Resubmissions

04-07-2022 18:40

220704-xa7xwacga8 10

21-03-2022 16:46

220321-t944gsdbg7 10

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220310-en
  • submitted
    21-03-2022 16:46

General

  • Target

    something.doc

  • Size

    943KB

  • MD5

    f994697106f7c6cef2f394a9429d9e67

  • SHA1

    15252272f8d6911731eef807a49f045ff97a8a46

  • SHA256

    3a2a1eff040a79d603b1ac2609a423ad8beb46d2876aa959f60dc98477707c0f

  • SHA512

    d1646c3c35da147be80aa425d3ebd07fd05af54c96daef85c1f4e59b450fc8e5bd0774c2c9ebe465aa30cfb74e7a9f1b7203bbbcd36936eb5e56e2e814e04bb4

Malware Config

Extracted

Family

hancitor

Botnet

2103_punosh

C2

http://nanogeelr.com/9/forum.php

http://ockpitehou.ru/9/forum.php

http://lumentsawfu.ru/9/forum.php

Extracted

Family

arkei

Botnet

Default

C2

http://sughicent.com/blaka.php

Signatures

  • Arkei

    Arkei is an infostealer written in C++.

  • Hancitor

    Hancitor is downloader used to deliver other malware families.

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 62 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • NTFS ADS 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\something.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2940
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:3684
      • C:\Windows\SYSTEM32\extrac32.exe
        extrac32.exe helff.hp_
        2⤵
        • Process spawned unexpected child process
        PID:4328
      • C:\Windows\SYSTEM32\rundll32.exe
        rundll32.exe helf.hpl,YDCFOMQICNKAUXS
        2⤵
        • Process spawned unexpected child process
        • Suspicious use of WriteProcessMemory
        PID:3720
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe helf.hpl,YDCFOMQICNKAUXS
          3⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:5012
          • C:\Users\Admin\AppData\Local\Temp\BNCFFF.tmp
            C:\Users\Admin\AppData\Local\Temp\BNCFFF.tmp
            4⤵
            • Executes dropped EXE
            • Checks computer location settings
            • Loads dropped DLL
            • Checks processor information in registry
            • Suspicious use of WriteProcessMemory
            PID:1176
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\BNCFFF.tmp" & exit
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:4956
              • C:\Windows\SysWOW64\timeout.exe
                timeout /t 5
                6⤵
                • Delays execution with timeout.exe
                PID:1820
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      PID:2876
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
      1⤵
        PID:4372

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\mozglue.dll

        MD5

        8f73c08a9660691143661bf7332c3c27

        SHA1

        37fa65dd737c50fda710fdbde89e51374d0c204a

        SHA256

        3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

        SHA512

        0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

      • C:\ProgramData\nss3.dll

        MD5

        bfac4e3c5908856ba17d41edcd455a51

        SHA1

        8eec7e888767aa9e4cca8ff246eb2aacb9170428

        SHA256

        e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

        SHA512

        2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

      • C:\Users\Admin\AppData\Local\Temp\BNCFFF.tmp

        MD5

        2e89a7aae558e9be86042e2bd7e65803

        SHA1

        64e85269651f0a475d0a94eb98cd3adbf3061e10

        SHA256

        7022a16d455a3ad78d0bbeeb2793cb35e48822c3a0a8d9eaa326ffc91dd9e625

        SHA512

        333d17a364c4e3b226de86dfb3cc2b74684c4a37a30d3e690ca69c4be2119f4f4184ea59c7557cfccf4ce78f8c3bc67f0a4360fd465cd8bb44808ab4ccb07f1b

      • C:\Users\Admin\AppData\Local\Temp\BNCFFF.tmp

        MD5

        2e89a7aae558e9be86042e2bd7e65803

        SHA1

        64e85269651f0a475d0a94eb98cd3adbf3061e10

        SHA256

        7022a16d455a3ad78d0bbeeb2793cb35e48822c3a0a8d9eaa326ffc91dd9e625

        SHA512

        333d17a364c4e3b226de86dfb3cc2b74684c4a37a30d3e690ca69c4be2119f4f4184ea59c7557cfccf4ce78f8c3bc67f0a4360fd465cd8bb44808ab4ccb07f1b

