Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-04-2023 10:00
Static task
static1
Behavioral task
behavioral1
Sample
446322c5499d41edee0ca0b83aba36f0cc74ed4743a2e50e6eb36d2a3469d85f.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
446322c5499d41edee0ca0b83aba36f0cc74ed4743a2e50e6eb36d2a3469d85f.dll
Resource
win10v2004-20230220-en
General
-
Target
446322c5499d41edee0ca0b83aba36f0cc74ed4743a2e50e6eb36d2a3469d85f.dll
-
Size
1.7MB
-
MD5
5df3d0f5c72cf5e5f5558d0427fbe188
-
SHA1
7f3d18d51f70b226fd93cdcc50b30f24584e54a9
-
SHA256
446322c5499d41edee0ca0b83aba36f0cc74ed4743a2e50e6eb36d2a3469d85f
-
SHA512
85b4bac6afcb5e909ba6b805ef14479305a785a68b99893287bdb07c5a55e51db8f22c2ab5343d7898e07a8de424357377aacd8c5c1288e06d07fefaa2d0c757
-
SSDEEP
49152:ZrJ8MafVQ7yB/+E7kCSCFEWSHWTXtB9PBJPnaHzHIfup9lBEnTJB:ZnNGwEd
Malware Config
Extracted
hancitor
2103_punosh
http://nanogeelr.com/9/forum.php
http://ockpitehou.ru/9/forum.php
http://lumentsawfu.ru/9/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4916 4904 WerFault.exe 86 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1912 wrote to memory of 4904 1912 rundll32.exe 86 PID 1912 wrote to memory of 4904 1912 rundll32.exe 86 PID 1912 wrote to memory of 4904 1912 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\446322c5499d41edee0ca0b83aba36f0cc74ed4743a2e50e6eb36d2a3469d85f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\446322c5499d41edee0ca0b83aba36f0cc74ed4743a2e50e6eb36d2a3469d85f.dll,#12⤵PID:4904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4904 -s 6403⤵
- Program crash
PID:4916
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4904 -ip 49041⤵PID:3736