Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-04-2024 02:37

General

  • Target

    ad5155b07bad3b1326cecce84afcd1f2_JaffaCakes118.doc

  • Size

    534KB

  • MD5

    ad5155b07bad3b1326cecce84afcd1f2

  • SHA1

    9cdb592b92cd5068697122a0896492c5528935d0

  • SHA256

    41e2e1899e11c4e9efbd7042989a3e5a5960faf205fa181a7486d350a277cc6c

  • SHA512

    bc2da878109ab02be53b3306b44448d1b910cf415142aed12236ce0df9709c6bbdd461a2273f17898035667ea40a5b24d375a04c19810c57c21a24abbe809ea1

  • SSDEEP

    12288:5r8CmEKY7gpWMB1hoM6scG2u302l0HwbsG7kWunEDXm/zjH8BF:5r8CmEj6B1+MDn2u3049HSn+Xm/e

Malware Config

Extracted

Family

hancitor

Botnet

1910_nsw

C2

http://newnucapi.com/8/forum.php

http://gintlyba.ru/8/forum.php

http://stralonz.ru/8/forum.php

Signatures

  • Hancitor

    Hancitor is downloader used to deliver other malware families.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ad5155b07bad3b1326cecce84afcd1f2_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:3592
      • C:\Windows\SYSTEM32\rundll32.exe
        rundll32.exe c:\users\admin\appdata\roaming\microsoft\templates\gelforr.dap,MVELLJHNDSVBJLD
        2⤵
        • Process spawned unexpected child process
        • Suspicious use of WriteProcessMemory
        PID:3176
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe c:\users\admin\appdata\roaming\microsoft\templates\gelforr.dap,MVELLJHNDSVBJLD
          3⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          PID:900

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\A4FE9C36.emf

      Filesize

      4KB

      MD5

      c024f2d9118240e0bfc483b9299dd6cf

      SHA1

      372f04b3efb4cb0a8fc3f82c7918d7478a230f80

      SHA256

      a23c652c83e35c3059746bbdbd71c80e2ac08535d420359cffb6e41df713dc85

      SHA512

      632b48760ca476cd6f01eefa2e6c516f34c822867590419351eefb8c78f6dab6eaf231feff6764d903e09c40eaca14a0b222a961d2ddec951fc8be3cabd3bf04

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\C2006CC9.emf

      Filesize

      4KB

      MD5

      bf2393dfe4576945d1f26d3595c5ef9f

      SHA1

      f9abbbcf4bad106e4f5c039082257357f4c28aef

      SHA256

      a1fa622b47a529e1064458aa0decd0c1ebc16efb621511c8cba545036ffeb00e

      SHA512

      bd9972b8310d1357529f62375b883ce3af01c01a56107a0cff93b8cdce43fe7931947ce10790ad5c596392ba8bab842d89e708d4999d87c9c4b858140688fdbf

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

      Filesize

      241B

      MD5

      f5310e4d57eb4bfd0514b4070f46def9

      SHA1

      69392ae127b33f86e844982957a6d761d5368603

      SHA256

      2c8c3924add47db70a6449b6b493f71f6d045b7cb156bd2112a67724e5fad50c

      SHA512

      489cc600baa5d96584c1f40cc9eac34138543ed1325c7b109523cbd1028a880cddbc6c49ce089c961d157890a50c1761436facf83c46d87cbf21ca1ebbb54726

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\zoro.doc

      Filesize

      341KB

      MD5

      b6487ba7cff8bd5748c8dfa1f7db100c

      SHA1

      a49729ba20a4ad819e890682a88c470b0056a218

      SHA256

      dd891db0c9eed71e1f6e2f659a9b7dc18806626480f36b1e84ef18f41cd6a57d

      SHA512

      8b58aa8b20035b2b4aeeee1ae909bc5245ec0a615990b1f4b9938b8507726931a142e3dde111dc0ca70b3102683305b4e63df91b197136586404e66fcec81f83

    • \??\c:\users\admin\appdata\roaming\microsoft\templates\gelforr.dap

      Filesize

      525KB

      MD5

      4198ac1dc34de77ab8ceac3c9a25480e

      SHA1

      f8fb1264a292aecb6c2bf5c5d4f3e199e3a822ad

      SHA256

      8ff43b6ddf6243bd5ee073f9987920fa223809f589d151d7e438fd8cc08ce292

      SHA512

      37dd3c50283daa7be1fb831820d273b7663dddce4d98c87c8d08864fac2dc00daf243ca6e50e028d4f04262160f5dea9a98000cffb67d70c07875d3fc2e4c47c