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\helf.hpl

        MD5

        5df3d0f5c72cf5e5f5558d0427fbe188

        SHA1

        7f3d18d51f70b226fd93cdcc50b30f24584e54a9

        SHA256

        446322c5499d41edee0ca0b83aba36f0cc74ed4743a2e50e6eb36d2a3469d85f

        SHA512

        85b4bac6afcb5e909ba6b805ef14479305a785a68b99893287bdb07c5a55e51db8f22c2ab5343d7898e07a8de424357377aacd8c5c1288e06d07fefaa2d0c757

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\helf.hpl

        MD5

        5df3d0f5c72cf5e5f5558d0427fbe188

        SHA1

        7f3d18d51f70b226fd93cdcc50b30f24584e54a9

        SHA256

        446322c5499d41edee0ca0b83aba36f0cc74ed4743a2e50e6eb36d2a3469d85f

        SHA512

        85b4bac6afcb5e909ba6b805ef14479305a785a68b99893287bdb07c5a55e51db8f22c2ab5343d7898e07a8de424357377aacd8c5c1288e06d07fefaa2d0c757

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\helff.hp_

        MD5

        0e71bc3c48b2cb1b5fcd107c2a1eb772

        SHA1

        9276387d7ba0f9a92b743c6d7cca30ce92752308

        SHA256

        d71ba9640c1c7bb714cd772a6a8c5f62affa9230e3eb68dcdd89793452178c40

        SHA512

        bfe545e8bedd2e7582811fbb88d6286ed23b985c68fed55340309b3baf6c85f3b8ec2b3cf4b85d65c36ceba5f034c0dc8773fc0c5d0bad7f0c8499d0b5a9fcdf

      • \??\c:\users\admin\appdata\roaming\microsoft\templates\helf.hpl

        MD5

        5df3d0f5c72cf5e5f5558d0427fbe188

        SHA1

        7f3d18d51f70b226fd93cdcc50b30f24584e54a9

        SHA256

        446322c5499d41edee0ca0b83aba36f0cc74ed4743a2e50e6eb36d2a3469d85f

        SHA512

        85b4bac6afcb5e909ba6b805ef14479305a785a68b99893287bdb07c5a55e51db8f22c2ab5343d7898e07a8de424357377aacd8c5c1288e06d07fefaa2d0c757

