File name: | 911ba800900eae619fc6ff06d6215d1f785d5897|6.pif |
Full analysis: | https://app.any.run/tasks/c05ea73a-761b-4b30-a3b3-76ecfa2844f6 |
Verdict: | Malicious activity |
Threats: | Hancitor was created in 2014 to drop other malware on infected machines. It is also known as Tordal and Chanitor. This malware is available as a service which makes it accessible tools to criminals and contributes to the popularity of this virus. |
Analysis date: | December 06, 2018, 17:02:38 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5: | 5EDBF9C1DF25F87113134FC6569F867D |
SHA1: | 911BA800900EAE619FC6FF06D6215D1F785D5897 |
SHA256: | 973E503DFEA44DFA6128D31CA2F428F3E3D8478BB3750BEAB088E9E4F0D7DE9E |
SSDEEP: | 1536:OgBcESpSJW7WDyfSO3gdpRjL+G94/EceeLuB5oGqZ:xeESpSJ+Wy34pRjiG9qEIO5oZ |
.exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
---|---|---|
.exe | | | Win64 Executable (generic) (37.3) |
.dll | | | Win32 Dynamic Link Library (generic) (8.8) |
.exe | | | Win32 Executable (generic) (6) |
.exe | | | Generic Win/DOS Executable (2.7) |
ProductVersion: | 9.1.2 |
---|---|
ProductName: | PostgreSQL |
LegalCopyright: | Portions Copyright (c) 1996-2011, PostgreSQL Global Development Group. Portions Copyright (c) 1994, Regents of the University of California. |
FileVersion: | 9.1.2 |
FileDescription: | initdb - initialize a new database cluster |
CompanyName: | PostgreSQL Global Development Group |
CharacterSet: | Unicode |
LanguageCode: | Neutral |
FileSubtype: | - |
ObjectFileType: | Executable application |
FileOS: | Windows NT 32-bit |
FileFlags: | (none) |
FileFlagsMask: | 0x0017 |
ProductVersionNumber: | 9.1.2.0 |
FileVersionNumber: | 9.1.2.11335 |
Subsystem: | Windows GUI |
SubsystemVersion: | 4 |
ImageVersion: | - |
OSVersion: | 4 |
EntryPoint: | 0x2766 |
UninitializedDataSize: | - |
InitializedDataSize: | 36864 |
CodeSize: | 45056 |
LinkerVersion: | 8 |
PEType: | PE32 |
TimeStamp: | 2018:07:26 11:27:59+02:00 |
MachineType: | Intel 386 or later, and compatibles |
Architecture: | IMAGE_FILE_MACHINE_I386 |
---|---|
Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Compilation Date: | 26-Jul-2018 09:27:59 |
Detected languages: |
|
CompanyName: | PostgreSQL Global Development Group |
FileDescription: | initdb - initialize a new database cluster |
FileVersion: | 9.1.2 |
LegalCopyright: | Portions Copyright (c) 1996-2011, PostgreSQL Global Development Group. Portions Copyright (c) 1994, Regents of the University of California. |
ProductName: | PostgreSQL |
ProductVersion: | 9.1.2 |
Magic number: | MZ |
---|---|
Bytes on last page of file: | 0x0090 |
Pages in file: | 0x0003 |
Relocations: | 0x0000 |
Size of header: | 0x0004 |
Min extra paragraphs: | 0x0000 |
Max extra paragraphs: | 0xFFFF |
Initial SS value: | 0x0000 |
Initial SP value: | 0x00B8 |
Checksum: | 0x0000 |
Initial IP value: | 0x0000 |
Initial CS value: | 0x0000 |
Overlay number: | 0x0000 |
OEM identifier: | 0x0000 |
OEM information: | 0x0000 |
Address of NE header: | 0x000000F0 |
Signature: | PE |
---|---|
Machine: | IMAGE_FILE_MACHINE_I386 |
Number of sections: | 4 |
Time date stamp: | 26-Jul-2018 09:27:59 |
Pointer to Symbol Table: | 0x00000000 |
Number of symbols: | 0 |
Size of Optional Header: | 0x00E0 |
Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
---|---|---|---|---|---|
.text | 0x00001000 | 0x0000AD33 | 0x0000B000 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.16943 |
.rdata | 0x0000C000 | 0x0000126A | 0x00002000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 2.67577 |
.data | 0x0000E000 | 0x00000FC0 | 0x00001000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.341564 |
.rsrc | 0x0000F000 | 0x00005FF0 | 0x00006000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.73596 |
Title | Entropy | Size | Codepage | Language | Type |
---|---|---|---|---|---|
1 | 5.0207 | 598 | Latin 1 / Western European | English - United States | RT_MANIFEST |
2 | 6.02967 | 2216 | Latin 1 / Western European | English - United States | RT_ICON |
3 | 5.79127 | 3752 | Latin 1 / Western European | English - United States | RT_ICON |
4 | 5.75094 | 1128 | Latin 1 / Western European | English - United States | RT_ICON |
