Analysis
-
max time kernel
43s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
04-06-2022 00:55
Static task
static1
Behavioral task
behavioral1
Sample
8bde2931a468cc81994985ec803bda715ea70ef2337defc252f404efc8650a51.vbs
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
8bde2931a468cc81994985ec803bda715ea70ef2337defc252f404efc8650a51.vbs
Resource
win10v2004-20220414-en
General
-
Target
8bde2931a468cc81994985ec803bda715ea70ef2337defc252f404efc8650a51.vbs
-
Size
592KB
-
MD5
393258a792991fdab17305e275e5fd31
-
SHA1
231f60bdb55fc4597a2e4d53d4a43d66429207d2
-
SHA256
8bde2931a468cc81994985ec803bda715ea70ef2337defc252f404efc8650a51
-
SHA512
5d67586c90180f0637379bc7537b180a9083e5a125a9927a7320151a6a8e23a0dffefddccc5712679d1c25c3baddf6e5ac34fa41ff1230484d51c9a7424ae644
Malware Config
Extracted
hancitor
1912_372823
http://howeelyzuq.com/4/forum.php
http://thriondery.ru/4/forum.php
http://craledlopj.ru/4/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
regsvr32.exedescription pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1708 740 regsvr32.exe 28 -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid Process 1656 regsvr32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
regsvr32.exedescription pid Process procid_target PID 1656 set thread context of 1144 1656 regsvr32.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
svchost.exepid Process 1144 svchost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
WScript.exepid Process 1668 WScript.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid Process procid_target PID 1708 wrote to memory of 1656 1708 regsvr32.exe 30 PID 1708 wrote to memory of 1656 1708 regsvr32.exe 30 PID 1708 wrote to memory of 1656 1708 regsvr32.exe 30 PID 1708 wrote to memory of 1656 1708 regsvr32.exe 30 PID 1708 wrote to memory of 1656 1708 regsvr32.exe 30 PID 1708 wrote to memory of 1656 1708 regsvr32.exe 30 PID 1708 wrote to memory of 1656 1708 regsvr32.exe 30 PID 1656 wrote to memory of 1144 1656 regsvr32.exe 31 PID 1656 wrote to memory of 1144 1656 regsvr32.exe 31 PID 1656 wrote to memory of 1144 1656 regsvr32.exe 31 PID 1656 wrote to memory of 1144 1656 regsvr32.exe 31 PID 1656 wrote to memory of 1144 1656 regsvr32.exe 31 PID 1656 wrote to memory of 1144 1656 regsvr32.exe 31
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\8bde2931a468cc81994985ec803bda715ea70ef2337defc252f404efc8650a51.vbs"1⤵
- Suspicious use of FindShellTrayWindow
PID:1668
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s C:\Users\Admin\AppData\Local\Temp\rNjdHLz.txt1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\regsvr32.exe-s C:\Users\Admin\AppData\Local\Temp\rNjdHLz.txt2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1144
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138KB
MD5ea193f350cbcdd48d5bd55e7ea934838
SHA1b22ca46d1da866f4675916580cf2e8cb690f984b
SHA256c1cbc33ffd320ea7657a732db883c989370e501fd902dcabfc8a1924b9e4d16b
SHA512b84dec2a5a9f01d051021018e3f67fc545c11b1d3aec329e95495d411fa7d761feac66034eeea33974260b8c9974111897a51fb50bd68ec71e507d4bcdc22e65
-
Filesize
138KB
MD5ea193f350cbcdd48d5bd55e7ea934838
SHA1b22ca46d1da866f4675916580cf2e8cb690f984b
SHA256c1cbc33ffd320ea7657a732db883c989370e501fd902dcabfc8a1924b9e4d16b
SHA512b84dec2a5a9f01d051021018e3f67fc545c11b1d3aec329e95495d411fa7d761feac66034eeea33974260b8c9974111897a51fb50bd68ec71e507d4bcdc22e65