Analysis
-
max time kernel
147s -
max time network
161s -
submitted
01-01-1970 00:00
Static task
static1
Behavioral task
behavioral1
Sample
gelforr.dap.dll
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
gelforr.dap.dll
Resource
win10-en-20210920
General
-
Target
gelforr.dap.dll
-
Size
324KB
-
MD5
86f065892d619ff64bcafe30290bad4f
-
SHA1
ecfa5f0449880220759369098cc76ca3ba0d8501
-
SHA256
b1646a1969fa9d03485671ca4d50dd89f6263179310881fa4b3e3580a4e02da9
-
SHA512
52c35644ee385a6ed40a0a336fd8423326dae24472ce85b702facb3ad451ed9210ea33e31cab9d240d6ef359556bf8b7b7e32fe19b272762ef5ab5dd2b846ade
Malware Config
Extracted
hancitor
2610_cxe
http://ottedince.com/8/forum.php
http://indiscort.ru/8/forum.php
http://tremilline.ru/8/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Blocklisted process makes network request 3 IoCs
flow pid Process 23 1020 rundll32.exe 26 1020 rundll32.exe 29 1020 rundll32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 api.ipify.org -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe 1020 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3748 wrote to memory of 1020 3748 rundll32.exe 69 PID 3748 wrote to memory of 1020 3748 rundll32.exe 69 PID 3748 wrote to memory of 1020 3748 rundll32.exe 69
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gelforr.dap.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gelforr.dap.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:1020
-