Analysis
-
max time kernel
129s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 10:08
Static task
static1
Behavioral task
behavioral1
Sample
9059535c4c046e8292e3b7528c624af59886aeea8509f289b2a195b0fc83c559.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
9059535c4c046e8292e3b7528c624af59886aeea8509f289b2a195b0fc83c559.dll
Resource
win10v2004-20220414-en
General
-
Target
9059535c4c046e8292e3b7528c624af59886aeea8509f289b2a195b0fc83c559.dll
-
Size
174KB
-
MD5
756dbecf943dd53febeb85b2ce28663a
-
SHA1
221fda0aa2748a9ef518ad568e4038ce7a466ecf
-
SHA256
9059535c4c046e8292e3b7528c624af59886aeea8509f289b2a195b0fc83c559
-
SHA512
651a5ad4a7aa001464260ad0bb9ed5504910b5c8917ea85a93860e3d08bf8e922e24f466dd28d7f4e024e4297fa925bb513f47177277ae098ff9ea826b06e991
Malware Config
Extracted
hancitor
1811_67213
http://elesengrity.com/4/forum.php
http://lardempotr.ru/4/forum.php
http://dethavare.ru/4/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3368 set thread context of 4164 3368 rundll32.exe 80 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4164 svchost.exe 4164 svchost.exe 4164 svchost.exe 4164 svchost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3848 wrote to memory of 3368 3848 rundll32.exe 79 PID 3848 wrote to memory of 3368 3848 rundll32.exe 79 PID 3848 wrote to memory of 3368 3848 rundll32.exe 79 PID 3368 wrote to memory of 4164 3368 rundll32.exe 80 PID 3368 wrote to memory of 4164 3368 rundll32.exe 80 PID 3368 wrote to memory of 4164 3368 rundll32.exe 80 PID 3368 wrote to memory of 4164 3368 rundll32.exe 80 PID 3368 wrote to memory of 4164 3368 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9059535c4c046e8292e3b7528c624af59886aeea8509f289b2a195b0fc83c559.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9059535c4c046e8292e3b7528c624af59886aeea8509f289b2a195b0fc83c559.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4164
-
-