Analysis
-
max time kernel
128s -
max time network
127s -
platform
windows7_x64 -
resource
win7 -
submitted
22-10-2020 16:12
Static task
static1
Behavioral task
behavioral1
Sample
xl.png.exe
Resource
win7
Behavioral task
behavioral2
Sample
xl.png.exe
Resource
win10v200722
General
-
Target
xl.png.exe
-
Size
675KB
-
MD5
e122130010bcf147886f9d29a3c0b40d
-
SHA1
b65a0b20ec97040b929ebaca5ef5970e1017a3f5
-
SHA256
773f5e4bc9f8c4aac82f8cab8f416efe83f5a39735358301c6ca0559d61c8bf0
-
SHA512
a2f55b48fbc0eaa372d4db06b495236f05813c06cf2e31eecd12effae56806a2712be4c72119c518dab390487034b0ecff94f83047d3476d58d67bc24a1f7501
Malware Config
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Executes dropped EXE 1 IoCs
Processes:
WinHost32.exepid process 1968 WinHost32.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1992 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
xl.png.exepid process 1496 xl.png.exe 1496 xl.png.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
xl.png.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinHost32 = "C:\\Windows\\System32\\WinHost32.exe" xl.png.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org -
Drops file in System32 directory 1 IoCs
Processes:
xl.png.exedescription ioc process File created C:\Windows\SysWOW64\WinHost32.exe xl.png.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
xl.png.exeWinHost32.exepid process 1496 xl.png.exe 1968 WinHost32.exe 1968 WinHost32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
xl.png.exedescription pid process target process PID 1496 wrote to memory of 1968 1496 xl.png.exe WinHost32.exe PID 1496 wrote to memory of 1968 1496 xl.png.exe WinHost32.exe PID 1496 wrote to memory of 1968 1496 xl.png.exe WinHost32.exe PID 1496 wrote to memory of 1968 1496 xl.png.exe WinHost32.exe PID 1496 wrote to memory of 1992 1496 xl.png.exe cmd.exe PID 1496 wrote to memory of 1992 1496 xl.png.exe cmd.exe PID 1496 wrote to memory of 1992 1496 xl.png.exe cmd.exe PID 1496 wrote to memory of 1992 1496 xl.png.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\xl.png.exe"C:\Users\Admin\AppData\Local\Temp\xl.png.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\WinHost32.exeC:\Windows\System32\WinHost32.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1968
-
-
C:\Windows\SysWOW64\cmd.exe/c del C:\Users\Admin\AppData\Local\Temp\xl.png.exe >> NUL2⤵
- Deletes itself
PID:1992
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
e122130010bcf147886f9d29a3c0b40d
SHA1b65a0b20ec97040b929ebaca5ef5970e1017a3f5
SHA256773f5e4bc9f8c4aac82f8cab8f416efe83f5a39735358301c6ca0559d61c8bf0
SHA512a2f55b48fbc0eaa372d4db06b495236f05813c06cf2e31eecd12effae56806a2712be4c72119c518dab390487034b0ecff94f83047d3476d58d67bc24a1f7501
-
MD5
e122130010bcf147886f9d29a3c0b40d
SHA1b65a0b20ec97040b929ebaca5ef5970e1017a3f5
SHA256773f5e4bc9f8c4aac82f8cab8f416efe83f5a39735358301c6ca0559d61c8bf0
SHA512a2f55b48fbc0eaa372d4db06b495236f05813c06cf2e31eecd12effae56806a2712be4c72119c518dab390487034b0ecff94f83047d3476d58d67bc24a1f7501
-
MD5
e122130010bcf147886f9d29a3c0b40d
SHA1b65a0b20ec97040b929ebaca5ef5970e1017a3f5
SHA256773f5e4bc9f8c4aac82f8cab8f416efe83f5a39735358301c6ca0559d61c8bf0
SHA512a2f55b48fbc0eaa372d4db06b495236f05813c06cf2e31eecd12effae56806a2712be4c72119c518dab390487034b0ecff94f83047d3476d58d67bc24a1f7501