Analysis
-
max time kernel
139s -
max time network
148s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
05-02-2022 08:46
Static task
static1
Behavioral task
behavioral1
Sample
e52d446a99ecb9ca9f18365bab6f30e2cc1f6a97f668ea6ac38ce2a9b9ae3784.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
e52d446a99ecb9ca9f18365bab6f30e2cc1f6a97f668ea6ac38ce2a9b9ae3784.dll
Resource
win10v2004-en-20220113
General
-
Target
e52d446a99ecb9ca9f18365bab6f30e2cc1f6a97f668ea6ac38ce2a9b9ae3784.dll
-
Size
82KB
-
MD5
38739e8c8fc39b3ef8c25b996e4bfa74
-
SHA1
d0792a6b36960254216de3217887c914df633de1
-
SHA256
e52d446a99ecb9ca9f18365bab6f30e2cc1f6a97f668ea6ac38ce2a9b9ae3784
-
SHA512
cad0deafcb65e39e96bb0eeb50833dc56fcc4600348950c438c23f6504470c56f1098381f1202992cce3efcc989c5091574f634166460e2783c3d9201010ce3d
Malware Config
Extracted
hancitor
0604_dl75789
http://ationsopors.com/4/forum.php
http://hoagoomde.com/4/forum.php
http://ardstiobek.com/4/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
suricata: ET MALWARE Tordal/Hancitor/Chanitor Checkin
suricata: ET MALWARE Tordal/Hancitor/Chanitor Checkin
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1108 set thread context of 1056 1108 rundll32.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1056 svchost.exe 1056 svchost.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1080 wrote to memory of 1108 1080 rundll32.exe 27 PID 1080 wrote to memory of 1108 1080 rundll32.exe 27 PID 1080 wrote to memory of 1108 1080 rundll32.exe 27 PID 1080 wrote to memory of 1108 1080 rundll32.exe 27 PID 1080 wrote to memory of 1108 1080 rundll32.exe 27 PID 1080 wrote to memory of 1108 1080 rundll32.exe 27 PID 1080 wrote to memory of 1108 1080 rundll32.exe 27 PID 1108 wrote to memory of 1056 1108 rundll32.exe 28 PID 1108 wrote to memory of 1056 1108 rundll32.exe 28 PID 1108 wrote to memory of 1056 1108 rundll32.exe 28 PID 1108 wrote to memory of 1056 1108 rundll32.exe 28 PID 1108 wrote to memory of 1056 1108 rundll32.exe 28 PID 1108 wrote to memory of 1056 1108 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e52d446a99ecb9ca9f18365bab6f30e2cc1f6a97f668ea6ac38ce2a9b9ae3784.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e52d446a99ecb9ca9f18365bab6f30e2cc1f6a97f668ea6ac38ce2a9b9ae3784.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1056
-
-