      • memory/1176-179-0x0000000000400000-0x000000000043C000-memory.dmp

        Filesize

        240KB

      • memory/1176-180-0x0000000060900000-0x0000000060992000-memory.dmp

        Filesize

        584KB

      • memory/1176-178-0x0000000001F30000-0x0000000001F59000-memory.dmp

        Filesize

        164KB

      • memory/2876-202-0x00000191C7E90000-0x00000191C7E94000-memory.dmp

        Filesize

        16KB

      • memory/2876-201-0x00000191C7E90000-0x00000191C7E94000-memory.dmp

        Filesize

        16KB

      • memory/2876-204-0x00000191C7F80000-0x00000191C7F84000-memory.dmp

        Filesize

        16KB

      • memory/2876-148-0x00000191C4B80000-0x00000191C4B90000-memory.dmp

        Filesize

        64KB

      • memory/2876-149-0x00000191C5560000-0x00000191C5570000-memory.dmp

        Filesize

        64KB

      • memory/2876-150-0x00000191C7B00000-0x00000191C7B04000-memory.dmp

        Filesize

        16KB

      • memory/2876-203-0x00000191C7F80000-0x00000191C7F84000-memory.dmp

        Filesize

        16KB

      • memory/2876-205-0x00000191C7FD0000-0x00000191C7FD4000-memory.dmp

        Filesize

        16KB

      • memory/2876-206-0x00000191C7FD0000-0x00000191C7FD4000-memory.dmp

        Filesize

        16KB

      • memory/2940-160-0x0000028FA7346000-0x0000028FA7347000-memory.dmp

        Filesize

        4KB

      • memory/2940-147-0x00007FFBB6390000-0x00007FFBB6585000-memory.dmp

        Filesize

        2.0MB

      • memory/2940-156-0x0000028FA7344000-0x0000028FA7345000-memory.dmp

        Filesize

        4KB

      • memory/2940-157-0x0000028FA7347000-0x0000028FA7348000-memory.dmp

        Filesize

        4KB

      • memory/2940-158-0x0000028FA7D40000-0x0000028FA7D41000-memory.dmp

        Filesize

        4KB

      • memory/2940-159-0x0000028FA7347000-0x0000028FA7348000-memory.dmp

        Filesize

        4KB

      • memory/2940-134-0x00007FFB76410000-0x00007FFB76420000-memory.dmp

        Filesize

        64KB

      • memory/2940-161-0x0000028FA7D3F000-0x0000028FA7D40000-memory.dmp

        Filesize

        4KB

      • memory/2940-162-0x0000028FA7D41000-0x0000028FA7D42000-memory.dmp

        Filesize

        4KB

      • memory/2940-163-0x0000028FA7D42000-0x0000028FA7D43000-memory.dmp

        Filesize

        4KB

      • memory/2940-153-0x0000028FA70AC000-0x0000028FA70AD000-memory.dmp

        Filesize

        4KB

      • memory/2940-165-0x0000028FA7344000-0x0000028FA7345000-memory.dmp

        Filesize

        4KB

      • memory/2940-151-0x0000028FA70AD000-0x0000028FA70AE000-memory.dmp

        Filesize

        4KB

      • memory/2940-152-0x0000028FA70AA000-0x0000028FA70AB000-memory.dmp

        Filesize

        4KB

      • memory/2940-135-0x00007FFB76410000-0x00007FFB76420000-memory.dmp

        Filesize

        64KB

      • memory/2940-136-0x00007FFB76410000-0x00007FFB76420000-memory.dmp

        Filesize

        64KB

      • memory/2940-137-0x00007FFB76410000-0x00007FFB76420000-memory.dmp

        Filesize

        64KB

      • memory/2940-154-0x0000028FA7346000-0x0000028FA7347000-memory.dmp

        Filesize

        4KB

      • memory/2940-146-0x00007FFBB6390000-0x00007FFBB6585000-memory.dmp

        Filesize

        2.0MB

      • memory/2940-173-0x00007FFB76410000-0x00007FFB76420000-memory.dmp

        Filesize

        64KB

      • memory/2940-174-0x00007FFB76410000-0x00007FFB76420000-memory.dmp

        Filesize

        64KB

      • memory/2940-175-0x00007FFB76410000-0x00007FFB76420000-memory.dmp

        Filesize

        64KB

      • memory/2940-176-0x00007FFB76410000-0x00007FFB76420000-memory.dmp

        Filesize

        64KB

      • memory/2940-177-0x00007FFBB6390000-0x00007FFBB6585000-memory.dmp

        Filesize

        2.0MB

      • memory/2940-145-0x00007FFBB6390000-0x00007FFBB6585000-memory.dmp

        Filesize

        2.0MB

      • memory/2940-144-0x00007FFBB6390000-0x00007FFBB6585000-memory.dmp

        Filesize

        2.0MB

      • memory/2940-143-0x00007FFBB6390000-0x00007FFBB6585000-memory.dmp

        Filesize

        2.0MB

      • memory/2940-142-0x00007FFBB6390000-0x00007FFBB6585000-memory.dmp

        Filesize

        2.0MB

      • memory/2940-141-0x00007FFBB6390000-0x00007FFBB6585000-memory.dmp

        Filesize

        2.0MB

      • memory/2940-140-0x00007FFBB6390000-0x00007FFBB6585000-memory.dmp

        Filesize

        2.0MB

      • memory/2940-139-0x00007FFBB6390000-0x00007FFBB6585000-memory.dmp

        Filesize

        2.0MB

      • memory/2940-138-0x00007FFB76410000-0x00007FFB76420000-memory.dmp

        Filesize

        64KB

      • memory/5012-170-0x0000000002430000-0x0000000002438000-memory.dmp

        Filesize

        32KB

      • memory/5012-169-0x0000000002410000-0x0000000002417000-memory.dmp

        Filesize

        28KB

      • memory/5012-168-0x00000000020C0000-0x000000000227C000-memory.dmp

        Filesize

        1.7MB