Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
05-03-2022 20:46
Static task
static1
Behavioral task
behavioral1
Sample
18cf2e39efca29316e84dab1be885a77c600c40d6bb65cd016b6de9d3fd0a6da.doc
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
18cf2e39efca29316e84dab1be885a77c600c40d6bb65cd016b6de9d3fd0a6da.doc
Resource
win10v2004-en-20220113
General
-
Target
18cf2e39efca29316e84dab1be885a77c600c40d6bb65cd016b6de9d3fd0a6da.doc
-
Size
461KB
-
MD5
dcc62d1c27043d6ecededefd5dec8fa2
-
SHA1
203bbea4dfd1ad3f91c5a177dfbb84d8f3235f09
-
SHA256
18cf2e39efca29316e84dab1be885a77c600c40d6bb65cd016b6de9d3fd0a6da
-
SHA512
6b5a957bdad86e5efc4ecc916b314dd190873d2d77af2560bde6f660785588c054857b983c7243c6f54b3990729916bfc1dc96f042ec37e2429574c04a418939
Malware Config
Extracted
hancitor
1901_48re93
http://opulteme.com/8/forum.php
http://tharepirms.ru/8/forum.php
http://worteltiffee.ru/8/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 2440 3020 rundll32.exe 34 -
Blocklisted process makes network request 1 IoCs
flow pid Process 34 1592 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 1592 rundll32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 33 api.ipify.org -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\{DA439BEF-2C58-473A-8CFF-14D4D3EE2CB3}\0fiasS.tmp:Zone.Identifier WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3020 WINWORD.EXE 3020 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1592 rundll32.exe 1592 rundll32.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3020 WINWORD.EXE 3020 WINWORD.EXE 3020 WINWORD.EXE 3020 WINWORD.EXE 3020 WINWORD.EXE 3020 WINWORD.EXE 3020 WINWORD.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3020 wrote to memory of 4896 3020 WINWORD.EXE 82 PID 3020 wrote to memory of 4896 3020 WINWORD.EXE 82 PID 3020 wrote to memory of 2440 3020 WINWORD.EXE 84 PID 3020 wrote to memory of 2440 3020 WINWORD.EXE 84 PID 2440 wrote to memory of 1592 2440 rundll32.exe 85 PID 2440 wrote to memory of 1592 2440 rundll32.exe 85 PID 2440 wrote to memory of 1592 2440 rundll32.exe 85
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\18cf2e39efca29316e84dab1be885a77c600c40d6bb65cd016b6de9d3fd0a6da.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:4896
-
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\Microsoft\Templates\W0rd.dll,UninstallFont2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\Microsoft\Templates\W0rd.dll,UninstallFont3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1592
-
-