File name: | 0208_54741869750132.doc |
Full analysis: | https://app.any.run/tasks/4a9eaf6f-1727-4636-99f1-5d677456213f |
Verdict: | Malicious activity |
Threats: | Hancitor was created in 2014 to drop other malware on infected machines. It is also known as Tordal and Chanitor. This malware is available as a service which makes it accessible tools to criminals and contributes to the popularity of this virus. |
Analysis date: | February 10, 2021, 00:57:46 |
OS: | Windows 10 Professional (build: 16299, 64 bit) |
Tags: | |
Indicators: | |
MIME: | application/msword |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Author: MyPc, Template: 0802_20304783210485.dotm, Last Saved By: MyPc, Revision Number: 2, Name of Creating Application: Microsoft Office Word, Total Editing Time: 01:00, Create Time/Date: Mon Feb 8 13:07:00 2021, Last Saved Time/Date: Mon Feb 8 13:07:00 2021, Number of Pages: 1, Number of Words: 3, Number of Characters: 19, Security: 0 |
MD5: | 7F6C623196D7E76C205B4FB898AD9BE6 |
SHA1: | 408BB5B4E8AC34CE3B70BA54E00E9858CED885C0 |
SHA256: | 3A5648F7DE99C4F87331C36983FC8ADCD667743569A19C8DAFDD5E8A33DE154D |
SSDEEP: | 24576:pA8N8rVgYpNGhCOndGCl/LSD7aq/Iq9M:x0JkCOo6T |
.doc | | | Microsoft Word document (34.5) |
---|---|---|
.doc | | | Microsoft Word document (old ver.) (20.5) |
CompObjUserType: | Microsoft Word 97-2003 Document |
---|---|
CompObjUserTypeLen: | 32 |
HeadingPairs: |
|
TitleOfParts: | - |
HyperlinksChanged: | No |
SharedDoc: | No |
LinksUpToDate: | No |
ScaleCrop: | No |
AppVersion: | 16 |
CharCountWithSpaces: | 21 |
Paragraphs: | 1 |
Lines: | 1 |
Company: | - |
CodePage: | Windows Latin 1 (Western European) |
Security: | None |
Characters: | 19 |
Words: | 3 |
Pages: | 1 |
ModifyDate: | 2021:02:08 13:07:00 |
CreateDate: | 2021:02:08 13:07:00 |
TotalEditTime: | 1.0 minutes |
Software: | Microsoft Office Word |
RevisionNumber: | 2 |
LastModifiedBy: | MyPc |
Template: | 0802_20304783210485.dotm |
Comments: | - |
Keywords: | - |
Author: | MyPc |
Subject: | - |
Title: | - |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
4440 | "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\admin\Desktop\0208_54741869750132.doc" /o "" | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Exit code: 0 Version: 16.0.12026.20264 Modules
| |||||||||||||||
1172 | C:\WINDOWS\splwow64.exe 8192 | C:\WINDOWS\splwow64.exe | — | WINWORD.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Print driver host for applications Version: 10.0.16299.15 (WinBuild.160101.0800) Modules
| |||||||||||||||
2444 | "C:\Windows\System32\rundll32.exe" C:\Users\admin\AppData\Roaming\Microsoft\Templates\W0rd.dll,UminslaIIF0mt | C:\Windows\System32\rundll32.exe | — | WINWORD.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Version: 10.0.16299.15 (WinBuild.160101.0800) Modules
| |||||||||||||||
4532 | "C:\Windows\System32\rundll32.exe" C:\Users\admin\AppData\Roaming\Microsoft\Templates\W0rd.dll,UminslaIIF0mt | C:\WINDOWS\SysWOW64\rundll32.exe | rundll32.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Version: 10.0.16299.15 (WinBuild.160101.0800) Modules
|
(PID) Process: | (4440) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\Common\ClientTelemetry\Sampling |
Operation: | write | Name: | 0 |
Value: 017012000000001000284FFA2E02000000000000000500000000000000 | |||
(PID) Process: | (4440) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\Common\CrashPersistence\WINWORD\4440 |
Operation: | write | Name: | 0 |
Value: 0B0E1015F994100F369B42B652264CCDCABC55230046A3B2BDF1FCE8BFEB016A0410240044FA5D64A89E01008500A907556E6B6E6F776EC9062E2237746A7531514A7270614A676C575A3133564B5831454135496D464B2F5649644A30497A464862453674383D2200 | |||
(PID) Process: | (4440) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages |
Operation: | write | Name: | en-US |
Value: 2 | |||
(PID) Process: | (4440) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages |
Operation: | write | Name: | es-es |
Value: 2 | |||
(PID) Process: | (4440) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages |
Operation: | write | Name: | de-de |
Value: 2 | |||
(PID) Process: | (4440) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages |
Operation: | write | Name: | fr-fr |
Value: 2 | |||
(PID) Process: | (4440) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages |
