Analysis
-
max time kernel
135s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2022 11:37
Behavioral task
behavioral1
Sample
1b8f5b13d79bd9de5c10dc79514ce51b.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1b8f5b13d79bd9de5c10dc79514ce51b.doc
Resource
win10v2004-20220901-en
General
-
Target
1b8f5b13d79bd9de5c10dc79514ce51b.doc
-
Size
1.3MB
-
MD5
1b8f5b13d79bd9de5c10dc79514ce51b
-
SHA1
a23aeb990164016156951ab1707787122748c8e4
-
SHA256
eba7c89f492f23bb3cc86520cdd0463be93cdde7ce12674ddb2a109bb4b2bf5c
-
SHA512
c68026fef436aeed967d560740539417fd3e6603a9f34312bf86469947f5dc3beffae48e012958865825d73624274e39590444543f71e8a770ce4a0284d551e5
-
SSDEEP
24576:bEIZ4wA74D4SQKxZcy8gthDWs/chYusVNVQK0U/B89:b+wJD4QZh/qKKMn70uB8
Malware Config
Extracted
hancitor
2306_vensip
http://extilivelly.com/8/forum.php
http://cludimetifte.ru/8/forum.php
http://sakincesed.ru/8/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 3456 4964 rundll32.exe 80 -
Blocklisted process makes network request 1 IoCs
flow pid Process 28 2588 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 2588 rundll32.exe 2588 rundll32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 27 api.ipify.org -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\{BD463521-BBAD-4FB0-A701-4F89E9EA15A0}\kiks.dll:Zone.Identifier WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4964 WINWORD.EXE 4964 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2588 rundll32.exe 2588 rundll32.exe 2588 rundll32.exe 2588 rundll32.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 4964 WINWORD.EXE 4964 WINWORD.EXE 4964 WINWORD.EXE 4964 WINWORD.EXE 4964 WINWORD.EXE 4964 WINWORD.EXE 4964 WINWORD.EXE 4964 WINWORD.EXE 4964 WINWORD.EXE 4964 WINWORD.EXE 4964 WINWORD.EXE 4964 WINWORD.EXE 4964 WINWORD.EXE 4964 WINWORD.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4964 wrote to memory of 4512 4964 WINWORD.EXE 82 PID 4964 wrote to memory of 4512 4964 WINWORD.EXE 82 PID 4964 wrote to memory of 3456 4964 WINWORD.EXE 86 PID 4964 wrote to memory of 3456 4964 WINWORD.EXE 86 PID 3456 wrote to memory of 2588 3456 rundll32.exe 87 PID 3456 wrote to memory of 2588 3456 rundll32.exe 87 PID 3456 wrote to memory of 2588 3456 rundll32.exe 87
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1b8f5b13d79bd9de5c10dc79514ce51b.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:4512
-
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" c:\users\admin\appdata\roaming\microsoft\templates\kikus.dll,OFCBWXTHRNL2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" c:\users\admin\appdata\roaming\microsoft\templates\kikus.dll,OFCBWXTHRNL3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2588
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
721KB
MD5a262c1a1c8340713d85d9b7a5f39b727
SHA1a69a05c77f4c55910312183b3f4b1fdb5fe46086
SHA256c26bee09b4db1e7e5d191905d811ee1af39a4fb8b629f3b9aa4374a55c32823d
SHA512aefc908887c8efaf2080337b06e6195787d5a164fad8059b7e3b21052f168b75f4b44e126ca68a515d7082161019c3f77e102a1c693b64cbf6d9ba8ea51c943e
-
Filesize
721KB
MD5a262c1a1c8340713d85d9b7a5f39b727
SHA1a69a05c77f4c55910312183b3f4b1fdb5fe46086
SHA256c26bee09b4db1e7e5d191905d811ee1af39a4fb8b629f3b9aa4374a55c32823d
SHA512aefc908887c8efaf2080337b06e6195787d5a164fad8059b7e3b21052f168b75f4b44e126ca68a515d7082161019c3f77e102a1c693b64cbf6d9ba8ea51c943e
-
Filesize
721KB
MD5a262c1a1c8340713d85d9b7a5f39b727
SHA1a69a05c77f4c55910312183b3f4b1fdb5fe46086
SHA256c26bee09b4db1e7e5d191905d811ee1af39a4fb8b629f3b9aa4374a55c32823d
SHA512aefc908887c8efaf2080337b06e6195787d5a164fad8059b7e3b21052f168b75f4b44e126ca68a515d7082161019c3f77e102a1c693b64cbf6d9ba8ea51c943e