Analysis
-
max time kernel
110s -
max time network
149s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
23-11-2021 16:44
Static task
static1
Behavioral task
behavioral1
Sample
cefe49ab523105b6c6c625280804c8f3.doc
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
cefe49ab523105b6c6c625280804c8f3.doc
Resource
win10-en-20211014
General
-
Target
cefe49ab523105b6c6c625280804c8f3.doc
-
Size
892KB
-
MD5
cefe49ab523105b6c6c625280804c8f3
-
SHA1
9d05646df4b2278664eef6aa1eb06a67d34daf6e
-
SHA256
c1c2fd46ce19afa66360c6db20edba84c460b254dc4676949bf38bdd41cdd577
-
SHA512
e3f366697cdcedd330beadfe7a8f5020bd335f2b08133aa983f5ba9fb1585b518b51e6d9b010ed9b3b34c61a35b6d4359f60b394a323c78f08b81196fc1a5547
Malware Config
Extracted
hancitor
2311_nsdir
http://templogio.com/9/forum.php
http://johommeract.ru/9/forum.php
http://amesibiquand.ru/9/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 2856 2744 cmd.exe 67 -
Blocklisted process makes network request 2 IoCs
flow pid Process 36 3956 rundll32.exe 38 3956 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 3956 rundll32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 35 api.ipify.org -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\ rundll32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\{FB0EDAF3-2E8E-4476-B92A-3072E4294E07}\zoro.kl:Zone.Identifier WINWORD.EXE File opened for modification C:\Users\Admin\AppData\Local\Temp\{FB0EDAF3-2E8E-4476-B92A-3072E4294E07}\if.bin:Zone.Identifier WINWORD.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3864 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2744 WINWORD.EXE 2744 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3956 rundll32.exe 3956 rundll32.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 2744 WINWORD.EXE 2744 WINWORD.EXE 2744 WINWORD.EXE 2744 WINWORD.EXE 2744 WINWORD.EXE 2744 WINWORD.EXE 2744 WINWORD.EXE 2744 WINWORD.EXE 2744 WINWORD.EXE 2744 WINWORD.EXE 2744 WINWORD.EXE 2744 WINWORD.EXE 2744 WINWORD.EXE 2744 WINWORD.EXE 2744 WINWORD.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2448 2744 WINWORD.EXE 71 PID 2744 wrote to memory of 2448 2744 WINWORD.EXE 71 PID 2744 wrote to memory of 2856 2744 WINWORD.EXE 72 PID 2744 wrote to memory of 2856 2744 WINWORD.EXE 72 PID 2856 wrote to memory of 3864 2856 cmd.exe 74 PID 2856 wrote to memory of 3864 2856 cmd.exe 74 PID 2856 wrote to memory of 2868 2856 cmd.exe 75 PID 2856 wrote to memory of 2868 2856 cmd.exe 75 PID 2868 wrote to memory of 3956 2868 rundll32.exe 76 PID 2868 wrote to memory of 3956 2868 rundll32.exe 76 PID 2868 wrote to memory of 3956 2868 rundll32.exe 76
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\cefe49ab523105b6c6c625280804c8f3.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2448
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c ping localhost -n 10 & rundll32.exe c:\users\admin\appdata\roaming\microsoft\templates\iff.bin,GWCRALYCYIAUAFG2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\system32\PING.EXEping localhost -n 103⤵
- Runs ping.exe
PID:3864
-
-
C:\Windows\system32\rundll32.exerundll32.exe c:\users\admin\appdata\roaming\microsoft\templates\iff.bin,GWCRALYCYIAUAFG3⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe c:\users\admin\appdata\roaming\microsoft\templates\iff.bin,GWCRALYCYIAUAFG4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3956
-
-
-