Analysis
-
max time kernel
134s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
21-03-2022 16:41
Static task
static1
Behavioral task
behavioral1
Sample
helf.hpl.dll
Resource
win7-20220311-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
helf.hpl.dll
Resource
win10v2004-20220310-en
0 signatures
0 seconds
General
-
Target
helf.hpl.dll
-
Size
1.7MB
-
MD5
5df3d0f5c72cf5e5f5558d0427fbe188
-
SHA1
7f3d18d51f70b226fd93cdcc50b30f24584e54a9
-
SHA256
446322c5499d41edee0ca0b83aba36f0cc74ed4743a2e50e6eb36d2a3469d85f
-
SHA512
85b4bac6afcb5e909ba6b805ef14479305a785a68b99893287bdb07c5a55e51db8f22c2ab5343d7898e07a8de424357377aacd8c5c1288e06d07fefaa2d0c757
Score
10/10
Malware Config
Extracted
Family
hancitor
Botnet
2103_punosh
C2
http://nanogeelr.com/9/forum.php
http://ockpitehou.ru/9/forum.php
http://lumentsawfu.ru/9/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Program crash 1 IoCs
pid pid_target Process procid_target 860 4880 WerFault.exe 82 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4344 wrote to memory of 4880 4344 rundll32.exe 82 PID 4344 wrote to memory of 4880 4344 rundll32.exe 82 PID 4344 wrote to memory of 4880 4344 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\helf.hpl.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\helf.hpl.dll,#12⤵PID:4880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4880 -s 6483⤵
- Program crash
PID:860
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4880 -ip 48801⤵PID:4000