Analysis
-
max time kernel
134s -
max time network
134s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
01/11/2021, 14:48
Static task
static1
Behavioral task
behavioral1
Sample
ea5dac3b13b5b4024882c9ae3adac9eff592e15260c1302e02cbc9e9839d4dd0.dll
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
ea5dac3b13b5b4024882c9ae3adac9eff592e15260c1302e02cbc9e9839d4dd0.dll
Resource
win10-en-20211014
General
-
Target
ea5dac3b13b5b4024882c9ae3adac9eff592e15260c1302e02cbc9e9839d4dd0.dll
-
Size
25KB
-
MD5
88e26129167d71f629fc07d16ef5c98b
-
SHA1
124024b22b0d9c2b7aee4a61524c0b30bc628d3c
-
SHA256
ea5dac3b13b5b4024882c9ae3adac9eff592e15260c1302e02cbc9e9839d4dd0
-
SHA512
a6997cd09e799633b34c713453a6f95dccde09607aef3d741365417f09a1d08d3fc84baddbc4df4d55e47ca89e047d834d41a3118d6d212346282f9bea42938e
Malware Config
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
suricata: ET MALWARE Tordal/Hancitor/Chanitor Checkin
suricata: ET MALWARE Tordal/Hancitor/Chanitor Checkin
-
Blocklisted process makes network request 3 IoCs
flow pid Process 9 2824 rundll32.exe 11 2824 rundll32.exe 30 2824 rundll32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 api.ipify.org -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2824 rundll32.exe 2824 rundll32.exe 2824 rundll32.exe 2824 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2824 2780 rundll32.exe 68 PID 2780 wrote to memory of 2824 2780 rundll32.exe 68 PID 2780 wrote to memory of 2824 2780 rundll32.exe 68
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea5dac3b13b5b4024882c9ae3adac9eff592e15260c1302e02cbc9e9839d4dd0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea5dac3b13b5b4024882c9ae3adac9eff592e15260c1302e02cbc9e9839d4dd0.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:2824
-