Analysis
-
max time kernel
121s -
max time network
153s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
01-02-2022 13:45
Static task
static1
Behavioral task
behavioral1
Sample
help.doc
Resource
win10-en-20211208
General
-
Target
help.doc
-
Size
735KB
-
MD5
271666888b46008b726d889c40f5e92c
-
SHA1
5ac08cbdf22aa6a376c51da037aeab03392ee009
-
SHA256
f6375e696e2e5b3b738346a86a19991eccf89be18e731807114d87fedf77f415
-
SHA512
af6cc3e91d78c985813484d13eeeaf4026b82c49f4c6536f51f64b25e8702aca01de79db25c2fb37a47af1da51c320d573e03097c243fa6aaac952bed6c7cc16
Malware Config
Extracted
hancitor
3101_sjiuwe
http://cinenmera.com/9/forum.php
http://biquagin.ru/9/forum.php
http://joirwsin.ru/9/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 3632 3784 cmd.exe 68 -
suricata: ET MALWARE Win32/Hancitor Checkin
suricata: ET MALWARE Win32/Hancitor Checkin
-
Blocklisted process makes network request 2 IoCs
flow pid Process 47 3644 rundll32.exe 49 3644 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 3644 rundll32.exe 3644 rundll32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 46 api.ipify.org -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\{8A8837E9-1FC3-4BD2-B1CA-D757BE010BB6}\if.bin:Zone.Identifier WINWORD.EXE -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 312 PING.EXE 2420 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3784 WINWORD.EXE 3784 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3644 rundll32.exe 3644 rundll32.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 3784 WINWORD.EXE 3784 WINWORD.EXE 3784 WINWORD.EXE 3784 WINWORD.EXE 3784 WINWORD.EXE 3784 WINWORD.EXE 3784 WINWORD.EXE 3784 WINWORD.EXE 3784 WINWORD.EXE 3784 WINWORD.EXE 3784 WINWORD.EXE 3784 WINWORD.EXE 3784 WINWORD.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3784 wrote to memory of 3844 3784 WINWORD.EXE 72 PID 3784 wrote to memory of 3844 3784 WINWORD.EXE 72 PID 3784 wrote to memory of 3632 3784 WINWORD.EXE 73 PID 3784 wrote to memory of 3632 3784 WINWORD.EXE 73 PID 3632 wrote to memory of 312 3632 cmd.exe 75 PID 3632 wrote to memory of 312 3632 cmd.exe 75 PID 3632 wrote to memory of 3356 3632 cmd.exe 78 PID 3632 wrote to memory of 3356 3632 cmd.exe 78 PID 3356 wrote to memory of 2420 3356 cmd.exe 79 PID 3356 wrote to memory of 2420 3356 cmd.exe 79 PID 3632 wrote to memory of 3764 3632 cmd.exe 80 PID 3632 wrote to memory of 3764 3632 cmd.exe 80 PID 3764 wrote to memory of 3644 3764 rundll32.exe 81 PID 3764 wrote to memory of 3644 3764 rundll32.exe 81 PID 3764 wrote to memory of 3644 3764 rundll32.exe 81
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\help.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:3844
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c cd c:\users\admin\appdata\roaming\microsoft\templates && ping localhost -n 10 && c:\users\admin\appdata\roaming\microsoft\templates/1.bat2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\system32\PING.EXEping localhost -n 103⤵
- Runs ping.exe
PID:312
-
-
C:\Windows\system32\cmd.execmd.exe /c ping localhost -n 103⤵
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\system32\PING.EXEping localhost -n 104⤵
- Runs ping.exe
PID:2420
-
-
-
C:\Windows\system32\rundll32.exerundll32.exe iff.bin,NKBBAYRMEIHGRIM3⤵
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe iff.bin,NKBBAYRMEIHGRIM4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3644
-
-
-