Analysis

  • max time kernel
    1092s
  • max time network
    1213s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    20/10/2021, 14:53

General

  • Target

    5b0ef982ada2cab733e409b050c472ea4c8eb3c6950633828c1570747e81ead8.exe

  • Size

    211KB

  • MD5

    4327ed1671deb9f1b0169cf10680840a

  • SHA1

    b4015aa7d5579097378d0477903511397b04f007

  • SHA256

    5b0ef982ada2cab733e409b050c472ea4c8eb3c6950633828c1570747e81ead8

  • SHA512

    76fe1c172a7afa578df1d93975689accb1e52d2279c02a2ebbcd7c374acdf79fbf34aad7e5d89d968477853fabcf745f5b767282605ab93a02ea71d2a6b7cc39

Malware Config

Extracted

Family

hancitor

Botnet

exp_14

C2

http://spetandserilic.com/4/forum.php

http://theithyosavele.ru/4/forum.php

http://imetionfachoul.ru/4/forum.php

Signatures

  • Hancitor

    Hancitor is downloader used to deliver other malware families.

  • suricata: ET MALWARE Tordal/Hancitor/Chanitor Checkin

    suricata: ET MALWARE Tordal/Hancitor/Chanitor Checkin

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b0ef982ada2cab733e409b050c472ea4c8eb3c6950633828c1570747e81ead8.exe
    "C:\Users\Admin\AppData\Local\Temp\5b0ef982ada2cab733e409b050c472ea4c8eb3c6950633828c1570747e81ead8.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2396
    • C:\Windows\SysWOW64\WinHost32.exe
      C:\Windows\System32\WinHost32.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:656
    • C:\Windows\SysWOW64\cmd.exe
      /c del C:\Users\Admin\AppData\Local\Temp\5b0ef982ada2cab733e409b050c472ea4c8eb3c6950633828c1570747e81ead8.exe >> NUL
      2⤵
        PID:1252

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/656-124-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/656-123-0x0000000000530000-0x0000000000538000-memory.dmp

      Filesize

      32KB

    • memory/2396-121-0x0000000000540000-0x000000000068A000-memory.dmp

      Filesize

      1.3MB

    • memory/2396-122-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB