Analysis
-
max time kernel
143s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2022 11:38
Behavioral task
behavioral1
Sample
629a54dc90a2e5081588cba36bd4f489.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
629a54dc90a2e5081588cba36bd4f489.doc
Resource
win10v2004-20220812-en
General
-
Target
629a54dc90a2e5081588cba36bd4f489.doc
-
Size
1.3MB
-
MD5
629a54dc90a2e5081588cba36bd4f489
-
SHA1
b5f08efa70f3122777af75361b1cc409cb0b77d3
-
SHA256
fa4df9e1b3ed7129e0705cc3c4ccab55523c0b4f94604160728128d1cc76922e
-
SHA512
1378edd8d844d6775ee6aaabbb8e095aaf5c2d44fc3b78ed7537a415e7ce56035fd78d43b3098bac4d220d19c746bc5108823f31b4f6a4e677bc3009166b54c6
-
SSDEEP
24576:lEIZ4wA74D4SQKxZcy8gthDW8/chYusVNVQK0U/x8A:l+wJD4QZh/qaKMn70ux8
Malware Config
Extracted
hancitor
2306_vensip
http://extilivelly.com/8/forum.php
http://cludimetifte.ru/8/forum.php
http://sakincesed.ru/8/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 4512 4460 rundll32.exe WINWORD.EXE -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 59 4268 rundll32.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exepid process 4268 rundll32.exe 4268 rundll32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 58 api.ipify.org -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
NTFS ADS 1 IoCs
Processes:
WINWORD.EXEdescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\{FD1EBE5C-641E-4023-89F1-DBF8380E0F9A}\kiks.dll:Zone.Identifier WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4460 WINWORD.EXE 4460 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 4268 rundll32.exe 4268 rundll32.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
WINWORD.EXEpid process 4460 WINWORD.EXE 4460 WINWORD.EXE 4460 WINWORD.EXE 4460 WINWORD.EXE 4460 WINWORD.EXE 4460 WINWORD.EXE 4460 WINWORD.EXE 4460 WINWORD.EXE 4460 WINWORD.EXE 4460 WINWORD.EXE 4460 WINWORD.EXE 4460 WINWORD.EXE 4460 WINWORD.EXE 4460 WINWORD.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
WINWORD.EXErundll32.exedescription pid process target process PID 4460 wrote to memory of 1448 4460 WINWORD.EXE splwow64.exe PID 4460 wrote to memory of 1448 4460 WINWORD.EXE splwow64.exe PID 4460 wrote to memory of 4512 4460 WINWORD.EXE rundll32.exe PID 4460 wrote to memory of 4512 4460 WINWORD.EXE rundll32.exe PID 4512 wrote to memory of 4268 4512 rundll32.exe rundll32.exe PID 4512 wrote to memory of 4268 4512 rundll32.exe rundll32.exe PID 4512 wrote to memory of 4268 4512 rundll32.exe rundll32.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\629a54dc90a2e5081588cba36bd4f489.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1448
-
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" c:\users\admin\appdata\roaming\microsoft\templates\kikus.dll,OFCBWXTHRNL2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" c:\users\admin\appdata\roaming\microsoft\templates\kikus.dll,OFCBWXTHRNL3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4268
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
721KB
MD5e0df86869bf91d97e15192a123a7a3f8
SHA17f3853fde20f1721e258b61d27125ca4b554d262
SHA256da9915f0d3bb0d7bee85a01c6e954311a2489400e7da7143f437487436694c60
SHA512259f4726710b7a4f4d65a6fb891fcfe5bb74216ffd6b8992085f19a98cba10c139af0e133c431e5f270b2bbae912dd2590dd561a56dd73b3d6a9077bab51917b
-
Filesize
721KB
MD5e0df86869bf91d97e15192a123a7a3f8
SHA17f3853fde20f1721e258b61d27125ca4b554d262
SHA256da9915f0d3bb0d7bee85a01c6e954311a2489400e7da7143f437487436694c60
SHA512259f4726710b7a4f4d65a6fb891fcfe5bb74216ffd6b8992085f19a98cba10c139af0e133c431e5f270b2bbae912dd2590dd561a56dd73b3d6a9077bab51917b
-
Filesize
721KB
MD5e0df86869bf91d97e15192a123a7a3f8
SHA17f3853fde20f1721e258b61d27125ca4b554d262
SHA256da9915f0d3bb0d7bee85a01c6e954311a2489400e7da7143f437487436694c60
SHA512259f4726710b7a4f4d65a6fb891fcfe5bb74216ffd6b8992085f19a98cba10c139af0e133c431e5f270b2bbae912dd2590dd561a56dd73b3d6a9077bab51917b