Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08/06/2022, 21:32
Static task
static1
Behavioral task
behavioral1
Sample
17454b5c4de7f3404668c1bf54a691c577b9c26adf5987b7c6fa748fc1267963.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
17454b5c4de7f3404668c1bf54a691c577b9c26adf5987b7c6fa748fc1267963.dll
Resource
win10v2004-20220414-en
General
-
Target
17454b5c4de7f3404668c1bf54a691c577b9c26adf5987b7c6fa748fc1267963.dll
-
Size
147KB
-
MD5
807270038736d7095ef4c134afac8054
-
SHA1
56df9dca3588f02d6d44946651bf134116e50e14
-
SHA256
17454b5c4de7f3404668c1bf54a691c577b9c26adf5987b7c6fa748fc1267963
-
SHA512
3f9e21b7076eff56735d784ddb5902274bfc6bc899a43a13ba8510e1ed00daa87ee1f867bea488f637601a829d4c424dccd039e07160014230b859731db182d7
Malware Config
Extracted
hancitor
2410_43984389
http://wickawbarrysci.com/4/forum.php
http://scangescangomu.ru/4/forum.php
http://penreleaplif.ru/4/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1664 set thread context of 1656 1664 rundll32.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1656 svchost.exe 1656 svchost.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1260 wrote to memory of 1664 1260 rundll32.exe 27 PID 1260 wrote to memory of 1664 1260 rundll32.exe 27 PID 1260 wrote to memory of 1664 1260 rundll32.exe 27 PID 1260 wrote to memory of 1664 1260 rundll32.exe 27 PID 1260 wrote to memory of 1664 1260 rundll32.exe 27 PID 1260 wrote to memory of 1664 1260 rundll32.exe 27 PID 1260 wrote to memory of 1664 1260 rundll32.exe 27 PID 1664 wrote to memory of 1656 1664 rundll32.exe 28 PID 1664 wrote to memory of 1656 1664 rundll32.exe 28 PID 1664 wrote to memory of 1656 1664 rundll32.exe 28 PID 1664 wrote to memory of 1656 1664 rundll32.exe 28 PID 1664 wrote to memory of 1656 1664 rundll32.exe 28 PID 1664 wrote to memory of 1656 1664 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\17454b5c4de7f3404668c1bf54a691c577b9c26adf5987b7c6fa748fc1267963.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\17454b5c4de7f3404668c1bf54a691c577b9c26adf5987b7c6fa748fc1267963.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1656
-
-