Analysis
-
max time kernel
149s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
23-05-2022 21:14
Static task
static1
Behavioral task
behavioral1
Sample
ce2570dda3b92d0adfadfe00ee18302e98a0b9611ca1043954290961cd2fe8a8.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ce2570dda3b92d0adfadfe00ee18302e98a0b9611ca1043954290961cd2fe8a8.dll
Resource
win10v2004-20220414-en
General
-
Target
ce2570dda3b92d0adfadfe00ee18302e98a0b9611ca1043954290961cd2fe8a8.dll
-
Size
108KB
-
MD5
d668b501a15c545b8eb1daaa74376aba
-
SHA1
8ae3879a74aa507eaa8bf3b25f45b973c979b588
-
SHA256
ce2570dda3b92d0adfadfe00ee18302e98a0b9611ca1043954290961cd2fe8a8
-
SHA512
54e5fa3768880ede13780001c7d6c449f2eb34f6b075e714dc2c3b2c50056e9de5565396f1ada119cac1eabc26cc912eb15f3cc65ae2b1302afd6c519ddd08b8
Malware Config
Extracted
hancitor
2110_21378
http://keramenzakt.com/4/forum.php
http://linglentelevox.ru/4/forum.php
http://mdistellerryck.ru/4/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid Process procid_target PID 364 set thread context of 1740 364 rundll32.exe 29 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
svchost.exepid Process 1740 svchost.exe 1740 svchost.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
rundll32.exerundll32.exedescription pid Process procid_target PID 336 wrote to memory of 364 336 rundll32.exe 15 PID 336 wrote to memory of 364 336 rundll32.exe 15 PID 336 wrote to memory of 364 336 rundll32.exe 15 PID 336 wrote to memory of 364 336 rundll32.exe 15 PID 336 wrote to memory of 364 336 rundll32.exe 15 PID 336 wrote to memory of 364 336 rundll32.exe 15 PID 336 wrote to memory of 364 336 rundll32.exe 15 PID 364 wrote to memory of 1740 364 rundll32.exe 29 PID 364 wrote to memory of 1740 364 rundll32.exe 29 PID 364 wrote to memory of 1740 364 rundll32.exe 29 PID 364 wrote to memory of 1740 364 rundll32.exe 29 PID 364 wrote to memory of 1740 364 rundll32.exe 29 PID 364 wrote to memory of 1740 364 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce2570dda3b92d0adfadfe00ee18302e98a0b9611ca1043954290961cd2fe8a8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce2570dda3b92d0adfadfe00ee18302e98a0b9611ca1043954290961cd2fe8a8.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1740
-
-