Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-03-2024 03:37
Static task
static1
Behavioral task
behavioral1
Sample
d7c87a735968d424d5c0aa2794d23657.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d7c87a735968d424d5c0aa2794d23657.dll
Resource
win10v2004-20240226-en
General
-
Target
d7c87a735968d424d5c0aa2794d23657.dll
-
Size
654KB
-
MD5
d7c87a735968d424d5c0aa2794d23657
-
SHA1
957a6ef9961e71d0207c5ab2ccc153b41f73e110
-
SHA256
306d564fba556c9db12269b01bdadb3eba19e43c60f180c6f41a72a1fc9840d3
-
SHA512
5ef0e40f059cb752421af3123deef73df4544fe1653efdfdfa277ed879d06f6eb6d6ff5234ae159746f2dc9bbc167273851c1a14ace3f38bcd1661828b0e35d5
-
SSDEEP
12288:QbcUPtAsi4iSgTYTY+BnbOmRtwFysBYaABtUO1OSnVVVVTDrh:/AtnLuTYZymSYaABt1QS
Malware Config
Extracted
hancitor
0308_spnv5
http://priekornat.com/8/forum.php
http://stionsomi.ru/8/forum.php
http://arviskeist.ru/8/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 4 1712 rundll32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 api.ipify.org -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 1712 rundll32.exe 1712 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2224 wrote to memory of 1712 2224 rundll32.exe rundll32.exe PID 2224 wrote to memory of 1712 2224 rundll32.exe rundll32.exe PID 2224 wrote to memory of 1712 2224 rundll32.exe rundll32.exe PID 2224 wrote to memory of 1712 2224 rundll32.exe rundll32.exe PID 2224 wrote to memory of 1712 2224 rundll32.exe rundll32.exe PID 2224 wrote to memory of 1712 2224 rundll32.exe rundll32.exe PID 2224 wrote to memory of 1712 2224 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d7c87a735968d424d5c0aa2794d23657.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d7c87a735968d424d5c0aa2794d23657.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:1712
-