Analysis
-
max time kernel
152s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2022 09:44
Static task
static1
Behavioral task
behavioral1
Sample
99c4b9083ed613bc38904eec3e37d24d3ca092067ee54e373cc3c8d6339857a6.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
99c4b9083ed613bc38904eec3e37d24d3ca092067ee54e373cc3c8d6339857a6.dll
Resource
win10v2004-20220812-en
General
-
Target
99c4b9083ed613bc38904eec3e37d24d3ca092067ee54e373cc3c8d6339857a6.dll
-
Size
244KB
-
MD5
24190cd699631d16521dfb588b2571a3
-
SHA1
546a86929e82babd0ee6f970d7729e3bf6a14698
-
SHA256
99c4b9083ed613bc38904eec3e37d24d3ca092067ee54e373cc3c8d6339857a6
-
SHA512
fd3123ababc536c2530785d52b3323c1250da0d41e18574ee2877013c6ac033f08157e1221cb3b01d971a3e214eba19bbcc4d29b3ea482cc52b433ecb6eacb21
-
SSDEEP
3072:NaB6VAs0MHXGRjH4a/aULqLJKy7ZzUTTzhKseYjgWK/WKLPJ+OY65D:NU6ZXshyfJKy9QDh7+hYi
Malware Config
Extracted
hancitor
1907_hjfsd
http://thervidolown.com/8/forum.php
http://wiltuslads.ru/8/forum.php
http://anithedtatione.ru/8/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 40 4304 rundll32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 38 api.ipify.org -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 4304 rundll32.exe 4304 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2760 wrote to memory of 4304 2760 rundll32.exe rundll32.exe PID 2760 wrote to memory of 4304 2760 rundll32.exe rundll32.exe PID 2760 wrote to memory of 4304 2760 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\99c4b9083ed613bc38904eec3e37d24d3ca092067ee54e373cc3c8d6339857a6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\99c4b9083ed613bc38904eec3e37d24d3ca092067ee54e373cc3c8d6339857a6.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:4304