    • memory/900-215-0x00000000009F0000-0x00000000009F1000-memory.dmp

      Filesize

      4KB

    • memory/900-210-0x0000000075700000-0x000000007579A000-memory.dmp

      Filesize

      616KB

    • memory/900-204-0x0000000075700000-0x000000007579A000-memory.dmp

      Filesize

      616KB

    • memory/900-205-0x00000000009F0000-0x00000000009F1000-memory.dmp

      Filesize

      4KB

    • memory/900-203-0x0000000075700000-0x000000007579A000-memory.dmp

      Filesize

      616KB

    • memory/2084-117-0x00007FFDB0830000-0x00007FFDB0A25000-memory.dmp

      Filesize

      2.0MB

    • memory/2084-129-0x00007FFDB0830000-0x00007FFDB0A25000-memory.dmp

      Filesize

      2.0MB

    • memory/2084-7-0x00007FFDB0830000-0x00007FFDB0A25000-memory.dmp

      Filesize

      2.0MB

    • memory/2084-8-0x00007FFD708B0000-0x00007FFD708C0000-memory.dmp

      Filesize

      64KB

    • memory/2084-9-0x00007FFDB0830000-0x00007FFDB0A25000-memory.dmp

      Filesize

      2.0MB

    • memory/2084-10-0x00007FFDB0830000-0x00007FFDB0A25000-memory.dmp

      Filesize

      2.0MB

    • memory/2084-11-0x00007FFDB0830000-0x00007FFDB0A25000-memory.dmp

      Filesize

      2.0MB

    • memory/2084-12-0x00007FFDB0830000-0x00007FFDB0A25000-memory.dmp

      Filesize

      2.0MB

    • memory/2084-13-0x00007FFD6E330000-0x00007FFD6E340000-memory.dmp

      Filesize

      64KB

    • memory/2084-14-0x00007FFDB0830000-0x00007FFDB0A25000-memory.dmp

      Filesize

      2.0MB

    • memory/2084-15-0x00007FFDB0830000-0x00007FFDB0A25000-memory.dmp

      Filesize

      2.0MB

    • memory/2084-17-0x00007FFD6E330000-0x00007FFD6E340000-memory.dmp

      Filesize

      64KB

    • memory/2084-16-0x00007FFDB0830000-0x00007FFDB0A25000-memory.dmp

      Filesize

      2.0MB

    • memory/2084-18-0x00007FFDB0830000-0x00007FFDB0A25000-memory.dmp

      Filesize

      2.0MB

    • memory/2084-19-0x00007FFDB0830000-0x00007FFDB0A25000-memory.dmp

      Filesize

      2.0MB

    • memory/2084-37-0x000002A88C940000-0x000002A88D910000-memory.dmp

      Filesize

      15.8MB

    • memory/2084-59-0x000002A88C940000-0x000002A88D910000-memory.dmp

      Filesize

      15.8MB

    • memory/2084-60-0x000002A88C940000-0x000002A88D910000-memory.dmp

      Filesize

      15.8MB

    • memory/2084-62-0x000002A888370000-0x000002A888B70000-memory.dmp

      Filesize

      8.0MB

    • memory/2084-68-0x000002A88C940000-0x000002A88D910000-memory.dmp

      Filesize

      15.8MB

    • memory/2084-69-0x000002A88C940000-0x000002A88D910000-memory.dmp

      Filesize

      15.8MB

    • memory/2084-77-0x000002A88C940000-0x000002A88D910000-memory.dmp

      Filesize

      15.8MB

    • memory/2084-88-0x000002A88C940000-0x000002A88D910000-memory.dmp

      Filesize

      15.8MB

    • memory/2084-95-0x00007FFDB0830000-0x00007FFDB0A25000-memory.dmp

      Filesize

      2.0MB

    • memory/2084-96-0x000002A88C940000-0x000002A88D910000-memory.dmp

      Filesize

      15.8MB

    • memory/2084-119-0x00007FFDB0830000-0x00007FFDB0A25000-memory.dmp

      Filesize

      2.0MB

    • memory/2084-5-0x00007FFDB0830000-0x00007FFDB0A25000-memory.dmp

      Filesize

      2.0MB

    • memory/2084-121-0x00007FFDB0830000-0x00007FFDB0A25000-memory.dmp

      Filesize

      2.0MB

    • memory/2084-123-0x00007FFDB0830000-0x00007FFDB0A25000-memory.dmp