Operation: | write | Name: | it-it |
Value: 2 | |||
(PID) Process: | (4440) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages |
Operation: | write | Name: | ja-jp |
Value: 2 | |||
(PID) Process: | (4440) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages |
Operation: | write | Name: | ko-kr |
Value: 2 | |||
(PID) Process: | (4440) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages |
Operation: | write | Name: | pt-br |
Value: 2 |
PID | Process | Filename | Type | |
---|---|---|---|---|
4440 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\0IEAPKKM6QTH60TG7HHA.temp | — | |
MD5:— | SHA256:— | |||
4440 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\HI4AZKAOSG7JV6REPIGY.temp | — | |
MD5:— | SHA256:— | |||
4440 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\msohtmlclip1_PendingDelete | — | |
MD5:— | SHA256:— | |||
4440 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Word\~WRD0000.tmp | — | |
MD5:— | SHA256:— | |||
4440 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Word\0208_54741869750132308672720651429565\0208_54741869750132((Autorecovered-308672720651263488)).asd | — | |
MD5:— | SHA256:— | |||
4440 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~DF7FD474C00F6C5550.TMP | — | |
MD5:— | SHA256:— | |||
4440 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dat | text | |
MD5:C54FC3FD7F150762DF90584D25C4467D | SHA256:66778DD8F34D52A7EE3948EE879690D8F6B2B94ABB185ADC36DC4DC69EE608C8 | |||
4440 | WINWORD.EXE | C:\Users\admin\Desktop\~$08_54741869750132.doc | pgc | |
MD5:48CFDB6835C991369398A8BC423E0ECA | SHA256:60952E8D0BE316E6BCC183F53FC7E96AA15DFF1EDFC9D1351E04419970B14E33 | |||
4440 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:7032C74BD92DC7AFF9DFDA896EC316C3 | SHA256:AA7F702BED62A15483A99585A682036576C3C33DA2A994629F74383B73880FD0 | |||
4440 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\0208_54741869750132.doc.LNK | lnk | |
MD5:22F25C39D54B532741F71DC98BFF6D01 | SHA256:FEE2B1719671755E78F56DCFAA91A22ECC8B1673B0702DE75FC4AB44072AE343 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
4532 | rundll32.exe | POST | — | 213.5.229.12:80 | http://satursed.com/8/forum.php | RU | — | — | malicious |
4532 | rundll32.exe | POST | 200 | 95.216.84.231:80 | http://sameastar.ru/8/forum.php | DE | text | 12 b | malicious |
4532 | rundll32.exe | GET | 200 | 54.243.164.148:80 | http://api.ipify.org/ | US | text | 12 b | shared |
4440 | WINWORD.EXE | GET | 200 | 13.107.42.23:443 | https://config.edge.skype.com/config/v2/Office/word/16.0.12026.20264/Production/CC?&Clientid=%7bD61AB268-C26A-439D-BB15-2A0DEDFCA6A3%7d&Application=word&Platform=win32&Version=16.0.12026.20264&MsoVersion=16.0.12026.20194&Audience=Production&Build=ship&Architecture=x64&Language=en-US&SubscriptionLicense=false&PerpetualLicense=2019&Channel=CC&InstallType=C2R&SessionId=%7b1094F915-360F-429B-B652-264CCDCABC55%7d&LabMachine=false | US | text | 89.2 Kb | whitelisted |
4440 | WINWORD.EXE | POST | 200 | 52.114.32.25:443 | https://self.events.data.microsoft.com/OneCollector/1.0/ | JP | text | 9 b | whitelisted |
4440 | WINWORD.EXE | POST | 200 | 52.114.32.25:443 | https://self.events.data.microsoft.com/OneCollector/1.0/ | JP | text | 9 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4532 | rundll32.exe | 213.5.229.12:80 | satursed.com | ArtPlanet LLC | RU | malicious |
4532 | rundll32.exe | 95.216.84.231:80 | sameastar.ru | Hetzner Online GmbH | DE | malicious |
4440 | WINWORD.EXE | 52.114.32.25:443 | self.events.data.microsoft.com | Microsoft Corporation | JP | whitelisted |
4532 | rundll32.exe | 54.243.164.148:80 | api.ipify.org | Amazon.com, Inc. | US | suspicious |
4440 | WINWORD.EXE | 13.107.42.23:443 | config.edge.skype.com | Microsoft Corporation | US | suspicious |
Domain | IP | Reputation |
---|---|---|
config.edge.skype.com |
| whitelisted |
api.ipify.org |
| shared |
satursed.com |
| malicious |
self.events.data.microsoft.com |
| whitelisted |
sameastar.ru |
| malicious |
PID | Process | Class | Message |
---|---|---|---|
— | — | Potential Corporate Privacy Violation | ET POLICY External IP Lookup api.ipify.org |
— | — | A Network Trojan was detected | MALWARE [PTsecurity] Hancitor POST Data send |
— | — | A Network Trojan was detected | MALWARE [PTsecurity] Hancitor POST Data send |