5 | 5.79719 | 4264 | Latin 1 / Western European | English - United States | RT_ICON |
6 | 5.36744 | 9640 | Latin 1 / Western European | English - United States | RT_ICON |
IDI_ICON | 2.69913 | 90 | Latin 1 / Western European | English - United States | RT_GROUP_ICON |
ADVAPI32.DLL |
KERNEL32.dll |
msvcrt.dll |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3100 | "C:\Users\admin\AppData\Local\Temp\b35a405d-d518-4ab2-b82c-45c7895e0277.pif.exe" | C:\Users\admin\AppData\Local\Temp\b35a405d-d518-4ab2-b82c-45c7895e0277.pif.exe | explorer.exe | |
User: admin Company: PostgreSQL Global Development Group Integrity Level: MEDIUM Description: initdb - initialize a new database cluster Version: 9.1.2 | ||||
3944 | C:\Users\admin\AppData\Local\Temp\BNFF24.tmp | C:\Users\admin\AppData\Local\Temp\BNFF24.tmp | b35a405d-d518-4ab2-b82c-45c7895e0277.pif.exe | |
User: admin Integrity Level: MEDIUM | ||||
2436 | cmd /K | C:\Windows\system32\cmd.exe | — | b35a405d-d518-4ab2-b82c-45c7895e0277.pif.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
1776 | "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding | C:\Program Files\Internet Explorer\iexplore.exe | svchost.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Exit code: 1 Version: 8.00.7600.16385 (win7_rtm.090713-1255) | ||||
2328 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1776 CREDAT:71937 | C:\Program Files\Internet Explorer\iexplore.exe | iexplore.exe | |
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Internet Explorer Exit code: 0 Version: 8.00.7600.16385 (win7_rtm.090713-1255) | ||||
3720 | C:\Windows\System32\svchost.exe | C:\Windows\System32\svchost.exe | b35a405d-d518-4ab2-b82c-45c7895e0277.pif.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Host Process for Windows Services Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
1464 | "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding | C:\Program Files\Internet Explorer\iexplore.exe | svchost.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Exit code: 1 Version: 8.00.7600.16385 (win7_rtm.090713-1255) | ||||
1936 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1464 CREDAT:71937 | C:\Program Files\Internet Explorer\iexplore.exe | iexplore.exe | |
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Internet Explorer Exit code: 0 Version: 8.00.7600.16385 (win7_rtm.090713-1255) | ||||
3868 | "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding | C:\Program Files\Internet Explorer\iexplore.exe | svchost.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Exit code: 1 Version: 8.00.7600.16385 (win7_rtm.090713-1255) | ||||
3900 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3868 CREDAT:71937 | C:\Program Files\Internet Explorer\iexplore.exe | iexplore.exe | |
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Internet Explorer Exit code: 0 Version: 8.00.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
1776 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\favicon[1].ico | — | |
MD5:— | SHA256:— | |||
1776 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico | — | |
MD5:— | SHA256:— | |||
1776 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\~DFB8656B02E32E7453.TMP | — | |
MD5:— | SHA256:— | |||
1776 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{D9C84E5C-F978-11E8-834A-5254004A04AF}.dat | — | |
MD5:— | SHA256:— | |||
1776 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\~DF96D711A469170D22.TMP | — | |
MD5:— | SHA256:— | |||
1776 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{D9C84E5B-F978-11E8-834A-5254004A04AF}.dat | — | |
MD5:— | SHA256:— | |||
1464 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\favicon[1].ico | — | |
MD5:— | SHA256:— | |||
1464 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico | — | |
MD5:— | SHA256:— | |||
1464 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\~DF6E111BD6FE3B2888.TMP | — | |
MD5:— | SHA256:— | |||
1464 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\~DF5D7E25120CC0606B.TMP | — | |
MD5:— | SHA256:— |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3100 | b35a405d-d518-4ab2-b82c-45c7895e0277.pif.exe | GET | 200 | 46.235.47.59:80 | http://sensesfinefoods.com/wp-includes/pomo/1 | NL | binary | 45.2 Kb | malicious |
