Analysis
-
max time kernel
139s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2024 01:40
Static task
static1
Behavioral task
behavioral1
Sample
WIS_868087283709651.vbs
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
WIS_868087283709651.vbs
Resource
win10v2004-20240802-en
General
-
Target
WIS_868087283709651.vbs
-
Size
726KB
-
MD5
a21cda7e8d89d17b1bbc3c27035b132c
-
SHA1
357ab07a728aa6e1cadae86f47ac0ebefda296bf
-
SHA256
ec12eb1046c20c246ac6add559a64b52485d251e300c1d2dd4503de8a08c73d5
-
SHA512
bf02164fc72977f509771b92c41706e3fb1c357c3245b7cc2aeb15ad2492320a5f834f8fc1bb8531e799fa078c8cf973373916d89478a8c8d0ba4af8abce5d72
-
SSDEEP
12288:GMrUPl85od7HaQBUKqzoSv0DyZ1IfNKOngDi/4ogf3bQkrkT8W1B7jcCBLwnoppi:GaUPlTlUKqzoSvUo0gO2LbkTxpHLfHKH
Malware Config
Extracted
hancitor
0212_4377843
http://laticivue.com/4/forum.php
http://isintilexts.ru/4/forum.php
http://sailitisk.ru/4/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3960 4136 regsvr32.exe 92 -
Loads dropped DLL 1 IoCs
pid Process 3500 regsvr32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 48 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3500 set thread context of 1692 3500 regsvr32.exe 103 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1692 svchost.exe 1692 svchost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2408 WScript.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3960 wrote to memory of 3500 3960 regsvr32.exe 94 PID 3960 wrote to memory of 3500 3960 regsvr32.exe 94 PID 3960 wrote to memory of 3500 3960 regsvr32.exe 94 PID 3500 wrote to memory of 1692 3500 regsvr32.exe 103 PID 3500 wrote to memory of 1692 3500 regsvr32.exe 103 PID 3500 wrote to memory of 1692 3500 regsvr32.exe 103 PID 3500 wrote to memory of 1692 3500 regsvr32.exe 103 PID 3500 wrote to memory of 1692 3500 regsvr32.exe 103
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\WIS_868087283709651.vbs"1⤵
- Suspicious use of FindShellTrayWindow
PID:2408
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s C:\Users\Admin\AppData\Local\Temp\RodQw.txt1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\SysWOW64\regsvr32.exe-s C:\Users\Admin\AppData\Local\Temp\RodQw.txt2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1692
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
137KB
MD5daa9b06974fa5963b39e0120babe138c
SHA14cc4588d284bead0d6dae54761de42cd048f77a1
SHA256f01881dbff4546bd2d66a49cc01ee09e306c025aaa4df16022eb826426f2e004
SHA512fad62deded0a108914759bca2f5aa43948024b7032ed4f904ad3fa1e5079c4bc81a7badb31fd975c97b4bd57830f56910b3eeca3ae9fc4a3fd08722e5e0273f2
-
Filesize
46KB
MD5b06a8df09f96f2571edf59bac9c1eb85
SHA10a01fb9a851dae892bfe22295b81e561d2dfb7ea
SHA256711b6a37b4f858ea5f02fb2cb29b823e99ae4838adfa5c640e4d6f44cef10650
SHA51249d99f2ae712ea141d65cf76495fe15d0c19ee51b32e37671e022760d1f4817f4ccfe73f621acd5a86ccd547132715521d8c82f9e58ef62abc0062d748323f5c