Analysis
-
max time kernel
34s -
max time network
60s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-05-2022 22:44
Static task
static1
Behavioral task
behavioral1
Sample
81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe
Resource
win10v2004-20220414-en
General
-
Target
81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe
-
Size
521KB
-
MD5
6daad96aa8bb3a1dd6de3e17e37e4d04
-
SHA1
5974bbf965584a1a36c346710210bc4340f2e914
-
SHA256
81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218
-
SHA512
5f4a042cb09bd0de477b69f19d832b58470de7328c79489ee953712c071acbac72fd0fc79f014f22f95d3173f2baea73e2086ab87c33898d6d709a3539b81324
Malware Config
Extracted
hancitor
1410_7_qw
http://iverspriturs.com/7/forum.php
http://chormetdendu.ru/7/forum.php
http://appinrelifle.ru/7/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Executes dropped EXE 1 IoCs
Processes:
WinHost32.exepid Process 2024 WinHost32.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 1532 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exepid Process 1108 81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe 1108 81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinHost32 = "C:\\Windows\\System32\\WinHost32.exe" 81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org -
Drops file in System32 directory 1 IoCs
Processes:
81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exedescription ioc Process File created C:\Windows\SysWOW64\WinHost32.exe 81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exeWinHost32.exepid Process 1108 81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe 2024 WinHost32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exedescription pid Process procid_target PID 1108 wrote to memory of 2024 1108 81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe 28 PID 1108 wrote to memory of 2024 1108 81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe 28 PID 1108 wrote to memory of 2024 1108 81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe 28 PID 1108 wrote to memory of 2024 1108 81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe 28 PID 1108 wrote to memory of 1532 1108 81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe 29 PID 1108 wrote to memory of 1532 1108 81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe 29 PID 1108 wrote to memory of 1532 1108 81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe 29 PID 1108 wrote to memory of 1532 1108 81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe"C:\Users\Admin\AppData\Local\Temp\81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\WinHost32.exeC:\Windows\System32\WinHost32.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2024
-
-
C:\Windows\SysWOW64\cmd.exe/c del C:\Users\Admin\AppData\Local\Temp\81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe >> NUL2⤵
- Deletes itself
PID:1532
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
521KB
MD56daad96aa8bb3a1dd6de3e17e37e4d04
SHA15974bbf965584a1a36c346710210bc4340f2e914
SHA25681b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218
SHA5125f4a042cb09bd0de477b69f19d832b58470de7328c79489ee953712c071acbac72fd0fc79f014f22f95d3173f2baea73e2086ab87c33898d6d709a3539b81324
-
Filesize
521KB
MD56daad96aa8bb3a1dd6de3e17e37e4d04
SHA15974bbf965584a1a36c346710210bc4340f2e914
SHA25681b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218
SHA5125f4a042cb09bd0de477b69f19d832b58470de7328c79489ee953712c071acbac72fd0fc79f014f22f95d3173f2baea73e2086ab87c33898d6d709a3539b81324
-
Filesize
521KB
MD56daad96aa8bb3a1dd6de3e17e37e4d04
SHA15974bbf965584a1a36c346710210bc4340f2e914
SHA25681b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218
SHA5125f4a042cb09bd0de477b69f19d832b58470de7328c79489ee953712c071acbac72fd0fc79f014f22f95d3173f2baea73e2086ab87c33898d6d709a3539b81324