      Filesize

      2.0MB

    • memory/2084-125-0x00007FFDB0830000-0x00007FFDB0A25000-memory.dmp

      Filesize

      2.0MB

    • memory/2084-127-0x00007FFDB0830000-0x00007FFDB0A25000-memory.dmp

      Filesize

      2.0MB

    • memory/2084-6-0x00007FFD708B0000-0x00007FFD708C0000-memory.dmp

      Filesize

      64KB

    • memory/2084-131-0x00007FFDB0830000-0x00007FFDB0A25000-memory.dmp

      Filesize

      2.0MB

    • memory/2084-134-0x00007FFDB0830000-0x00007FFDB0A25000-memory.dmp

      Filesize

      2.0MB

    • memory/2084-135-0x00007FFDB0830000-0x00007FFDB0A25000-memory.dmp

      Filesize

      2.0MB

    • memory/2084-139-0x00007FFDB0830000-0x00007FFDB0A25000-memory.dmp

      Filesize

      2.0MB

    • memory/2084-138-0x00007FFDB0830000-0x00007FFDB0A25000-memory.dmp

      Filesize

      2.0MB

    • memory/2084-132-0x00007FFDB0830000-0x00007FFDB0A25000-memory.dmp

      Filesize

      2.0MB

    • memory/2084-171-0x00007FFDB0830000-0x00007FFDB0A25000-memory.dmp

      Filesize

      2.0MB

    • memory/2084-175-0x00007FFDB0830000-0x00007FFDB0A25000-memory.dmp

      Filesize

      2.0MB

    • memory/2084-179-0x000002A88C940000-0x000002A88D910000-memory.dmp

      Filesize

      15.8MB

    • memory/2084-189-0x00007FFDB0830000-0x00007FFDB0A25000-memory.dmp

      Filesize

      2.0MB

    • memory/2084-190-0x000002A88C940000-0x000002A88D910000-memory.dmp

      Filesize

      15.8MB

    • memory/2084-191-0x000002A88C940000-0x000002A88D910000-memory.dmp

      Filesize

      15.8MB

    • memory/2084-192-0x000002A888370000-0x000002A888B70000-memory.dmp

      Filesize

      8.0MB

    • memory/2084-195-0x000002A88C940000-0x000002A88D910000-memory.dmp

      Filesize

      15.8MB

    • memory/2084-4-0x00007FFDB0830000-0x00007FFDB0A25000-memory.dmp

      Filesize

      2.0MB

    • memory/2084-3-0x00007FFD708B0000-0x00007FFD708C0000-memory.dmp

      Filesize

      64KB

    • memory/2084-1-0x00007FFD708B0000-0x00007FFD708C0000-memory.dmp

      Filesize

      64KB

    • memory/2084-196-0x000002A88C940000-0x000002A88D910000-memory.dmp

      Filesize

      15.8MB

    • memory/2084-207-0x000002A88C940000-0x000002A88D910000-memory.dmp

      Filesize

      15.8MB

    • memory/2084-208-0x000002A88C940000-0x000002A88D910000-memory.dmp

      Filesize

      15.8MB

    • memory/2084-209-0x000002A88C940000-0x000002A88D910000-memory.dmp

      Filesize

      15.8MB

    • memory/2084-2-0x00007FFDB0830000-0x00007FFDB0A25000-memory.dmp

      Filesize

      2.0MB

    • memory/2084-211-0x000002A88C940000-0x000002A88D910000-memory.dmp

      Filesize

      15.8MB

    • memory/2084-212-0x000002A88C940000-0x000002A88D910000-memory.dmp

      Filesize

      15.8MB

    • memory/2084-0-0x00007FFD708B0000-0x00007FFD708C0000-memory.dmp

      Filesize

      64KB

    • memory/2084-247-0x00007FFD708B0000-0x00007FFD708C0000-memory.dmp

      Filesize

      64KB

    • memory/2084-248-0x00007FFD708B0000-0x00007FFD708C0000-memory.dmp

      Filesize

      64KB

    • memory/2084-249-0x00007FFD708B0000-0x00007FFD708C0000-memory.dmp

      Filesize

      64KB

    • memory/2084-250-0x00007FFD708B0000-0x00007FFD708C0000-memory.dmp

      Filesize

      64KB

    • memory/2084-251-0x00007FFDB0830000-0x00007FFDB0A25000-memory.dmp

      Filesize

      2.0MB