Analysis
-
max time kernel
110s -
max time network
143s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
19-10-2021 18:21
Static task
static1
Behavioral task
behavioral1
Sample
df5926ad349dad39884d0a71f8c7318b.doc
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
df5926ad349dad39884d0a71f8c7318b.doc
Resource
win10-en-20211014
General
-
Target
df5926ad349dad39884d0a71f8c7318b.doc
-
Size
534KB
-
MD5
df5926ad349dad39884d0a71f8c7318b
-
SHA1
de672dfb061f7f0d62940800f60ea963dc3cce3b
-
SHA256
6f67beb15edea5f47a2ca655bca9a534e5944e3704a916a2b3d00ed7790e25f0
-
SHA512
98ecd2118850fa1ce7c50554e434a7f7580926d7972abe5ca7a9a6a32d5b5771b598bbab0c7dd49a96157dff7d5451e41249d095d5664b63a72cef14ebc95b3a
Malware Config
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 2384 1968 rundll32.exe 68 -
suricata: ET MALWARE Tordal/Hancitor/Chanitor Checkin
suricata: ET MALWARE Tordal/Hancitor/Chanitor Checkin
-
Blocklisted process makes network request 2 IoCs
flow pid Process 35 4084 rundll32.exe 37 4084 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 4084 rundll32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 34 api.ipify.org -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\{BA91FDA0-6C04-4E32-8530-96B0319162D9}\zoro.kl:Zone.Identifier WINWORD.EXE File opened for modification C:\Users\Admin\AppData\Local\Temp\{BA91FDA0-6C04-4E32-8530-96B0319162D9}\gelfor.dap:Zone.Identifier WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1968 WINWORD.EXE 1968 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4084 rundll32.exe 4084 rundll32.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 1968 WINWORD.EXE 1968 WINWORD.EXE 1968 WINWORD.EXE 1968 WINWORD.EXE 1968 WINWORD.EXE 1968 WINWORD.EXE 1968 WINWORD.EXE 1968 WINWORD.EXE 1968 WINWORD.EXE 1968 WINWORD.EXE 1968 WINWORD.EXE 1968 WINWORD.EXE 1968 WINWORD.EXE 1968 WINWORD.EXE 1968 WINWORD.EXE 1968 WINWORD.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2376 1968 WINWORD.EXE 71 PID 1968 wrote to memory of 2376 1968 WINWORD.EXE 71 PID 1968 wrote to memory of 2384 1968 WINWORD.EXE 73 PID 1968 wrote to memory of 2384 1968 WINWORD.EXE 73 PID 2384 wrote to memory of 4084 2384 rundll32.exe 74 PID 2384 wrote to memory of 4084 2384 rundll32.exe 74 PID 2384 wrote to memory of 4084 2384 rundll32.exe 74
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\df5926ad349dad39884d0a71f8c7318b.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2376
-
-
C:\Windows\SYSTEM32\rundll32.exerundll32.exe c:\users\admin\appdata\roaming\microsoft\templates\gelforr.dap,MVELLJHNDSVBJLD2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe c:\users\admin\appdata\roaming\microsoft\templates\gelforr.dap,MVELLJHNDSVBJLD3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4084
-
-