Analysis
-
max time kernel
132s -
max time network
135s -
platform
windows10_x64 -
resource
win10 -
submitted
28-10-2020 15:34
Static task
static1
Behavioral task
behavioral1
Sample
exect.exe
Resource
win7
Behavioral task
behavioral2
Sample
exect.exe
Resource
win10
General
-
Target
exect.exe
-
Size
670KB
-
MD5
28e9316fb298d2e7a3d9fd71c662b3ec
-
SHA1
1c3737add4444a2cb0842d1a5535005b7aa8e7a4
-
SHA256
de5e9077481f7cf0b1addaeaaf21d6d39cabed2eea02276aaf9c241bce446c3d
-
SHA512
ccf5bfd384e231180a8e1153b45a0be518d17dc782335d47c543f9dba48cd03c6bf7ce0b34dde92b88f404e248e7484dfac6c1f39dde5a40f40eafdf53eb7bce
Malware Config
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Executes dropped EXE 1 IoCs
Processes:
WinHost32.exepid Process 2088 WinHost32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
exect.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinHost32 = "C:\\Windows\\System32\\WinHost32.exe" exect.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 12 api.ipify.org -
Drops file in System32 directory 1 IoCs
Processes:
exect.exedescription ioc Process File created C:\Windows\SysWOW64\WinHost32.exe exect.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
exect.exeWinHost32.exepid Process 3992 exect.exe 3992 exect.exe 2088 WinHost32.exe 2088 WinHost32.exe 2088 WinHost32.exe 2088 WinHost32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
exect.exedescription pid Process procid_target PID 3992 wrote to memory of 2088 3992 exect.exe 77 PID 3992 wrote to memory of 2088 3992 exect.exe 77 PID 3992 wrote to memory of 2088 3992 exect.exe 77 PID 3992 wrote to memory of 2144 3992 exect.exe 78 PID 3992 wrote to memory of 2144 3992 exect.exe 78 PID 3992 wrote to memory of 2144 3992 exect.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\exect.exe"C:\Users\Admin\AppData\Local\Temp\exect.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SysWOW64\WinHost32.exeC:\Windows\System32\WinHost32.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2088
-
-
C:\Windows\SysWOW64\cmd.exe/c del C:\Users\Admin\AppData\Local\Temp\exect.exe >> NUL2⤵PID:2144
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
28e9316fb298d2e7a3d9fd71c662b3ec
SHA11c3737add4444a2cb0842d1a5535005b7aa8e7a4
SHA256de5e9077481f7cf0b1addaeaaf21d6d39cabed2eea02276aaf9c241bce446c3d
SHA512ccf5bfd384e231180a8e1153b45a0be518d17dc782335d47c543f9dba48cd03c6bf7ce0b34dde92b88f404e248e7484dfac6c1f39dde5a40f40eafdf53eb7bce
-
MD5
28e9316fb298d2e7a3d9fd71c662b3ec
SHA11c3737add4444a2cb0842d1a5535005b7aa8e7a4
SHA256de5e9077481f7cf0b1addaeaaf21d6d39cabed2eea02276aaf9c241bce446c3d
SHA512ccf5bfd384e231180a8e1153b45a0be518d17dc782335d47c543f9dba48cd03c6bf7ce0b34dde92b88f404e248e7484dfac6c1f39dde5a40f40eafdf53eb7bce