Analysis
-
max time kernel
125s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
15-03-2022 09:28
Static task
static1
Behavioral task
behavioral1
Sample
18ee8e11fed332e1d38eaa8d6eb6549798681cc5ddc8d0709c3efcb80dc34994.dll
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
18ee8e11fed332e1d38eaa8d6eb6549798681cc5ddc8d0709c3efcb80dc34994.dll
Resource
win10v2004-20220310-en
General
-
Target
18ee8e11fed332e1d38eaa8d6eb6549798681cc5ddc8d0709c3efcb80dc34994.dll
-
Size
1.7MB
-
MD5
cc4c4ed0880dc4c949d2c5b82215c1f5
-
SHA1
8bac526732429816b185a27f276291fcacc864f4
-
SHA256
18ee8e11fed332e1d38eaa8d6eb6549798681cc5ddc8d0709c3efcb80dc34994
-
SHA512
662aa21aa4d046166ae747b7cbdd51b23c7ad629efa92271083ffad20e39027f48428b3095471950718cf6a14bd3b9caa6042525c74dc62a7b063c0549bd5919
Malware Config
Extracted
hancitor
1403_nerf
http://ordernema.com/9/forum.php
http://roobberle.ru/9/forum.php
http://sardogradu.ru/9/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1480 1720 WerFault.exe 82 212 1720 WerFault.exe 82 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4348 wrote to memory of 1720 4348 rundll32.exe 82 PID 4348 wrote to memory of 1720 4348 rundll32.exe 82 PID 4348 wrote to memory of 1720 4348 rundll32.exe 82 PID 1720 wrote to memory of 1480 1720 rundll32.exe 91 PID 1720 wrote to memory of 1480 1720 rundll32.exe 91 PID 1720 wrote to memory of 1480 1720 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\18ee8e11fed332e1d38eaa8d6eb6549798681cc5ddc8d0709c3efcb80dc34994.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\18ee8e11fed332e1d38eaa8d6eb6549798681cc5ddc8d0709c3efcb80dc34994.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 6403⤵
- Program crash
PID:1480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 6403⤵
- Program crash
PID:212
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1720 -ip 17201⤵PID:3020