Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
20-01-2024 10:54
Static task
static1
Behavioral task
behavioral1
Sample
6a3d79f41ad61de63427c5baff49e005.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6a3d79f41ad61de63427c5baff49e005.dll
Resource
win10v2004-20231222-en
General
-
Target
6a3d79f41ad61de63427c5baff49e005.dll
-
Size
800KB
-
MD5
6a3d79f41ad61de63427c5baff49e005
-
SHA1
02c53f32e73727f140e2fc7de9c9e033e87f109d
-
SHA256
25b773d34fb3cdaf47d12efe8b83579c6134d612050542d87e529d0ca5191dc3
-
SHA512
15c0e27f6e80cb34e690959addc47a9a169cc5eabf0251a05cfbeff188f28368582d45bb434c9888f134128b3ec094d3b955b6b47dca73491d9e04a8998c2710
-
SSDEEP
12288:LV3KhhWj6TCPmLpGGFk7ZioaZUp6I/nS049BV3KhhWj6TCPmLpGGFk7ZioaZUp6n:rj6smL+dAZE6Ignj6smL+dAZE6Ig
Malware Config
Extracted
hancitor
2508_bqplf
http://intakinger.com/8/forum.php
http://idgentexpliet.ru/8/forum.php
http://declassivan.ru/8/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 2224 rundll32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 api.ipify.org -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2224 rundll32.exe 2224 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1636 wrote to memory of 2224 1636 rundll32.exe 28 PID 1636 wrote to memory of 2224 1636 rundll32.exe 28 PID 1636 wrote to memory of 2224 1636 rundll32.exe 28 PID 1636 wrote to memory of 2224 1636 rundll32.exe 28 PID 1636 wrote to memory of 2224 1636 rundll32.exe 28 PID 1636 wrote to memory of 2224 1636 rundll32.exe 28 PID 1636 wrote to memory of 2224 1636 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6a3d79f41ad61de63427c5baff49e005.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6a3d79f41ad61de63427c5baff49e005.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:2224
-