Analysis
-
max time kernel
151s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
23-05-2022 21:14
Static task
static1
Behavioral task
behavioral1
Sample
ce2570dda3b92d0adfadfe00ee18302e98a0b9611ca1043954290961cd2fe8a8.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ce2570dda3b92d0adfadfe00ee18302e98a0b9611ca1043954290961cd2fe8a8.dll
Resource
win10v2004-20220414-en
General
-
Target
ce2570dda3b92d0adfadfe00ee18302e98a0b9611ca1043954290961cd2fe8a8.dll
-
Size
108KB
-
MD5
d668b501a15c545b8eb1daaa74376aba
-
SHA1
8ae3879a74aa507eaa8bf3b25f45b973c979b588
-
SHA256
ce2570dda3b92d0adfadfe00ee18302e98a0b9611ca1043954290961cd2fe8a8
-
SHA512
54e5fa3768880ede13780001c7d6c449f2eb34f6b075e714dc2c3b2c50056e9de5565396f1ada119cac1eabc26cc912eb15f3cc65ae2b1302afd6c519ddd08b8
Malware Config
Extracted
hancitor
2110_21378
http://keramenzakt.com/4/forum.php
http://linglentelevox.ru/4/forum.php
http://mdistellerryck.ru/4/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid Process procid_target PID 4372 set thread context of 4104 4372 rundll32.exe 80 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
svchost.exepid Process 4104 svchost.exe 4104 svchost.exe 4104 svchost.exe 4104 svchost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
rundll32.exerundll32.exedescription pid Process procid_target PID 1996 wrote to memory of 4372 1996 rundll32.exe 79 PID 1996 wrote to memory of 4372 1996 rundll32.exe 79 PID 1996 wrote to memory of 4372 1996 rundll32.exe 79 PID 4372 wrote to memory of 4104 4372 rundll32.exe 80 PID 4372 wrote to memory of 4104 4372 rundll32.exe 80 PID 4372 wrote to memory of 4104 4372 rundll32.exe 80 PID 4372 wrote to memory of 4104 4372 rundll32.exe 80 PID 4372 wrote to memory of 4104 4372 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce2570dda3b92d0adfadfe00ee18302e98a0b9611ca1043954290961cd2fe8a8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce2570dda3b92d0adfadfe00ee18302e98a0b9611ca1043954290961cd2fe8a8.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4104
-
-