Malware Analysis Report

2024-10-19 02:46

Sample ID 230129-zyrxnsch92
Target 5cfa76abb7ddf699258ab72dc481101f4ace4c63325ab7f70147498c4e8b8058
SHA256 5cfa76abb7ddf699258ab72dc481101f4ace4c63325ab7f70147498c4e8b8058
Tags
hancitor 2202_pro23 downloader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

5cfa76abb7ddf699258ab72dc481101f4ace4c63325ab7f70147498c4e8b8058

Threat Level: Known bad

The file 5cfa76abb7ddf699258ab72dc481101f4ace4c63325ab7f70147498c4e8b8058 was found to be: Known bad.

Malicious Activity Summary

hancitor 2202_pro23 downloader

Hancitor

Blocklisted process makes network request

Looks up external IP address via web service

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-01-29 21:07

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-01-29 21:07

Reported

2023-01-29 21:10

Platform

win7-20221111-en

Max time kernel

80s

Max time network

127s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\5cfa76abb7ddf699258ab72dc481101f4ace4c63325ab7f70147498c4e8b8058.dll,#1

Signatures

Hancitor

downloader hancitor

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A api.ipify.org N/A N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\5cfa76abb7ddf699258ab72dc481101f4ace4c63325ab7f70147498c4e8b8058.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\5cfa76abb7ddf699258ab72dc481101f4ace4c63325ab7f70147498c4e8b8058.dll,#1

Network

Country Destination Domain Proto
N/A 8.8.8.8:53 api.ipify.org udp
N/A 64.185.227.155:80 api.ipify.org tcp
N/A 8.8.8.8:53 aftereand.com udp
N/A 8.8.8.8:53 nevemicies.ru udp
N/A 8.8.8.8:53 froplivernat.ru udp

Files

memory/968-54-0x0000000000000000-mapping.dmp

memory/968-55-0x00000000757C1000-0x00000000757C3000-memory.dmp

memory/968-56-0x0000000074C40000-0x0000000074C7E000-memory.dmp

memory/968-57-0x0000000074C40000-0x0000000074C4A000-memory.dmp

memory/968-58-0x0000000074C40000-0x0000000074C7E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-01-29 21:07

Reported

2023-01-29 21:10

Platform

win10v2004-20220812-en

Max time kernel

150s

Max time network

158s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\5cfa76abb7ddf699258ab72dc481101f4ace4c63325ab7f70147498c4e8b8058.dll,#1

Signatures

Hancitor

downloader hancitor

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A api.ipify.org N/A N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2812 wrote to memory of 4752 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2812 wrote to memory of 4752 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2812 wrote to memory of 4752 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\5cfa76abb7ddf699258ab72dc481101f4ace4c63325ab7f70147498c4e8b8058.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\5cfa76abb7ddf699258ab72dc481101f4ace4c63325ab7f70147498c4e8b8058.dll,#1

Network

Country Destination Domain Proto
N/A 93.184.220.29:80 tcp
N/A 8.252.118.126:80 tcp
N/A 8.252.118.126:80 tcp
N/A 8.253.209.121:80 tcp
N/A 8.8.8.8:53 api.ipify.org udp
N/A 64.185.227.155:80 api.ipify.org tcp
N/A 8.252.118.126:80 tcp
N/A 8.8.8.8:53 aftereand.com udp
N/A 8.8.8.8:53 nevemicies.ru udp
N/A 8.8.8.8:53 froplivernat.ru udp
N/A 93.184.220.29:80 tcp
N/A 93.184.220.29:80 tcp
N/A 8.252.118.126:80 tcp
N/A 8.253.209.121:80 tcp
N/A 67.26.211.254:80 tcp
N/A 8.252.117.126:80 tcp
N/A 8.8.8.8:53 aftereand.com udp
N/A 8.8.8.8:53 nevemicies.ru udp
N/A 8.8.8.8:53 froplivernat.ru udp

Files

memory/4752-132-0x0000000000000000-mapping.dmp

memory/4752-133-0x00000000756B0000-0x00000000756BA000-memory.dmp

memory/4752-134-0x00000000756B0000-0x00000000756EE000-memory.dmp

memory/4752-135-0x00000000756B0000-0x00000000756EE000-memory.dmp