Resubmissions

04-07-2022 18:40

220704-xa7xwacga8 10

21-03-2022 16:46

220321-t944gsdbg7 10

Analysis

  • max time kernel
    85s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    04-07-2022 18:40

General

  • Target

    something.doc

  • Size

    943KB

  • MD5

    f994697106f7c6cef2f394a9429d9e67

  • SHA1

    15252272f8d6911731eef807a49f045ff97a8a46

  • SHA256

    3a2a1eff040a79d603b1ac2609a423ad8beb46d2876aa959f60dc98477707c0f

  • SHA512

    d1646c3c35da147be80aa425d3ebd07fd05af54c96daef85c1f4e59b450fc8e5bd0774c2c9ebe465aa30cfb74e7a9f1b7203bbbcd36936eb5e56e2e814e04bb4

Malware Config

Extracted

Family

hancitor

Botnet

2103_punosh

C2

http://nanogeelr.com/9/forum.php

http://ockpitehou.ru/9/forum.php

http://lumentsawfu.ru/9/forum.php

Signatures

  • Hancitor

    Hancitor is downloader used to deliver other malware families.

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\something.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4704
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:3512
      • C:\Windows\SYSTEM32\extrac32.exe
        extrac32.exe helff.hp_
        2⤵
        • Process spawned unexpected child process
        PID:936
      • C:\Windows\SYSTEM32\rundll32.exe
        rundll32.exe helf.hpl,YDCFOMQICNKAUXS
        2⤵
        • Process spawned unexpected child process
        • Suspicious use of WriteProcessMemory
        PID:4680
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe helf.hpl,YDCFOMQICNKAUXS
          3⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          PID:1460

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\helf.hpl

      Filesize

      1.7MB

      MD5

      5df3d0f5c72cf5e5f5558d0427fbe188

      SHA1

      7f3d18d51f70b226fd93cdcc50b30f24584e54a9

      SHA256

      446322c5499d41edee0ca0b83aba36f0cc74ed4743a2e50e6eb36d2a3469d85f

      SHA512

      85b4bac6afcb5e909ba6b805ef14479305a785a68b99893287bdb07c5a55e51db8f22c2ab5343d7898e07a8de424357377aacd8c5c1288e06d07fefaa2d0c757

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\helff.hp_

      Filesize

      799KB

      MD5

      0e71bc3c48b2cb1b5fcd107c2a1eb772

      SHA1

      9276387d7ba0f9a92b743c6d7cca30ce92752308

      SHA256

      d71ba9640c1c7bb714cd772a6a8c5f62affa9230e3eb68dcdd89793452178c40

      SHA512

      bfe545e8bedd2e7582811fbb88d6286ed23b985c68fed55340309b3baf6c85f3b8ec2b3cf4b85d65c36ceba5f034c0dc8773fc0c5d0bad7f0c8499d0b5a9fcdf

    • \??\c:\users\admin\appdata\roaming\microsoft\templates\helf.hpl

      Filesize

      1.7MB

      MD5

      5df3d0f5c72cf5e5f5558d0427fbe188

      SHA1

      7f3d18d51f70b226fd93cdcc50b30f24584e54a9

      SHA256

      446322c5499d41edee0ca0b83aba36f0cc74ed4743a2e50e6eb36d2a3469d85f

      SHA512

      85b4bac6afcb5e909ba6b805ef14479305a785a68b99893287bdb07c5a55e51db8f22c2ab5343d7898e07a8de424357377aacd8c5c1288e06d07fefaa2d0c757

    • memory/936-138-0x0000000000000000-mapping.dmp

    • memory/1460-152-0x0000000002750000-0x0000000002758000-memory.dmp

      Filesize

      32KB

    • memory/1460-147-0x0000000000E80000-0x0000000000E87000-memory.dmp

      Filesize

      28KB

    • memory/1460-145-0x0000000002750000-0x0000000002758000-memory.dmp

      Filesize

      32KB

    • memory/1460-144-0x0000000000E80000-0x0000000000E87000-memory.dmp

      Filesize

      28KB

    • memory/1460-142-0x0000000000000000-mapping.dmp

    • memory/3512-137-0x0000000000000000-mapping.dmp

    • memory/4680-140-0x0000000000000000-mapping.dmp

    • memory/4704-130-0x00007FFF72A50000-0x00007FFF72A60000-memory.dmp

      Filesize

      64KB

    • memory/4704-136-0x00007FFF708F0000-0x00007FFF70900000-memory.dmp

      Filesize

      64KB

    • memory/4704-135-0x00007FFF708F0000-0x00007FFF70900000-memory.dmp

      Filesize

      64KB

    • memory/4704-134-0x00007FFF72A50000-0x00007FFF72A60000-memory.dmp

      Filesize

      64KB

    • memory/4704-133-0x00007FFF72A50000-0x00007FFF72A60000-memory.dmp

      Filesize

      64KB

    • memory/4704-132-0x00007FFF72A50000-0x00007FFF72A60000-memory.dmp

      Filesize

      64KB

    • memory/4704-148-0x00007FFF72A50000-0x00007FFF72A60000-memory.dmp

      Filesize

      64KB

    • memory/4704-149-0x00007FFF72A50000-0x00007FFF72A60000-memory.dmp

      Filesize

      64KB

    • memory/4704-151-0x00007FFF72A50000-0x00007FFF72A60000-memory.dmp

      Filesize

      64KB

    • memory/4704-150-0x00007FFF72A50000-0x00007FFF72A60000-memory.dmp

      Filesize

      64KB

    • memory/4704-131-0x00007FFF72A50000-0x00007FFF72A60000-memory.dmp

      Filesize

      64KB