Analysis
-
max time kernel
147s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
31/05/2022, 05:53
Static task
static1
Behavioral task
behavioral1
Sample
067d89c1270799d20eecb3b91e644a634adacb154cf2a1c186c0f58b74090f43.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
067d89c1270799d20eecb3b91e644a634adacb154cf2a1c186c0f58b74090f43.dll
Resource
win10v2004-20220414-en
General
-
Target
067d89c1270799d20eecb3b91e644a634adacb154cf2a1c186c0f58b74090f43.dll
-
Size
274KB
-
MD5
e9143086453d552f0780426acb0af541
-
SHA1
740d5931036fe041e77a79b204969c2e0fe059ea
-
SHA256
067d89c1270799d20eecb3b91e644a634adacb154cf2a1c186c0f58b74090f43
-
SHA512
bc497bc12b08c90ae824b09704901d90c4cf66c355a6d384c2d69d16ef9e7a36ab97c968076056e58b5771f6182d82f52e77a86d62ccc9b1086bfd2ca54fc7bc
Malware Config
Extracted
hancitor
0210_328487
http://spausence.com/4/forum.php
http://wortionce.ru/4/forum.php
http://knoweent.ru/4/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4660 set thread context of 4744 4660 rundll32.exe 80 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4744 svchost.exe 4744 svchost.exe 4744 svchost.exe 4744 svchost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4416 wrote to memory of 4660 4416 rundll32.exe 79 PID 4416 wrote to memory of 4660 4416 rundll32.exe 79 PID 4416 wrote to memory of 4660 4416 rundll32.exe 79 PID 4660 wrote to memory of 4744 4660 rundll32.exe 80 PID 4660 wrote to memory of 4744 4660 rundll32.exe 80 PID 4660 wrote to memory of 4744 4660 rundll32.exe 80 PID 4660 wrote to memory of 4744 4660 rundll32.exe 80 PID 4660 wrote to memory of 4744 4660 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\067d89c1270799d20eecb3b91e644a634adacb154cf2a1c186c0f58b74090f43.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\067d89c1270799d20eecb3b91e644a634adacb154cf2a1c186c0f58b74090f43.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4744
-
-