Analysis
-
max time kernel
120s -
max time network
147s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
01-11-2021 14:48
Behavioral task
behavioral1
Sample
e37509a2e31bf0c61750e42c8b4997647d97008fea5a5d35cc5e6142a6c2c9cb.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
e37509a2e31bf0c61750e42c8b4997647d97008fea5a5d35cc5e6142a6c2c9cb.exe
Resource
win10-en-20210920
General
-
Target
e37509a2e31bf0c61750e42c8b4997647d97008fea5a5d35cc5e6142a6c2c9cb.exe
-
Size
28KB
-
MD5
c5a1ef322041b6fe4e680423dcbb828b
-
SHA1
d903a7b75bfa71945b052f51533c13d33c6b3d62
-
SHA256
e37509a2e31bf0c61750e42c8b4997647d97008fea5a5d35cc5e6142a6c2c9cb
-
SHA512
60a02e429fa59477d180d794c2067da0665af8baf7453d0818d49cc1b340abbcb590b0f04ae50d503d7db423bb19ccd717ce59d433fc7945259dce975866231e
Malware Config
Extracted
hancitor
exp_14
http://spetandserilic.com/4/forum.php
http://theithyosavele.ru/4/forum.php
http://imetionfachoul.ru/4/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Executes dropped EXE 1 IoCs
pid Process 1796 WinHost32.exe -
Deletes itself 1 IoCs
pid Process 1164 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1592 e37509a2e31bf0c61750e42c8b4997647d97008fea5a5d35cc5e6142a6c2c9cb.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinHost32 = "C:\\Windows\\System32\\WinHost32.exe" e37509a2e31bf0c61750e42c8b4997647d97008fea5a5d35cc5e6142a6c2c9cb.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\WinHost32.exe e37509a2e31bf0c61750e42c8b4997647d97008fea5a5d35cc5e6142a6c2c9cb.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1592 e37509a2e31bf0c61750e42c8b4997647d97008fea5a5d35cc5e6142a6c2c9cb.exe 1796 WinHost32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1592 wrote to memory of 1796 1592 e37509a2e31bf0c61750e42c8b4997647d97008fea5a5d35cc5e6142a6c2c9cb.exe 27 PID 1592 wrote to memory of 1796 1592 e37509a2e31bf0c61750e42c8b4997647d97008fea5a5d35cc5e6142a6c2c9cb.exe 27 PID 1592 wrote to memory of 1796 1592 e37509a2e31bf0c61750e42c8b4997647d97008fea5a5d35cc5e6142a6c2c9cb.exe 27 PID 1592 wrote to memory of 1796 1592 e37509a2e31bf0c61750e42c8b4997647d97008fea5a5d35cc5e6142a6c2c9cb.exe 27 PID 1592 wrote to memory of 1164 1592 e37509a2e31bf0c61750e42c8b4997647d97008fea5a5d35cc5e6142a6c2c9cb.exe 29 PID 1592 wrote to memory of 1164 1592 e37509a2e31bf0c61750e42c8b4997647d97008fea5a5d35cc5e6142a6c2c9cb.exe 29 PID 1592 wrote to memory of 1164 1592 e37509a2e31bf0c61750e42c8b4997647d97008fea5a5d35cc5e6142a6c2c9cb.exe 29 PID 1592 wrote to memory of 1164 1592 e37509a2e31bf0c61750e42c8b4997647d97008fea5a5d35cc5e6142a6c2c9cb.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e37509a2e31bf0c61750e42c8b4997647d97008fea5a5d35cc5e6142a6c2c9cb.exe"C:\Users\Admin\AppData\Local\Temp\e37509a2e31bf0c61750e42c8b4997647d97008fea5a5d35cc5e6142a6c2c9cb.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\WinHost32.exeC:\Windows\System32\WinHost32.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1796
-
-
C:\Windows\SysWOW64\cmd.exe/c del C:\Users\Admin\AppData\Local\Temp\e37509a2e31bf0c61750e42c8b4997647d97008fea5a5d35cc5e6142a6c2c9cb.exe >> NUL2⤵
- Deletes itself
PID:1164
-