Analysis
-
max time kernel
95s -
max time network
115s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29-01-2023 16:17
Static task
static1
Behavioral task
behavioral1
Sample
27dcd980511896334e5ac199b42ffb9a2391c2a696652da5bbd2bd7913b7beb8.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
27dcd980511896334e5ac199b42ffb9a2391c2a696652da5bbd2bd7913b7beb8.dll
Resource
win10v2004-20221111-en
General
-
Target
27dcd980511896334e5ac199b42ffb9a2391c2a696652da5bbd2bd7913b7beb8.dll
-
Size
389KB
-
MD5
aa57bf47faa19fd0de5cdfd103a41e7d
-
SHA1
5a70c151a194f6e47147f6eca903b5940772c818
-
SHA256
27dcd980511896334e5ac199b42ffb9a2391c2a696652da5bbd2bd7913b7beb8
-
SHA512
6a67972fed76e52e0326d97d6fce6f113d4c57eb99f6b493ffdb054fe012037c9ea8966662104b0ec0ea7f771a39f442ba6802cc1dd14867de1c76d71d888da5
-
SSDEEP
12288:V17lp2D7gWtUSvuWZJ634myr2H/BRGbmaROV:VVSsE638risLR
Malware Config
Extracted
hancitor
2502_ser3402
http://speritentz.com/8/forum.php
http://afternearde.ru/8/forum.php
http://counivicop.ru/8/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Blocklisted process makes network request 4 IoCs
Processes:
rundll32.exeflow pid process 5 916 rundll32.exe 8 916 rundll32.exe 10 916 rundll32.exe 12 916 rundll32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
rundll32.exepid process 916 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 840 wrote to memory of 916 840 rundll32.exe rundll32.exe PID 840 wrote to memory of 916 840 rundll32.exe rundll32.exe PID 840 wrote to memory of 916 840 rundll32.exe rundll32.exe PID 840 wrote to memory of 916 840 rundll32.exe rundll32.exe PID 840 wrote to memory of 916 840 rundll32.exe rundll32.exe PID 840 wrote to memory of 916 840 rundll32.exe rundll32.exe PID 840 wrote to memory of 916 840 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\27dcd980511896334e5ac199b42ffb9a2391c2a696652da5bbd2bd7913b7beb8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\27dcd980511896334e5ac199b42ffb9a2391c2a696652da5bbd2bd7913b7beb8.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:916
-