Analysis
-
max time kernel
132s -
max time network
135s -
platform
windows10_x64 -
resource
win10 -
submitted
28-10-2020 15:34
Static task
static1
Behavioral task
behavioral1
Sample
exect.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
exect.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
exect.exe
-
Size
670KB
-
MD5
28e9316fb298d2e7a3d9fd71c662b3ec
-
SHA1
1c3737add4444a2cb0842d1a5535005b7aa8e7a4
-
SHA256
de5e9077481f7cf0b1addaeaaf21d6d39cabed2eea02276aaf9c241bce446c3d
-
SHA512
ccf5bfd384e231180a8e1153b45a0be518d17dc782335d47c543f9dba48cd03c6bf7ce0b34dde92b88f404e248e7484dfac6c1f39dde5a40f40eafdf53eb7bce
Score
10/10
Malware Config
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Executes dropped EXE 1 IoCs
pid Process 2088 WinHost32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinHost32 = "C:\\Windows\\System32\\WinHost32.exe" exect.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 12 api.ipify.org -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\WinHost32.exe exect.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3992 exect.exe 3992 exect.exe 2088 WinHost32.exe 2088 WinHost32.exe 2088 WinHost32.exe 2088 WinHost32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3992 wrote to memory of 2088 3992 exect.exe 77 PID 3992 wrote to memory of 2088 3992 exect.exe 77 PID 3992 wrote to memory of 2088 3992 exect.exe 77 PID 3992 wrote to memory of 2144 3992 exect.exe 78 PID 3992 wrote to memory of 2144 3992 exect.exe 78 PID 3992 wrote to memory of 2144 3992 exect.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\exect.exe"C:\Users\Admin\AppData\Local\Temp\exect.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SysWOW64\WinHost32.exeC:\Windows\System32\WinHost32.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2088
-
-
C:\Windows\SysWOW64\cmd.exe/c del C:\Users\Admin\AppData\Local\Temp\exect.exe >> NUL2⤵PID:2144
-