analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

help.doc

Full analysis: https://app.any.run/tasks/c9e51f6a-4e3c-462f-9305-e8ea6ee6595b
Verdict: Malicious activity
Threats:

Hancitor was created in 2014 to drop other malware on infected machines. It is also known as Tordal and Chanitor. This malware is available as a service which makes it accessible tools to criminals and contributes to the popularity of this virus.

Analysis date: August 02, 2022, 07:17:00
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
encrypted
evasion
hancitor
Indicators:
MIME: application/encrypted
File info: CDFV2 Encrypted
MD5:

B259E7D25E95EE65052D6DB146BCFE24

SHA1:

B788506181233087E4AFF0CAFF8755E2C32733EF

SHA256:

106A02E6E6452320F7F5425DBFBC8B126AC331D3C758417B08AB80B8AAA91846

SSDEEP:

1536:lePhCq5vJl18xTGz9MGMd+w3YwRxU+0gB0U/ymYomGgekV5f6Rfy6YP9+bnLMQ4E:gZvVMTGZMLLxNztymYLek+j08bLMQAd

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops executable file immediately after starts

      • WINWORD.EXE (PID: 3160)
    • Executable content was dropped or overwritten

      • WINWORD.EXE (PID: 3160)
    • Loads dropped or rewritten executable

      • rundll32.exe (PID: 3888)
    • HANCITOR detected by memory dumps

      • rundll32.exe (PID: 3888)
  • SUSPICIOUS

    • Checks supported languages

      • cmd.exe (PID: 968)
      • cmd.exe (PID: 1716)
    • Application launched itself

      • cmd.exe (PID: 968)
    • Drops a file with a compile date too recent

      • WINWORD.EXE (PID: 3160)
    • Checks for external IP

      • rundll32.exe (PID: 3888)
  • INFO

    • Reads the computer name

      • WINWORD.EXE (PID: 3160)
      • PING.EXE (PID: 2332)
      • PING.EXE (PID: 1572)
      • rundll32.exe (PID: 3888)
    • Checks supported languages

      • PING.EXE (PID: 2332)
      • WINWORD.EXE (PID: 3160)
      • rundll32.exe (PID: 3888)
      • PING.EXE (PID: 1572)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 3160)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Hancitor

(PID) Process(3888) rundll32.exe
Hosts (3)http://hiltustra.com/9/forum.php
http://corelince.ru/9/forum.php
http://mernwel.ru/9/forum.php
Hosts (3)http://hiltustra.com/9/forum.php
http://corelince.ru/9/forum.php
http://mernwel.ru/9/forum.php
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
6
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winword.exe cmd.exe no specs ping.exe no specs cmd.exe no specs ping.exe no specs #HANCITOR rundll32.exe

Process information

PID
CMD
Path
Indicators
Parent process
3160"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\help.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
968cmd.exe /c cd c:\users\admin\appdata\roaming\microsoft\templates && ping localhost -n 10 && c:\users\admin\appdata\roaming\microsoft\templates/1.batC:\Windows\system32\cmd.exeWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2332ping localhost -n 10 C:\Windows\system32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1716cmd.exe /c ping localhost -n 10 C:\Windows\system32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
1572ping localhost -n 10 C:\Windows\system32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3888rundll32.exe iff.bin,WCWGVXGWTDGAWLWC:\Windows\system32\rundll32.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Hancitor
(PID) Process(3888) rundll32.exe
Hosts (3)http://hiltustra.com/9/forum.php
http://corelince.ru/9/forum.php
http://mernwel.ru/9/forum.php
(PID) Process(3888) rundll32.exe
Hosts (3)http://hiltustra.com/9/forum.php
http://corelince.ru/9/forum.php
http://mernwel.ru/9/forum.php
Total events
3 173
Read events
3 056
Write events
91
Delete events
26

Modification events

(PID) Process:(3160) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation:writeName:>">
Value:
3E223E00580C0000010000000000000000000000
(PID) Process:(3160) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
Off
(PID) Process:(3160) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1041
Value:
Off
(PID) Process:(3160) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1046
Value:
Off
(PID) Process:(3160) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1036
Value:
Off
(PID) Process:(3160) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1031
Value:
Off
(PID) Process:(3160) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1040
Value:
Off
(PID) Process:(3160) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1049
Value:
Off
(PID) Process:(3160) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:3082
Value:
Off
(PID) Process:(3160) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1042
Value:
Off
Executable files
2
Suspicious files
5
Text files
2
Unknown types
8

Dropped files

PID
Process
Filename
Type
3160WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR42BE.tmp.cvr
MD5:
SHA256:
3160WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6BE8D99C.emfemf
MD5:CC968E088CABC731BCFF725EA8DD5888
SHA256:7FB350B0369BC587B1B7EE4FF38B3C941E70B3400CEBB73E63C90F3F73E0AE47
3160WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$help.docpgc
MD5:3865BDE3E442A6E838274658391D6859
SHA256:BD8B8430C0EAFC62E5821830A12D791A039A5453DFAD2FA7FC8A9195DDBA9750
3160WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{B50D8837-DA0E-4230-895E-93FB3D3A25DE}.tmpbinary
MD5:0B6BE54B077FECD8A9B253270BE92658
SHA256:F191CCCC1C507101F72FEA8C735E4A7652270F2124AACF05DC624296E20BFA49
3160WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{58CDF0E3-AFD6-46D6-9331-45A56AB78200}.tmpbinary
MD5:84E05BD008134F0172BE791C5069ECF2
SHA256:47A12F4287CA9F25516D2248A4F613C4962E54E7DAE87A5E800595A53C5DB6E1
3160WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~DFB8E17B4D58F24700.TMPbinary
MD5:B259E7D25E95EE65052D6DB146BCFE24
SHA256:106A02E6E6452320F7F5425DBFBC8B126AC331D3C758417B08AB80B8AAA91846
3160WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\iff.binexecutable
MD5:9F09B1DD6235C28B091A7DBC9BCD9482
SHA256:571CBA0431ACEA4739C5248DE1B1D33E76E995B3C7454F4D88D2785ADE6FDF74
3160WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~DFD1640731C2C8F0B0.TMPbinary
MD5:B259E7D25E95EE65052D6DB146BCFE24
SHA256:106A02E6E6452320F7F5425DBFBC8B126AC331D3C758417B08AB80B8AAA91846
3160WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~DF7EA3B2954B6AA735.TMPbinary
MD5:B259E7D25E95EE65052D6DB146BCFE24
SHA256:106A02E6E6452320F7F5425DBFBC8B126AC331D3C758417B08AB80B8AAA91846
3160WINWORD.EXEC:\Users\admin\AppData\Local\Temp\if.binexecutable
MD5:9F09B1DD6235C28B091A7DBC9BCD9482
SHA256:571CBA0431ACEA4739C5248DE1B1D33E76E995B3C7454F4D88D2785ADE6FDF74
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
1
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3888
rundll32.exe
GET
200
3.232.242.170:80
http://api.ipify.org/
US
text
13 b
shared
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3.232.242.170:80
api.ipify.org
US
malicious

DNS requests

Domain
IP
Reputation
api.ipify.org
  • 3.232.242.170
  • 3.220.57.224
  • 52.20.78.240
  • 54.91.59.199
shared
hiltustra.com
malicious
dns.msftncsi.com
  • 131.107.255.255
shared
corelince.ru
unknown
mernwel.ru
unknown

Threats

PID
Process
Class
Message
3888
rundll32.exe
Potential Corporate Privacy Violation
ET POLICY External IP Lookup api.ipify.org
No debug info