Analysis
-
max time kernel
49s -
max time network
134s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
22-10-2020 16:12
Static task
static1
Behavioral task
behavioral1
Sample
xl.png.exe
Resource
win7
Behavioral task
behavioral2
Sample
xl.png.exe
Resource
win10v200722
General
-
Target
xl.png.exe
-
Size
675KB
-
MD5
e122130010bcf147886f9d29a3c0b40d
-
SHA1
b65a0b20ec97040b929ebaca5ef5970e1017a3f5
-
SHA256
773f5e4bc9f8c4aac82f8cab8f416efe83f5a39735358301c6ca0559d61c8bf0
-
SHA512
a2f55b48fbc0eaa372d4db06b495236f05813c06cf2e31eecd12effae56806a2712be4c72119c518dab390487034b0ecff94f83047d3476d58d67bc24a1f7501
Malware Config
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Executes dropped EXE 1 IoCs
Processes:
WinHost32.exepid process 2664 WinHost32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
xl.png.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinHost32 = "C:\\Windows\\System32\\WinHost32.exe" xl.png.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 13 api.ipify.org -
Drops file in System32 directory 1 IoCs
Processes:
xl.png.exedescription ioc process File created C:\Windows\SysWOW64\WinHost32.exe xl.png.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
xl.png.exeWinHost32.exepid process 788 xl.png.exe 788 xl.png.exe 2664 WinHost32.exe 2664 WinHost32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
xl.png.exedescription pid process target process PID 788 wrote to memory of 2664 788 xl.png.exe WinHost32.exe PID 788 wrote to memory of 2664 788 xl.png.exe WinHost32.exe PID 788 wrote to memory of 2664 788 xl.png.exe WinHost32.exe PID 788 wrote to memory of 2764 788 xl.png.exe cmd.exe PID 788 wrote to memory of 2764 788 xl.png.exe cmd.exe PID 788 wrote to memory of 2764 788 xl.png.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\xl.png.exe"C:\Users\Admin\AppData\Local\Temp\xl.png.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\SysWOW64\WinHost32.exeC:\Windows\System32\WinHost32.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2664
-
-
C:\Windows\SysWOW64\cmd.exe/c del C:\Users\Admin\AppData\Local\Temp\xl.png.exe >> NUL2⤵PID:2764
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
e122130010bcf147886f9d29a3c0b40d
SHA1b65a0b20ec97040b929ebaca5ef5970e1017a3f5
SHA256773f5e4bc9f8c4aac82f8cab8f416efe83f5a39735358301c6ca0559d61c8bf0
SHA512a2f55b48fbc0eaa372d4db06b495236f05813c06cf2e31eecd12effae56806a2712be4c72119c518dab390487034b0ecff94f83047d3476d58d67bc24a1f7501
-
MD5
e122130010bcf147886f9d29a3c0b40d
SHA1b65a0b20ec97040b929ebaca5ef5970e1017a3f5
SHA256773f5e4bc9f8c4aac82f8cab8f416efe83f5a39735358301c6ca0559d61c8bf0
SHA512a2f55b48fbc0eaa372d4db06b495236f05813c06cf2e31eecd12effae56806a2712be4c72119c518dab390487034b0ecff94f83047d3476d58d67bc24a1f7501