Analysis
-
max time kernel
4294189s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
21-03-2022 16:40
Static task
static1
Behavioral task
behavioral1
Sample
helf.hpl.dll
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
helf.hpl.dll
Resource
win10v2004-en-20220113
General
-
Target
helf.hpl.dll
-
Size
1.7MB
-
MD5
5df3d0f5c72cf5e5f5558d0427fbe188
-
SHA1
7f3d18d51f70b226fd93cdcc50b30f24584e54a9
-
SHA256
446322c5499d41edee0ca0b83aba36f0cc74ed4743a2e50e6eb36d2a3469d85f
-
SHA512
85b4bac6afcb5e909ba6b805ef14479305a785a68b99893287bdb07c5a55e51db8f22c2ab5343d7898e07a8de424357377aacd8c5c1288e06d07fefaa2d0c757
Malware Config
Extracted
hancitor
2103_punosh
http://nanogeelr.com/9/forum.php
http://ockpitehou.ru/9/forum.php
http://lumentsawfu.ru/9/forum.php
Extracted
arkei
Default
http://sughicent.com/blaka.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
suricata: ET MALWARE Suspected Win32/Hancitor Checkin
suricata: ET MALWARE Suspected Win32/Hancitor Checkin
-
Blocklisted process makes network request 4 IoCs
flow pid Process 5 912 rundll32.exe 7 912 rundll32.exe 9 912 rundll32.exe 13 912 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 1920 BN50EE.tmp -
Loads dropped DLL 4 IoCs
pid Process 912 rundll32.exe 912 rundll32.exe 1920 BN50EE.tmp 1920 BN50EE.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 BN50EE.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString BN50EE.tmp -
Delays execution with timeout.exe 1 IoCs
pid Process 2000 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 912 rundll32.exe 912 rundll32.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 948 wrote to memory of 912 948 rundll32.exe 27 PID 948 wrote to memory of 912 948 rundll32.exe 27 PID 948 wrote to memory of 912 948 rundll32.exe 27 PID 948 wrote to memory of 912 948 rundll32.exe 27 PID 948 wrote to memory of 912 948 rundll32.exe 27 PID 948 wrote to memory of 912 948 rundll32.exe 27 PID 948 wrote to memory of 912 948 rundll32.exe 27 PID 912 wrote to memory of 1920 912 rundll32.exe 30 PID 912 wrote to memory of 1920 912 rundll32.exe 30 PID 912 wrote to memory of 1920 912 rundll32.exe 30 PID 912 wrote to memory of 1920 912 rundll32.exe 30 PID 1920 wrote to memory of 916 1920 BN50EE.tmp 32 PID 1920 wrote to memory of 916 1920 BN50EE.tmp 32 PID 1920 wrote to memory of 916 1920 BN50EE.tmp 32 PID 1920 wrote to memory of 916 1920 BN50EE.tmp 32 PID 916 wrote to memory of 2000 916 cmd.exe 34 PID 916 wrote to memory of 2000 916 cmd.exe 34 PID 916 wrote to memory of 2000 916 cmd.exe 34 PID 916 wrote to memory of 2000 916 cmd.exe 34
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\helf.hpl.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\helf.hpl.dll,#12⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Local\Temp\BN50EE.tmpC:\Users\Admin\AppData\Local\Temp\BN50EE.tmp3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\BN50EE.tmp" & exit4⤵
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\timeout.exetimeout /t 55⤵
- Delays execution with timeout.exe
PID:2000
-
-
-
-