Analysis
-
max time kernel
145s -
max time network
148s -
submitted
01-01-1970 00:00
Static task
static1
Behavioral task
behavioral1
Sample
triage_dropped_file.dll
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
triage_dropped_file.dll
Resource
win10-en-20211014
General
-
Target
triage_dropped_file.dll
-
Size
324KB
-
MD5
86f065892d619ff64bcafe30290bad4f
-
SHA1
ecfa5f0449880220759369098cc76ca3ba0d8501
-
SHA256
b1646a1969fa9d03485671ca4d50dd89f6263179310881fa4b3e3580a4e02da9
-
SHA512
52c35644ee385a6ed40a0a336fd8423326dae24472ce85b702facb3ad451ed9210ea33e31cab9d240d6ef359556bf8b7b7e32fe19b272762ef5ab5dd2b846ade
Malware Config
Extracted
hancitor
2610_cxe
http://ottedince.com/8/forum.php
http://indiscort.ru/8/forum.php
http://tremilline.ru/8/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Blocklisted process makes network request 3 IoCs
flow pid Process 25 2700 rundll32.exe 27 2700 rundll32.exe 30 2700 rundll32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 24 api.ipify.org -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2700 rundll32.exe 2700 rundll32.exe 2700 rundll32.exe 2700 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2700 2660 rundll32.exe 68 PID 2660 wrote to memory of 2700 2660 rundll32.exe 68 PID 2660 wrote to memory of 2700 2660 rundll32.exe 68
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\triage_dropped_file.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\triage_dropped_file.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:2700
-