Analysis
-
max time kernel
44s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-07-2022 01:02
Static task
static1
Behavioral task
behavioral1
Sample
42cb082a5dcb4ef8a553d38b15f87aa0f5f408a8b78adf3320288320fac5c24d.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
42cb082a5dcb4ef8a553d38b15f87aa0f5f408a8b78adf3320288320fac5c24d.dll
Resource
win10v2004-20220414-en
General
-
Target
42cb082a5dcb4ef8a553d38b15f87aa0f5f408a8b78adf3320288320fac5c24d.dll
-
Size
136KB
-
MD5
dda7f3bb9dee24e6e2564ed656f1bf64
-
SHA1
e1ff05e4be55cae9a5d2035f40e923bbdda4b90c
-
SHA256
42cb082a5dcb4ef8a553d38b15f87aa0f5f408a8b78adf3320288320fac5c24d
-
SHA512
b832c2967366b62ccdb6d14f9ab22ce9b42862a2261aefd21bdc43bb1c8d2938ba91e85cd9f94a48a721a220df202866635f7c2dd20a9faa528eb1484fa77753
Malware Config
Extracted
hancitor
1212_78342432
http://vistiver.com/4/forum.php
http://thimemple.ru/4/forum.php
http://capandotd.ru/4/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 1276 set thread context of 1508 1276 rundll32.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
svchost.exepid process 1508 svchost.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1824 wrote to memory of 1276 1824 rundll32.exe rundll32.exe PID 1824 wrote to memory of 1276 1824 rundll32.exe rundll32.exe PID 1824 wrote to memory of 1276 1824 rundll32.exe rundll32.exe PID 1824 wrote to memory of 1276 1824 rundll32.exe rundll32.exe PID 1824 wrote to memory of 1276 1824 rundll32.exe rundll32.exe PID 1824 wrote to memory of 1276 1824 rundll32.exe rundll32.exe PID 1824 wrote to memory of 1276 1824 rundll32.exe rundll32.exe PID 1276 wrote to memory of 1508 1276 rundll32.exe svchost.exe PID 1276 wrote to memory of 1508 1276 rundll32.exe svchost.exe PID 1276 wrote to memory of 1508 1276 rundll32.exe svchost.exe PID 1276 wrote to memory of 1508 1276 rundll32.exe svchost.exe PID 1276 wrote to memory of 1508 1276 rundll32.exe svchost.exe PID 1276 wrote to memory of 1508 1276 rundll32.exe svchost.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\42cb082a5dcb4ef8a553d38b15f87aa0f5f408a8b78adf3320288320fac5c24d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\42cb082a5dcb4ef8a553d38b15f87aa0f5f408a8b78adf3320288320fac5c24d.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1508
-
-