b665bf0563f23fde314caf9f905ab1e049fc5c0b33384d526ec3cbf1
SHA512aa0c0cb8aa0d6864da79cee8e14c3dd70d320d42ca19b999be34a243416011aea3fb9b02a10b860234dde7abfaef6ef4fca704233258beb1b182fb0c043fb9a3
-
MD5
e8a8c90d7da67da7ee790e9e49127cf7
SHA165731d02a9a9899b1ee72e822d3dab2129fffa9a
SHA256f4427ef6b665bf0563f23fde314caf9f905ab1e049fc5c0b33384d526ec3cbf1
SHA512aa0c0cb8aa0d6864da79cee8e14c3dd70d320d42ca19b999be34a243416011aea3fb9b02a10b860234dde7abfaef6ef4fca704233258beb1b182fb0c043fb9a3