Analysis
-
max time kernel
43s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 15:14
Static task
static1
Behavioral task
behavioral1
Sample
WHO_4776889046841393.vbs
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
WHO_4776889046841393.vbs
Resource
win10v2004-20220812-en
General
-
Target
WHO_4776889046841393.vbs
-
Size
909KB
-
MD5
67d3819f1f32d9a140b3201ae5d310d8
-
SHA1
545ddac4103a70825c6fef264c08bd34787809bb
-
SHA256
c03838ce46b55ee5253eb78a82c4f91f9273c833387bc430309bb84cd3a0bc33
-
SHA512
85d1f5d646c05b47a5425520a9e6628744d8ec17bec6aa8b051449f9f304b07fefe2f4fe9d14bd00aeb04cc6141ea1452c888f9cb94e4ab7b1152c46da64bf8b
-
SSDEEP
3072:DLG8LSTq0uHLlixTm/p9SKN0YpHp6R+UEpIDr5NAuCLC9kz3xHyLS8Kl0sGfjhgH:jRo5Qc970K/Dqld/2libfKTnYrKJmvJ
Malware Config
Extracted
hancitor
2111_7654345
http://hismosedkaj.com/4/forum.php
http://consenhary.ru/4/forum.php
http://prolighmev.ru/4/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2008 2012 regsvr32.exe 27 -
Loads dropped DLL 1 IoCs
pid Process 1448 regsvr32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1448 set thread context of 1020 1448 regsvr32.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1020 svchost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1620 WScript.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2008 wrote to memory of 1448 2008 regsvr32.exe 29 PID 2008 wrote to memory of 1448 2008 regsvr32.exe 29 PID 2008 wrote to memory of 1448 2008 regsvr32.exe 29 PID 2008 wrote to memory of 1448 2008 regsvr32.exe 29 PID 2008 wrote to memory of 1448 2008 regsvr32.exe 29 PID 2008 wrote to memory of 1448 2008 regsvr32.exe 29 PID 2008 wrote to memory of 1448 2008 regsvr32.exe 29 PID 1448 wrote to memory of 1020 1448 regsvr32.exe 30 PID 1448 wrote to memory of 1020 1448 regsvr32.exe 30 PID 1448 wrote to memory of 1020 1448 regsvr32.exe 30 PID 1448 wrote to memory of 1020 1448 regsvr32.exe 30 PID 1448 wrote to memory of 1020 1448 regsvr32.exe 30 PID 1448 wrote to memory of 1020 1448 regsvr32.exe 30
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\WHO_4776889046841393.vbs"1⤵
- Suspicious use of FindShellTrayWindow
PID:1620
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s C:\Users\Admin\AppData\Local\Temp\suHlT.txt1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\regsvr32.exe-s C:\Users\Admin\AppData\Local\Temp\suHlT.txt2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1020
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
174KB
MD5227ddb5f8b75f0c253e466e0752f1d97
SHA1e5361dbf2218d41e577bfff6355125bdda0c08db
SHA256f71d14084f5b22dc41223db248a96c27ca54f9ae0582ac9d6dc0a7d2b13728ac
SHA512108a06fcc33ae5b2a024a84f861f873efbd0cadffa8eddd575e1f3392f2ae2914aef253d3a7b2bfa445c61b83f9ceaf6224880d39c43d3bdfd0b3c5fa9b01d02
-
Filesize
174KB
MD5227ddb5f8b75f0c253e466e0752f1d97
SHA1e5361dbf2218d41e577bfff6355125bdda0c08db
SHA256f71d14084f5b22dc41223db248a96c27ca54f9ae0582ac9d6dc0a7d2b13728ac
SHA512108a06fcc33ae5b2a024a84f861f873efbd0cadffa8eddd575e1f3392f2ae2914aef253d3a7b2bfa445c61b83f9ceaf6224880d39c43d3bdfd0b3c5fa9b01d02