Analysis
-
max time kernel
111s -
max time network
146s -
submitted
01-01-1970 00:00
Static task
static1
Behavioral task
behavioral1
Sample
1027_5313688312.doc
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
1027_5313688312.doc
Resource
win10-en-20210920
General
-
Target
1027_5313688312.doc
-
Size
416KB
-
MD5
6f057a4843cdde3b2f75246d14abeb54
-
SHA1
b3b37a0a0cde7d2be0d7102ce0e78291f759024b
-
SHA256
1d58434e3eb83b310f0cc2626b7a17dd7a0ff298e74744efb5c612e1d8daa678
-
SHA512
a0ca28f84164bfd40a1a305c4a18fbd92ea6af14ac05d38c77d418f9b9001407ece9740a3bad05ec369227f91b7781be13a0f4983811b3bc148d4e2497beb5e2
Malware Config
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 3780 3912 rundll32.exe 26 -
Blocklisted process makes network request 2 IoCs
flow pid Process 35 3448 rundll32.exe 37 3448 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 3448 rundll32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 34 api.ipify.org -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\{771856EC-4D7D-4DF6-9776-81E72113BB45}\gelfor.dap:Zone.Identifier WINWORD.EXE File opened for modification C:\Users\Admin\AppData\Local\Temp\{771856EC-4D7D-4DF6-9776-81E72113BB45}\zoro.kl:Zone.Identifier WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3912 WINWORD.EXE 3912 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3448 rundll32.exe 3448 rundll32.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 3912 WINWORD.EXE 3912 WINWORD.EXE 3912 WINWORD.EXE 3912 WINWORD.EXE 3912 WINWORD.EXE 3912 WINWORD.EXE 3912 WINWORD.EXE 3912 WINWORD.EXE 3912 WINWORD.EXE 3912 WINWORD.EXE 3912 WINWORD.EXE 3912 WINWORD.EXE 3912 WINWORD.EXE 3912 WINWORD.EXE 3912 WINWORD.EXE 3912 WINWORD.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3912 wrote to memory of 3468 3912 WINWORD.EXE 71 PID 3912 wrote to memory of 3468 3912 WINWORD.EXE 71 PID 3912 wrote to memory of 3780 3912 WINWORD.EXE 73 PID 3912 wrote to memory of 3780 3912 WINWORD.EXE 73 PID 3780 wrote to memory of 3448 3780 rundll32.exe 74 PID 3780 wrote to memory of 3448 3780 rundll32.exe 74 PID 3780 wrote to memory of 3448 3780 rundll32.exe 74
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1027_5313688312.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:3468
-
-
C:\Windows\SYSTEM32\rundll32.exerundll32.exe c:\users\admin\appdata\roaming\microsoft\templates\gelforr.dap,EGGOILJCVQADUEW2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe c:\users\admin\appdata\roaming\microsoft\templates\gelforr.dap,EGGOILJCVQADUEW3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3448
-
-