Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2024 10:54
Static task
static1
Behavioral task
behavioral1
Sample
6a3d79f41ad61de63427c5baff49e005.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6a3d79f41ad61de63427c5baff49e005.dll
Resource
win10v2004-20231222-en
General
-
Target
6a3d79f41ad61de63427c5baff49e005.dll
-
Size
800KB
-
MD5
6a3d79f41ad61de63427c5baff49e005
-
SHA1
02c53f32e73727f140e2fc7de9c9e033e87f109d
-
SHA256
25b773d34fb3cdaf47d12efe8b83579c6134d612050542d87e529d0ca5191dc3
-
SHA512
15c0e27f6e80cb34e690959addc47a9a169cc5eabf0251a05cfbeff188f28368582d45bb434c9888f134128b3ec094d3b955b6b47dca73491d9e04a8998c2710
-
SSDEEP
12288:LV3KhhWj6TCPmLpGGFk7ZioaZUp6I/nS049BV3KhhWj6TCPmLpGGFk7ZioaZUp6n:rj6smL+dAZE6Ignj6smL+dAZE6Ig
Malware Config
Extracted
hancitor
2508_bqplf
http://intakinger.com/8/forum.php
http://idgentexpliet.ru/8/forum.php
http://declassivan.ru/8/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 35 4812 rundll32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 34 api.ipify.org -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rundll32.exepid process 4812 rundll32.exe 4812 rundll32.exe 4812 rundll32.exe 4812 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3716 wrote to memory of 4812 3716 rundll32.exe rundll32.exe PID 3716 wrote to memory of 4812 3716 rundll32.exe rundll32.exe PID 3716 wrote to memory of 4812 3716 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6a3d79f41ad61de63427c5baff49e005.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6a3d79f41ad61de63427c5baff49e005.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:4812
-