Analysis
-
max time kernel
85s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
04-07-2022 18:40
Static task
static1
Behavioral task
behavioral1
Sample
something.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
something.doc
Resource
win10v2004-20220414-en
General
-
Target
something.doc
-
Size
943KB
-
MD5
f994697106f7c6cef2f394a9429d9e67
-
SHA1
15252272f8d6911731eef807a49f045ff97a8a46
-
SHA256
3a2a1eff040a79d603b1ac2609a423ad8beb46d2876aa959f60dc98477707c0f
-
SHA512
d1646c3c35da147be80aa425d3ebd07fd05af54c96daef85c1f4e59b450fc8e5bd0774c2c9ebe465aa30cfb74e7a9f1b7203bbbcd36936eb5e56e2e814e04bb4
Malware Config
Extracted
hancitor
2103_punosh
http://nanogeelr.com/9/forum.php
http://ockpitehou.ru/9/forum.php
http://lumentsawfu.ru/9/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
extrac32.exerundll32.exedescription pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 936 4704 extrac32.exe 81 Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 4680 4704 rundll32.exe 81 -
Blocklisted process makes network request 3 IoCs
Processes:
rundll32.exeflow pid Process 40 1460 rundll32.exe 43 1460 rundll32.exe 50 1460 rundll32.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid Process 1460 rundll32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 39 api.ipify.org -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
NTFS ADS 3 IoCs
Processes:
WINWORD.EXEdescription ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\{72969F7A-0540-42F9-A6EA-1D1A38F9D018}\borw4.doc:Zone.Identifier WINWORD.EXE File opened for modification C:\Users\Admin\AppData\Local\Temp\{72969F7A-0540-42F9-A6EA-1D1A38F9D018}\borw4 (2).doc:Zone.Identifier WINWORD.EXE File opened for modification C:\Users\Admin\AppData\Local\Temp\{72969F7A-0540-42F9-A6EA-1D1A38F9D018}\helf.hp_:Zone.Identifier WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid Process 4704 WINWORD.EXE 4704 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid Process 1460 rundll32.exe 1460 rundll32.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
Processes:
WINWORD.EXEpid Process 4704 WINWORD.EXE 4704 WINWORD.EXE 4704 WINWORD.EXE 4704 WINWORD.EXE 4704 WINWORD.EXE 4704 WINWORD.EXE 4704 WINWORD.EXE 4704 WINWORD.EXE 4704 WINWORD.EXE 4704 WINWORD.EXE 4704 WINWORD.EXE 4704 WINWORD.EXE 4704 WINWORD.EXE 4704 WINWORD.EXE 4704 WINWORD.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
WINWORD.EXErundll32.exedescription pid Process procid_target PID 4704 wrote to memory of 3512 4704 WINWORD.EXE 88 PID 4704 wrote to memory of 3512 4704 WINWORD.EXE 88 PID 4704 wrote to memory of 936 4704 WINWORD.EXE 92 PID 4704 wrote to memory of 936 4704 WINWORD.EXE 92 PID 4704 wrote to memory of 4680 4704 WINWORD.EXE 93 PID 4704 wrote to memory of 4680 4704 WINWORD.EXE 93 PID 4680 wrote to memory of 1460 4680 rundll32.exe 94 PID 4680 wrote to memory of 1460 4680 rundll32.exe 94 PID 4680 wrote to memory of 1460 4680 rundll32.exe 94
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\something.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:3512
-
-
C:\Windows\SYSTEM32\extrac32.exeextrac32.exe helff.hp_2⤵
- Process spawned unexpected child process
PID:936
-
-
C:\Windows\SYSTEM32\rundll32.exerundll32.exe helf.hpl,YDCFOMQICNKAUXS2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe helf.hpl,YDCFOMQICNKAUXS3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1460
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD55df3d0f5c72cf5e5f5558d0427fbe188
SHA17f3d18d51f70b226fd93cdcc50b30f24584e54a9
SHA256446322c5499d41edee0ca0b83aba36f0cc74ed4743a2e50e6eb36d2a3469d85f
SHA51285b4bac6afcb5e909ba6b805ef14479305a785a68b99893287bdb07c5a55e51db8f22c2ab5343d7898e07a8de424357377aacd8c5c1288e06d07fefaa2d0c757
-
Filesize
799KB
MD50e71bc3c48b2cb1b5fcd107c2a1eb772
SHA19276387d7ba0f9a92b743c6d7cca30ce92752308
SHA256d71ba9640c1c7bb714cd772a6a8c5f62affa9230e3eb68dcdd89793452178c40
SHA512bfe545e8bedd2e7582811fbb88d6286ed23b985c68fed55340309b3baf6c85f3b8ec2b3cf4b85d65c36ceba5f034c0dc8773fc0c5d0bad7f0c8499d0b5a9fcdf
-
Filesize
1.7MB
MD55df3d0f5c72cf5e5f5558d0427fbe188
SHA17f3d18d51f70b226fd93cdcc50b30f24584e54a9
SHA256446322c5499d41edee0ca0b83aba36f0cc74ed4743a2e50e6eb36d2a3469d85f
SHA51285b4bac6afcb5e909ba6b805ef14479305a785a68b99893287bdb07c5a55e51db8f22c2ab5343d7898e07a8de424357377aacd8c5c1288e06d07fefaa2d0c757