Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-03-2024 03:37

General

  • Target

    d7c87a735968d424d5c0aa2794d23657.dll

  • Size

    654KB

  • MD5

    d7c87a735968d424d5c0aa2794d23657

  • SHA1

    957a6ef9961e71d0207c5ab2ccc153b41f73e110

  • SHA256

    306d564fba556c9db12269b01bdadb3eba19e43c60f180c6f41a72a1fc9840d3

  • SHA512

    5ef0e40f059cb752421af3123deef73df4544fe1653efdfdfa277ed879d06f6eb6d6ff5234ae159746f2dc9bbc167273851c1a14ace3f38bcd1661828b0e35d5

  • SSDEEP

    12288:QbcUPtAsi4iSgTYTY+BnbOmRtwFysBYaABtUO1OSnVVVVTDrh:/AtnLuTYZymSYaABt1QS

Malware Config

Extracted

Family

hancitor

Botnet

0308_spnv5

C2

http://priekornat.com/8/forum.php

http://stionsomi.ru/8/forum.php

http://arviskeist.ru/8/forum.php

Signatures

  • Hancitor

    Hancitor is downloader used to deliver other malware families.

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d7c87a735968d424d5c0aa2794d23657.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3528
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\d7c87a735968d424d5c0aa2794d23657.dll,#1
      2⤵
        PID:2880
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 648
          3⤵
          • Program crash
          PID:1152
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2880 -ip 2880
      1⤵
        PID:4392

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2880-0-0x0000000002160000-0x0000000002207000-memory.dmp

        Filesize

        668KB

      • memory/2880-1-0x0000000002230000-0x0000000002238000-memory.dmp

        Filesize

        32KB

      • memory/2880-2-0x0000000002250000-0x000000000225A000-memory.dmp

        Filesize

        40KB

      • memory/2880-3-0x0000000002160000-0x0000000002207000-memory.dmp

        Filesize

        668KB

      • memory/2880-4-0x0000000002230000-0x0000000002238000-memory.dmp

        Filesize

        32KB