Analysis
-
max time kernel
120s -
max time network
147s -
submitted
01-01-1970 00:00
Static task
static1
Behavioral task
behavioral1
Sample
gelforr.dap.dll
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
gelforr.dap.dll
Resource
win10-en-20210920
General
-
Target
gelforr.dap.dll
-
Size
324KB
-
MD5
86f065892d619ff64bcafe30290bad4f
-
SHA1
ecfa5f0449880220759369098cc76ca3ba0d8501
-
SHA256
b1646a1969fa9d03485671ca4d50dd89f6263179310881fa4b3e3580a4e02da9
-
SHA512
52c35644ee385a6ed40a0a336fd8423326dae24472ce85b702facb3ad451ed9210ea33e31cab9d240d6ef359556bf8b7b7e32fe19b272762ef5ab5dd2b846ade
Malware Config
Extracted
hancitor
2610_cxe
http://ottedince.com/8/forum.php
http://indiscort.ru/8/forum.php
http://tremilline.ru/8/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 528 rundll32.exe 7 528 rundll32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 528 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 772 wrote to memory of 528 772 rundll32.exe 28 PID 772 wrote to memory of 528 772 rundll32.exe 28 PID 772 wrote to memory of 528 772 rundll32.exe 28 PID 772 wrote to memory of 528 772 rundll32.exe 28 PID 772 wrote to memory of 528 772 rundll32.exe 28 PID 772 wrote to memory of 528 772 rundll32.exe 28 PID 772 wrote to memory of 528 772 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gelforr.dap.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gelforr.dap.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:528
-