Analysis
-
max time kernel
49s -
max time network
134s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
22/10/2020, 16:12
Static task
static1
Behavioral task
behavioral1
Sample
xl.png.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
xl.png.exe
Resource
win10v200722
0 signatures
0 seconds
General
-
Target
xl.png.exe
-
Size
675KB
-
MD5
e122130010bcf147886f9d29a3c0b40d
-
SHA1
b65a0b20ec97040b929ebaca5ef5970e1017a3f5
-
SHA256
773f5e4bc9f8c4aac82f8cab8f416efe83f5a39735358301c6ca0559d61c8bf0
-
SHA512
a2f55b48fbc0eaa372d4db06b495236f05813c06cf2e31eecd12effae56806a2712be4c72119c518dab390487034b0ecff94f83047d3476d58d67bc24a1f7501
Score
10/10
Malware Config
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Executes dropped EXE 1 IoCs
pid Process 2664 WinHost32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinHost32 = "C:\\Windows\\System32\\WinHost32.exe" xl.png.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 13 api.ipify.org -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\WinHost32.exe xl.png.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 788 xl.png.exe 788 xl.png.exe 2664 WinHost32.exe 2664 WinHost32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 788 wrote to memory of 2664 788 xl.png.exe 76 PID 788 wrote to memory of 2664 788 xl.png.exe 76 PID 788 wrote to memory of 2664 788 xl.png.exe 76 PID 788 wrote to memory of 2764 788 xl.png.exe 77 PID 788 wrote to memory of 2764 788 xl.png.exe 77 PID 788 wrote to memory of 2764 788 xl.png.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\xl.png.exe"C:\Users\Admin\AppData\Local\Temp\xl.png.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\SysWOW64\WinHost32.exeC:\Windows\System32\WinHost32.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2664
-
-
C:\Windows\SysWOW64\cmd.exe/c del C:\Users\Admin\AppData\Local\Temp\xl.png.exe >> NUL2⤵PID:2764
-