3100 | b35a405d-d518-4ab2-b82c-45c7895e0277.pif.exe | GET | 200 | 46.235.47.59:80 | http://sensesfinefoods.com/wp-includes/pomo/3 | NL | binary | 121 Kb | malicious |
3100 | b35a405d-d518-4ab2-b82c-45c7895e0277.pif.exe | POST | 200 | 191.101.20.16:80 | http://tertsahedwith.com/4/forum.php | NL | text | 1.05 Kb | malicious |
3100 | b35a405d-d518-4ab2-b82c-45c7895e0277.pif.exe | GET | 200 | 46.235.47.59:80 | http://sensesfinefoods.com/wp-includes/pomo/3 | NL | binary | 121 Kb | malicious |
3100 | b35a405d-d518-4ab2-b82c-45c7895e0277.pif.exe | POST | 200 | 191.101.20.16:80 | http://tertsahedwith.com/4/forum.php | NL | text | 12 b | malicious |
2624 | iexplore.exe | GET | 200 | 204.79.197.200:80 | http://www.bing.com/favicon.ico | US | image | 237 b | whitelisted |
1464 | iexplore.exe | GET | 200 | 204.79.197.200:80 | http://www.bing.com/favicon.ico | US | image | 237 b | whitelisted |
1172 | iexplore.exe | GET | 200 | 204.79.197.200:80 | http://www.bing.com/favicon.ico | US | image | 237 b | whitelisted |
3100 | b35a405d-d518-4ab2-b82c-45c7895e0277.pif.exe | GET | 200 | 54.204.36.156:80 | http://api.ipify.org/ | US | text | 15 b | shared |
3100 | b35a405d-d518-4ab2-b82c-45c7895e0277.pif.exe | POST | — | 191.101.20.16:80 | http://tertsahedwith.com/mlu/forum.php | NL | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
1464 | iexplore.exe | 204.79.197.200:80 | www.bing.com | Microsoft Corporation | US | whitelisted |
1776 | iexplore.exe | 204.79.197.200:80 | www.bing.com | Microsoft Corporation | US | whitelisted |
3868 | iexplore.exe | 204.79.197.200:80 | www.bing.com | Microsoft Corporation | US | whitelisted |
2340 | iexplore.exe | 204.79.197.200:80 | www.bing.com | Microsoft Corporation | US | whitelisted |
3900 | iexplore.exe | 47.52.45.178:80 | api2.doter.at | Alibaba (China) Technology Co., Ltd. | HK | malicious |
3100 | b35a405d-d518-4ab2-b82c-45c7895e0277.pif.exe | 54.204.36.156:80 | api.ipify.org | Amazon.com, Inc. | US | malicious |
1936 | iexplore.exe | 47.52.45.178:80 | api2.doter.at | Alibaba (China) Technology Co., Ltd. | HK | malicious |
2352 | iexplore.exe | 47.52.45.178:80 | api2.doter.at | Alibaba (China) Technology Co., Ltd. | HK | malicious |
2328 | iexplore.exe | 47.52.45.178:80 | api2.doter.at | Alibaba (China) Technology Co., Ltd. | HK | malicious |
3100 | b35a405d-d518-4ab2-b82c-45c7895e0277.pif.exe | 191.101.20.16:80 | tertsahedwith.com | Swiftway Sp. z o.o. | NL | malicious |
Domain | IP | Reputation |
---|---|---|
api.ipify.org |
| shared |
tertsahedwith.com |
| malicious |
sensesfinefoods.com |
| malicious |
api2.doter.at |
| malicious |
www.bing.com |
| whitelisted |
beetfeetlife.bit |
| malicious |
in.extermas.at |
| malicious |
asx.zaronif.at |
| unknown |
g2.ex100p.at |
| malicious |
gif.doter.at |
| malicious |
PID | Process | Class | Message |
---|---|---|---|
3100 | b35a405d-d518-4ab2-b82c-45c7895e0277.pif.exe | A Network Trojan was detected | MALWARE [PTsecurity] Hancitor POST Data send |
3100 | b35a405d-d518-4ab2-b82c-45c7895e0277.pif.exe | Potential Corporate Privacy Violation | ET POLICY External IP Lookup api.ipify.org |
3100 | b35a405d-d518-4ab2-b82c-45c7895e0277.pif.exe | A Network Trojan was detected | MALWARE [PTsecurity] Fareit/Pony/Hancitor Payload (Zeus) |
3100 | b35a405d-d518-4ab2-b82c-45c7895e0277.pif.exe | A Network Trojan was detected | MALWARE [PTsecurity] Fareit/Pony/Hancitor Payload (Zeus) |
3100 | b35a405d-d518-4ab2-b82c-45c7895e0277.pif.exe | A Network Trojan was detected | ET TROJAN Fareit/Pony Downloader Checkin 2 |
3100 | b35a405d-d518-4ab2-b82c-45c7895e0277.pif.exe | A Network Trojan was detected | MALWARE [PTsecurity] Fareit/Pony/Hancitor Payload (Zeus) |
2328 | iexplore.exe | A Network Trojan was detected | SC SPYWARE Spyware Ursnif Win32 |
1936 | iexplore.exe | A Network Trojan was detected | SC SPYWARE Spyware Ursnif Win32 |
3944 | BNFF24.tmp | Potentially Bad Traffic | ET CURRENT_EVENTS DNS Query Domain .bit |
3900 | iexplore.exe | A Network Trojan was detected | SC SPYWARE Spyware Ursnif Win32 |
Process | Message |
---|---|
b35a405d-d518-4ab2-b82c-45c7895e0277.pif.exe | gIpVG |