Analysis
-
max time kernel
110s -
max time network
138s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
23-11-2021 15:56
Static task
static1
Behavioral task
behavioral1
Sample
1123_2339546126972.doc
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
1123_2339546126972.doc
Resource
win10-en-20211104
General
-
Target
1123_2339546126972.doc
-
Size
893KB
-
MD5
ca52b8e88308d2d3147b0721d6d72626
-
SHA1
e91c2de24abae6a37f6572b70685a3ce25fe821e
-
SHA256
a2903ebc67c3549f59ecf6718444f6826030fa29f3701460b9709edbd9aa675b
-
SHA512
763d1205b1dcb84ffbf59f1ff61a62175a058b6c2d5994d5575ad900b195ee74a085937c6dc669ddb42a2f6a7f45f391d0e4c0b10307ec860ef52c7991f3b6b8
Malware Config
Extracted
hancitor
2311_nsdir
http://templogio.com/9/forum.php
http://johommeract.ru/9/forum.php
http://amesibiquand.ru/9/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 1232 2676 cmd.exe 67 -
Blocklisted process makes network request 2 IoCs
flow pid Process 34 2108 rundll32.exe 36 2108 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 2108 rundll32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 33 api.ipify.org -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\ rundll32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\{892E6050-3774-437A-8A29-D43BBB306274}\zoro.kl:Zone.Identifier WINWORD.EXE File opened for modification C:\Users\Admin\AppData\Local\Temp\{892E6050-3774-437A-8A29-D43BBB306274}\if.bin:Zone.Identifier WINWORD.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3496 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2676 WINWORD.EXE 2676 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2108 rundll32.exe 2108 rundll32.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 2676 WINWORD.EXE 2676 WINWORD.EXE 2676 WINWORD.EXE 2676 WINWORD.EXE 2676 WINWORD.EXE 2676 WINWORD.EXE 2676 WINWORD.EXE 2676 WINWORD.EXE 2676 WINWORD.EXE 2676 WINWORD.EXE 2676 WINWORD.EXE 2676 WINWORD.EXE 2676 WINWORD.EXE 2676 WINWORD.EXE 2676 WINWORD.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2676 wrote to memory of 3128 2676 WINWORD.EXE 71 PID 2676 wrote to memory of 3128 2676 WINWORD.EXE 71 PID 2676 wrote to memory of 1232 2676 WINWORD.EXE 72 PID 2676 wrote to memory of 1232 2676 WINWORD.EXE 72 PID 1232 wrote to memory of 3496 1232 cmd.exe 74 PID 1232 wrote to memory of 3496 1232 cmd.exe 74 PID 1232 wrote to memory of 1448 1232 cmd.exe 75 PID 1232 wrote to memory of 1448 1232 cmd.exe 75 PID 1448 wrote to memory of 2108 1448 rundll32.exe 76 PID 1448 wrote to memory of 2108 1448 rundll32.exe 76 PID 1448 wrote to memory of 2108 1448 rundll32.exe 76
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1123_2339546126972.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:3128
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c ping localhost -n 10 & rundll32.exe c:\users\admin\appdata\roaming\microsoft\templates\iff.bin,GWCRALYCYIAUAFG2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\system32\PING.EXEping localhost -n 103⤵
- Runs ping.exe
PID:3496
-
-
C:\Windows\system32\rundll32.exerundll32.exe c:\users\admin\appdata\roaming\microsoft\templates\iff.bin,GWCRALYCYIAUAFG3⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe c:\users\admin\appdata\roaming\microsoft\templates\iff.bin,GWCRALYCYIAUAFG4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2108
-
-
-