Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
09-03-2022 15:24
Static task
static1
Behavioral task
behavioral1
Sample
e020851d5c3b66662ef70b47f23365a9d922d1b289634c4dddea047a6fd770e9.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
e020851d5c3b66662ef70b47f23365a9d922d1b289634c4dddea047a6fd770e9.dll
Resource
win10v2004-en-20220113
General
-
Target
e020851d5c3b66662ef70b47f23365a9d922d1b289634c4dddea047a6fd770e9.dll
-
Size
396KB
-
MD5
394beefcf36a6e88ba35ea5252dec78f
-
SHA1
99810c8afc8a87603abaa4cac610cde14c9c4c10
-
SHA256
e020851d5c3b66662ef70b47f23365a9d922d1b289634c4dddea047a6fd770e9
-
SHA512
503ec76dd5937a9180c31caac98805def521bd3c7be1f3717f27b54a9a77436a2b170168de77f5043a4925a763fb09a25a74b4c929105acab3a56c25c272ac82
Malware Config
Extracted
hancitor
0312_89324
http://bandieve.com/8/forum.php
http://decturnearrips.ru/8/forum.php
http://looduchavens.ru/8/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 5 1628 rundll32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org -
Program crash 1 IoCs
pid pid_target Process procid_target 1788 1628 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1628 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1628 1672 rundll32.exe 27 PID 1672 wrote to memory of 1628 1672 rundll32.exe 27 PID 1672 wrote to memory of 1628 1672 rundll32.exe 27 PID 1672 wrote to memory of 1628 1672 rundll32.exe 27 PID 1672 wrote to memory of 1628 1672 rundll32.exe 27 PID 1672 wrote to memory of 1628 1672 rundll32.exe 27 PID 1672 wrote to memory of 1628 1672 rundll32.exe 27 PID 1628 wrote to memory of 1788 1628 rundll32.exe 30 PID 1628 wrote to memory of 1788 1628 rundll32.exe 30 PID 1628 wrote to memory of 1788 1628 rundll32.exe 30 PID 1628 wrote to memory of 1788 1628 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e020851d5c3b66662ef70b47f23365a9d922d1b289634c4dddea047a6fd770e9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e020851d5c3b66662ef70b47f23365a9d922d1b289634c4dddea047a6fd770e9.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 8083⤵
- Program crash
PID:1788
-
-