Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 04:51
Static task
static1
Behavioral task
behavioral1
Sample
28e594119e5081ef5504e241e4c72285.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
28e594119e5081ef5504e241e4c72285.dll
Resource
win10v2004-20231222-en
General
-
Target
28e594119e5081ef5504e241e4c72285.dll
-
Size
823KB
-
MD5
28e594119e5081ef5504e241e4c72285
-
SHA1
794e8eae373570e15b563a0d3ae1ee042a64c313
-
SHA256
a84ce5f878d308a093823b638d997e9081a4aaae4ed8bfcad3372f99942de223
-
SHA512
6f91135533ed3e5c2294abcf631cee5e2b2f775b491ed5ca142f290653993edddac471822c4c6d2323ea0babab6dd403b04e06fbe51fbe9111c051f11422c57d
-
SSDEEP
12288:/pUcS4hKZz2f3ssC0CpK54o5FWXgiq1MNQGW0wTX8Uo/XE5Uf5VVVVJDgZh:/pFBEWss7mKSqQtiKvwr8UIEeDg
Malware Config
Extracted
hancitor
1908_jkdsf
http://thookedaurce.com/8/forum.php
http://foolockpary.ru/8/forum.php
http://usitemithe.ru/8/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 3056 rundll32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 api.ipify.org -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3056 rundll32.exe 3056 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1216 wrote to memory of 3056 1216 rundll32.exe 28 PID 1216 wrote to memory of 3056 1216 rundll32.exe 28 PID 1216 wrote to memory of 3056 1216 rundll32.exe 28 PID 1216 wrote to memory of 3056 1216 rundll32.exe 28 PID 1216 wrote to memory of 3056 1216 rundll32.exe 28 PID 1216 wrote to memory of 3056 1216 rundll32.exe 28 PID 1216 wrote to memory of 3056 1216 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\28e594119e5081ef5504e241e4c72285.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\28e594119e5081ef5504e241e4c72285.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:3056
-