Analysis
-
max time kernel
128s -
max time network
166s -
submitted
01-01-1970 00:00
Static task
static1
Behavioral task
behavioral1
Sample
1027_4844508518.doc
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
1027_4844508518.doc
Resource
win10-en-20210920
General
-
Target
1027_4844508518.doc
-
Size
417KB
-
MD5
1753470822da12ddd16ddd88b65ecffb
-
SHA1
475bc8e662d2d52efb5398ec34d0d7bc2f64efe9
-
SHA256
2e75e7859a6ad5be03ec7c8a894ca901bc708556de1d605ceed5f4e1b8bfd765
-
SHA512
9d083e51b28fe33c39845436ace5d93f1a8c5818132daaa568e1ca2e7e9b39c0022aad2cd84ad0446c8ed71b9cae582ed032ef5fa445811800495a9fd050275c
Malware Config
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 888 3948 rundll32.exe 68 -
Blocklisted process makes network request 2 IoCs
flow pid Process 43 1052 rundll32.exe 45 1052 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 1052 rundll32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 42 api.ipify.org -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\{E3E58179-08EA-4232-A76C-42440EF1BEEA}\gelfor.dap:Zone.Identifier WINWORD.EXE File opened for modification C:\Users\Admin\AppData\Local\Temp\{E3E58179-08EA-4232-A76C-42440EF1BEEA}\zoro.kl:Zone.Identifier WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3948 WINWORD.EXE 3948 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1052 rundll32.exe 1052 rundll32.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 3948 WINWORD.EXE 3948 WINWORD.EXE 3948 WINWORD.EXE 3948 WINWORD.EXE 3948 WINWORD.EXE 3948 WINWORD.EXE 3948 WINWORD.EXE 3948 WINWORD.EXE 3948 WINWORD.EXE 3948 WINWORD.EXE 3948 WINWORD.EXE 3948 WINWORD.EXE 3948 WINWORD.EXE 3948 WINWORD.EXE 3948 WINWORD.EXE 3948 WINWORD.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3948 wrote to memory of 4744 3948 WINWORD.EXE 72 PID 3948 wrote to memory of 4744 3948 WINWORD.EXE 72 PID 3948 wrote to memory of 888 3948 WINWORD.EXE 75 PID 3948 wrote to memory of 888 3948 WINWORD.EXE 75 PID 888 wrote to memory of 1052 888 rundll32.exe 76 PID 888 wrote to memory of 1052 888 rundll32.exe 76 PID 888 wrote to memory of 1052 888 rundll32.exe 76
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1027_4844508518.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:4744
-
-
C:\Windows\SYSTEM32\rundll32.exerundll32.exe c:\users\admin\appdata\roaming\microsoft\templates\gelforr.dap,EGGOILJCVQADUEW2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe c:\users\admin\appdata\roaming\microsoft\templates\gelforr.dap,EGGOILJCVQADUEW3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1052
-
-