Analysis
-
max time kernel
128s -
max time network
127s -
platform
windows7_x64 -
resource
win7 -
submitted
22-10-2020 16:12
Static task
static1
Behavioral task
behavioral1
Sample
xl.png.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
xl.png.exe
Resource
win10v200722
windows10_x64
0 signatures
0 seconds
General
-
Target
xl.png.exe
-
Size
675KB
-
MD5
e122130010bcf147886f9d29a3c0b40d
-
SHA1
b65a0b20ec97040b929ebaca5ef5970e1017a3f5
-
SHA256
773f5e4bc9f8c4aac82f8cab8f416efe83f5a39735358301c6ca0559d61c8bf0
-
SHA512
a2f55b48fbc0eaa372d4db06b495236f05813c06cf2e31eecd12effae56806a2712be4c72119c518dab390487034b0ecff94f83047d3476d58d67bc24a1f7501
Score
10/10
Malware Config
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Executes dropped EXE 1 IoCs
pid Process 1968 WinHost32.exe -
Deletes itself 1 IoCs
pid Process 1992 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1496 xl.png.exe 1496 xl.png.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinHost32 = "C:\\Windows\\System32\\WinHost32.exe" xl.png.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\WinHost32.exe xl.png.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1496 xl.png.exe 1968 WinHost32.exe 1968 WinHost32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1496 wrote to memory of 1968 1496 xl.png.exe 25 PID 1496 wrote to memory of 1968 1496 xl.png.exe 25 PID 1496 wrote to memory of 1968 1496 xl.png.exe 25 PID 1496 wrote to memory of 1968 1496 xl.png.exe 25 PID 1496 wrote to memory of 1992 1496 xl.png.exe 26 PID 1496 wrote to memory of 1992 1496 xl.png.exe 26 PID 1496 wrote to memory of 1992 1496 xl.png.exe 26 PID 1496 wrote to memory of 1992 1496 xl.png.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\xl.png.exe"C:\Users\Admin\AppData\Local\Temp\xl.png.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\WinHost32.exeC:\Windows\System32\WinHost32.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1968
-
-
C:\Windows\SysWOW64\cmd.exe/c del C:\Users\Admin\AppData\Local\Temp\xl.png.exe >> NUL2⤵
- Deletes itself
PID:1992
-