Analysis
-
max time kernel
44s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
14-07-2022 06:26
Static task
static1
Behavioral task
behavioral1
Sample
_2866571907494.vbs
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
_2866571907494.vbs
Resource
win10v2004-20220414-en
General
-
Target
_2866571907494.vbs
-
Size
579KB
-
MD5
d4bfbd62db6574ae4a90a0c2a9fd8427
-
SHA1
cc7c9ca8679b2efe00d18048b8a0beadc2d53cc9
-
SHA256
13aa175c12cd675b2a32d5bd252d35352811a036046e042ac5d1454957972bee
-
SHA512
f8cfc582aad8e09685538e1059d1e4ce154043e12ae477b809391ebaac777bc38eda82b6e4e1c282808702ef80f128d17714d4c43510653fd0929529ed1ce009
Malware Config
Extracted
hancitor
1212_78342432
http://vistiver.com/4/forum.php
http://thimemple.ru/4/forum.php
http://capandotd.ru/4/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
regsvr32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1212 952 regsvr32.exe -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 1680 regsvr32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1680 set thread context of 1144 1680 regsvr32.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
svchost.exepid process 1144 svchost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
WScript.exepid process 1808 WScript.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 1212 wrote to memory of 1680 1212 regsvr32.exe regsvr32.exe PID 1212 wrote to memory of 1680 1212 regsvr32.exe regsvr32.exe PID 1212 wrote to memory of 1680 1212 regsvr32.exe regsvr32.exe PID 1212 wrote to memory of 1680 1212 regsvr32.exe regsvr32.exe PID 1212 wrote to memory of 1680 1212 regsvr32.exe regsvr32.exe PID 1212 wrote to memory of 1680 1212 regsvr32.exe regsvr32.exe PID 1212 wrote to memory of 1680 1212 regsvr32.exe regsvr32.exe PID 1680 wrote to memory of 1144 1680 regsvr32.exe svchost.exe PID 1680 wrote to memory of 1144 1680 regsvr32.exe svchost.exe PID 1680 wrote to memory of 1144 1680 regsvr32.exe svchost.exe PID 1680 wrote to memory of 1144 1680 regsvr32.exe svchost.exe PID 1680 wrote to memory of 1144 1680 regsvr32.exe svchost.exe PID 1680 wrote to memory of 1144 1680 regsvr32.exe svchost.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_2866571907494.vbs"1⤵
- Suspicious use of FindShellTrayWindow
PID:1808
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s C:\Users\Admin\AppData\Local\Temp\htHvf.txt1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\regsvr32.exe-s C:\Users\Admin\AppData\Local\Temp\htHvf.txt2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1144
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5dda7f3bb9dee24e6e2564ed656f1bf64
SHA1e1ff05e4be55cae9a5d2035f40e923bbdda4b90c
SHA25642cb082a5dcb4ef8a553d38b15f87aa0f5f408a8b78adf3320288320fac5c24d
SHA512b832c2967366b62ccdb6d14f9ab22ce9b42862a2261aefd21bdc43bb1c8d2938ba91e85cd9f94a48a721a220df202866635f7c2dd20a9faa528eb1484fa77753
-
Filesize
136KB
MD5dda7f3bb9dee24e6e2564ed656f1bf64
SHA1e1ff05e4be55cae9a5d2035f40e923bbdda4b90c
SHA25642cb082a5dcb4ef8a553d38b15f87aa0f5f408a8b78adf3320288320fac5c24d
SHA512b832c2967366b62ccdb6d14f9ab22ce9b42862a2261aefd21bdc43bb1c8d2938ba91e85cd9f94a48a721a220df202866635f7c2dd20a9faa528eb1484fa77753