Analysis
-
max time kernel
150s -
max time network
137s -
submitted
01/01/1970, 00:00
Static task
static1
Behavioral task
behavioral1
Sample
8ff43b6ddf6243bd5ee073f9987920fa223809f589d151d7e438fd8cc08ce292.dll
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
8ff43b6ddf6243bd5ee073f9987920fa223809f589d151d7e438fd8cc08ce292.dll
Resource
win10-en-20210920
General
-
Target
8ff43b6ddf6243bd5ee073f9987920fa223809f589d151d7e438fd8cc08ce292.dll
-
Size
525KB
-
MD5
4198ac1dc34de77ab8ceac3c9a25480e
-
SHA1
f8fb1264a292aecb6c2bf5c5d4f3e199e3a822ad
-
SHA256
8ff43b6ddf6243bd5ee073f9987920fa223809f589d151d7e438fd8cc08ce292
-
SHA512
37dd3c50283daa7be1fb831820d273b7663dddce4d98c87c8d08864fac2dc00daf243ca6e50e028d4f04262160f5dea9a98000cffb67d70c07875d3fc2e4c47c
Malware Config
Extracted
hancitor
1910_nsw
http://newnucapi.com/8/forum.php
http://gintlyba.ru/8/forum.php
http://stralonz.ru/8/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Blocklisted process makes network request 3 IoCs
flow pid Process 5 1648 rundll32.exe 7 1648 rundll32.exe 8 1648 rundll32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1648 rundll32.exe 1648 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1396 wrote to memory of 1648 1396 rundll32.exe 27 PID 1396 wrote to memory of 1648 1396 rundll32.exe 27 PID 1396 wrote to memory of 1648 1396 rundll32.exe 27 PID 1396 wrote to memory of 1648 1396 rundll32.exe 27 PID 1396 wrote to memory of 1648 1396 rundll32.exe 27 PID 1396 wrote to memory of 1648 1396 rundll32.exe 27 PID 1396 wrote to memory of 1648 1396 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8ff43b6ddf6243bd5ee073f9987920fa223809f589d151d7e438fd8cc08ce292.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8ff43b6ddf6243bd5ee073f9987920fa223809f589d151d7e438fd8cc08ce292.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:1648
-