Analysis
-
max time kernel
128s -
max time network
130s -
platform
windows7_x64 -
resource
win7 -
submitted
28-10-2020 15:34
Static task
static1
Behavioral task
behavioral1
Sample
exect.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
exect.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
exect.exe
-
Size
670KB
-
MD5
28e9316fb298d2e7a3d9fd71c662b3ec
-
SHA1
1c3737add4444a2cb0842d1a5535005b7aa8e7a4
-
SHA256
de5e9077481f7cf0b1addaeaaf21d6d39cabed2eea02276aaf9c241bce446c3d
-
SHA512
ccf5bfd384e231180a8e1153b45a0be518d17dc782335d47c543f9dba48cd03c6bf7ce0b34dde92b88f404e248e7484dfac6c1f39dde5a40f40eafdf53eb7bce
Score
10/10
Malware Config
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Executes dropped EXE 1 IoCs
pid Process 1828 WinHost32.exe -
Deletes itself 1 IoCs
pid Process 1852 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 480 exect.exe 480 exect.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinHost32 = "C:\\Windows\\System32\\WinHost32.exe" exect.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\WinHost32.exe exect.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 480 exect.exe 1828 WinHost32.exe 1828 WinHost32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 480 wrote to memory of 1828 480 exect.exe 24 PID 480 wrote to memory of 1828 480 exect.exe 24 PID 480 wrote to memory of 1828 480 exect.exe 24 PID 480 wrote to memory of 1828 480 exect.exe 24 PID 480 wrote to memory of 1852 480 exect.exe 25 PID 480 wrote to memory of 1852 480 exect.exe 25 PID 480 wrote to memory of 1852 480 exect.exe 25 PID 480 wrote to memory of 1852 480 exect.exe 25
Processes
-
C:\Users\Admin\AppData\Local\Temp\exect.exe"C:\Users\Admin\AppData\Local\Temp\exect.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:480 -
C:\Windows\SysWOW64\WinHost32.exeC:\Windows\System32\WinHost32.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1828
-
-
C:\Windows\SysWOW64\cmd.exe/c del C:\Users\Admin\AppData\Local\Temp\exect.exe >> NUL2⤵
- Deletes itself
PID:1852
-