Analysis
-
max time kernel
139s -
max time network
143s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
03-11-2021 19:30
Static task
static1
Behavioral task
behavioral1
Sample
1103_788528522604.doc
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
1103_788528522604.doc
Resource
win10-en-20210920
General
-
Target
1103_788528522604.doc
-
Size
575KB
-
MD5
ee6533a8f2332056197ad12ca7c945dc
-
SHA1
569ea04796550cf0f8811e2a5aad4b9d1552aefe
-
SHA256
915ea807cdf10ea4a4912377d7c688a527d0e91c7777d811b171d2960b75c65c
-
SHA512
814432933d2ebb3aa4fc1bf7294ba786c852079ba96c68f7509c8594bc174aa2b0308e7d0fa4e6a3be2ac911905f5d31e4d7a98b64ea2e803fe2ab01860ba64f
Malware Config
Extracted
hancitor
0211_ponxwe
http://mettlybothe.com/8/forum.php
http://herstrairzoj.ru/8/forum.php
http://allonsetkes.ru/8/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 4824 712 rundll32.exe 68 -
suricata: ET MALWARE Tordal/Hancitor/Chanitor Checkin
suricata: ET MALWARE Tordal/Hancitor/Chanitor Checkin
-
Blocklisted process makes network request 3 IoCs
flow pid Process 32 4840 rundll32.exe 35 4840 rundll32.exe 46 4840 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 4840 rundll32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 31 api.ipify.org -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\{5D83B655-1B1F-4647-832E-A1C5F26C9534}\gelfor.dap:Zone.Identifier WINWORD.EXE File opened for modification C:\Users\Admin\AppData\Local\Temp\{5D83B655-1B1F-4647-832E-A1C5F26C9534}\zoro.kl:Zone.Identifier WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 712 WINWORD.EXE 712 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4840 rundll32.exe 4840 rundll32.exe 4840 rundll32.exe 4840 rundll32.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 712 WINWORD.EXE 712 WINWORD.EXE 712 WINWORD.EXE 712 WINWORD.EXE 712 WINWORD.EXE 712 WINWORD.EXE 712 WINWORD.EXE 712 WINWORD.EXE 712 WINWORD.EXE 712 WINWORD.EXE 712 WINWORD.EXE 712 WINWORD.EXE 712 WINWORD.EXE 712 WINWORD.EXE 712 WINWORD.EXE 712 WINWORD.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 712 wrote to memory of 1364 712 WINWORD.EXE 71 PID 712 wrote to memory of 1364 712 WINWORD.EXE 71 PID 712 wrote to memory of 4824 712 WINWORD.EXE 73 PID 712 wrote to memory of 4824 712 WINWORD.EXE 73 PID 4824 wrote to memory of 4840 4824 rundll32.exe 74 PID 4824 wrote to memory of 4840 4824 rundll32.exe 74 PID 4824 wrote to memory of 4840 4824 rundll32.exe 74
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1103_788528522604.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1364
-
-
C:\Windows\SYSTEM32\rundll32.exerundll32.exe c:\users\admin\appdata\roaming\microsoft\templates\gelforr.dap,EBVATDHSOWBHPEF2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe c:\users\admin\appdata\roaming\microsoft\templates\gelforr.dap,EBVATDHSOWBHPEF3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4840
-
-