General
-
Target
TopjQOYSxpfdTGMA.doc
-
Size
943KB
-
Sample
220328-wn8kwshcdj
-
MD5
45a45e8755d528a77314b2be258614df
-
SHA1
ac76e90a575865376c80a06c9f445110ff9e8819
-
SHA256
36167dcde57f9a12723e0af7f9ea7aba88dd8cc1bdd74b62df1f86aa9d2ba925
-
SHA512
47e687de6504ae5ec5eee0f1012c20c7b8cfc35f0efd203718b2c87160c1523087268a50a9a5b7177431325d79da8f7e247f4d5bb4e0dadcd14d5e9c960c0b2a
Static task
static1
Behavioral task
behavioral1
Sample
TopjQOYSxpfdTGMA.doc
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
TopjQOYSxpfdTGMA.doc
Resource
win10-20220223-en
Malware Config
Extracted
hancitor
2103_punosh
http://nanogeelr.com/9/forum.php
http://ockpitehou.ru/9/forum.php
http://lumentsawfu.ru/9/forum.php
Targets
-
-
Target
TopjQOYSxpfdTGMA.doc
-
Size
943KB
-
MD5
45a45e8755d528a77314b2be258614df
-
SHA1
ac76e90a575865376c80a06c9f445110ff9e8819
-
SHA256
36167dcde57f9a12723e0af7f9ea7aba88dd8cc1bdd74b62df1f86aa9d2ba925
-
SHA512
47e687de6504ae5ec5eee0f1012c20c7b8cfc35f0efd203718b2c87160c1523087268a50a9a5b7177431325d79da8f7e247f4d5bb4e0dadcd14d5e9c960c0b2a
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
suricata: ET MALWARE Suspected Win32/Hancitor Checkin
suricata: ET MALWARE Suspected Win32/Hancitor Checkin
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-