Analysis
-
max time kernel
117s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-05-2022 22:44
Static task
static1
Behavioral task
behavioral1
Sample
81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe
Resource
win10v2004-20220414-en
General
-
Target
81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe
-
Size
521KB
-
MD5
6daad96aa8bb3a1dd6de3e17e37e4d04
-
SHA1
5974bbf965584a1a36c346710210bc4340f2e914
-
SHA256
81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218
-
SHA512
5f4a042cb09bd0de477b69f19d832b58470de7328c79489ee953712c071acbac72fd0fc79f014f22f95d3173f2baea73e2086ab87c33898d6d709a3539b81324
Malware Config
Extracted
hancitor
1410_7_qw
http://iverspriturs.com/7/forum.php
http://chormetdendu.ru/7/forum.php
http://appinrelifle.ru/7/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Executes dropped EXE 1 IoCs
Processes:
WinHost32.exepid Process 2164 WinHost32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinHost32 = "C:\\Windows\\System32\\WinHost32.exe" 81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 19 api.ipify.org -
Drops file in System32 directory 1 IoCs
Processes:
81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exedescription ioc Process File created C:\Windows\SysWOW64\WinHost32.exe 81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exeWinHost32.exepid Process 2420 81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe 2420 81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe 2164 WinHost32.exe 2164 WinHost32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exedescription pid Process procid_target PID 2420 wrote to memory of 2164 2420 81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe 82 PID 2420 wrote to memory of 2164 2420 81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe 82 PID 2420 wrote to memory of 2164 2420 81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe 82 PID 2420 wrote to memory of 4944 2420 81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe 83 PID 2420 wrote to memory of 4944 2420 81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe 83 PID 2420 wrote to memory of 4944 2420 81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe"C:\Users\Admin\AppData\Local\Temp\81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\WinHost32.exeC:\Windows\System32\WinHost32.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2164
-
-
C:\Windows\SysWOW64\cmd.exe/c del C:\Users\Admin\AppData\Local\Temp\81b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218.exe >> NUL2⤵PID:4944
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
521KB
MD56daad96aa8bb3a1dd6de3e17e37e4d04
SHA15974bbf965584a1a36c346710210bc4340f2e914
SHA25681b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218
SHA5125f4a042cb09bd0de477b69f19d832b58470de7328c79489ee953712c071acbac72fd0fc79f014f22f95d3173f2baea73e2086ab87c33898d6d709a3539b81324
-
Filesize
521KB
MD56daad96aa8bb3a1dd6de3e17e37e4d04
SHA15974bbf965584a1a36c346710210bc4340f2e914
SHA25681b23d07b580c16b60d35fcd4dc399313042394ad795f2241754ede59745b218
SHA5125f4a042cb09bd0de477b69f19d832b58470de7328c79489ee953712c071acbac72fd0fc79f014f22f95d3173f2baea73e2086ab87c33898d6d709a3539b81324