Analysis
-
max time kernel
120s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-01-2023 16:17
Static task
static1
Behavioral task
behavioral1
Sample
5e33970559c4dc766fcc0236c53b04af48ed3f7e4c8d03467e5d2ddae082f423.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5e33970559c4dc766fcc0236c53b04af48ed3f7e4c8d03467e5d2ddae082f423.dll
Resource
win10v2004-20220812-en
General
-
Target
5e33970559c4dc766fcc0236c53b04af48ed3f7e4c8d03467e5d2ddae082f423.dll
-
Size
389KB
-
MD5
f681b4a16bed5f6269aee217c6cd1222
-
SHA1
1d6ebeb45311492380202ea0f1bb9c3cb6bd9880
-
SHA256
5e33970559c4dc766fcc0236c53b04af48ed3f7e4c8d03467e5d2ddae082f423
-
SHA512
f0543be85146c34312f8014030a83aa00f82e55a63a09d7d55ad2310ade7030f188dfca4ce0b66cc5c636e6d55dcf46673ca71e3900ef79a1ae3964a4c8c4a6f
-
SSDEEP
12288:V17lp2D7gWtUSvuWZJf34myr2H/BRGbmaROU:VVSsEf38risLR
Malware Config
Extracted
hancitor
2502_ser3402
http://speritentz.com/8/forum.php
http://afternearde.ru/8/forum.php
http://counivicop.ru/8/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Blocklisted process makes network request 3 IoCs
Processes:
rundll32.exeflow pid process 5 1948 rundll32.exe 7 1948 rundll32.exe 9 1948 rundll32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
rundll32.exepid process 1948 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1076 wrote to memory of 1948 1076 rundll32.exe rundll32.exe PID 1076 wrote to memory of 1948 1076 rundll32.exe rundll32.exe PID 1076 wrote to memory of 1948 1076 rundll32.exe rundll32.exe PID 1076 wrote to memory of 1948 1076 rundll32.exe rundll32.exe PID 1076 wrote to memory of 1948 1076 rundll32.exe rundll32.exe PID 1076 wrote to memory of 1948 1076 rundll32.exe rundll32.exe PID 1076 wrote to memory of 1948 1076 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5e33970559c4dc766fcc0236c53b04af48ed3f7e4c8d03467e5d2ddae082f423.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5e33970559c4dc766fcc0236c53b04af48ed3f7e4c8d03467e5d2ddae082f423.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:1948
-