File name:

zoro.doc.zip

Full analysis: https://app.any.run/tasks/6d29556f-4aad-4640-92e6-30d6ac681680
Verdict: Malicious activity
Threats:

Hancitor was created in 2014 to drop other malware on infected machines. It is also known as Tordal and Chanitor. This malware is available as a service which makes it accessible tools to criminals and contributes to the popularity of this virus.

Analysis date: October 13, 2021, 12:30:18
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
encrypted
evasion
trojan
hancitor
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

B4F30A2626526692CDE3944FD44BABF5

SHA1:

24E70C87C94A3B158D991CBE032F29981D98366D

SHA256:

F96D2080BF79C591E1CA112215C88A5A2DADB8A16D745CFD1375C2AA62A5A716

SSDEEP:

3072:k4jrCrgGL1MaLGNZWz6d8D0Xdd8iOZGgQyljtH91xR9mv5BRlRUVIZFZ4eUzZ:HOz5QXd8D0XdKvp1VD15qHl5d4JzZ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executable content was dropped or overwritten

      • WINWORD.EXE (PID: 2760)
    • Unusual execution from Microsoft Office

      • WINWORD.EXE (PID: 2760)
    • HANCITOR was detected

      • rundll32.exe (PID: 2840)
    • Connects to CnC server

      • rundll32.exe (PID: 2840)
  • SUSPICIOUS

    • Checks supported languages

      • WinRAR.exe (PID: 680)
      • WinRAR.exe (PID: 2712)
    • Reads the computer name

      • WinRAR.exe (PID: 680)
      • WinRAR.exe (PID: 2712)
    • Reads default file associations for system extensions

      • WinRAR.exe (PID: 680)
      • WinRAR.exe (PID: 2712)
      • WINWORD.EXE (PID: 2760)
    • Drops a file that was compiled in debug mode

      • WINWORD.EXE (PID: 2760)
    • Uses RUNDLL32.EXE to load library

      • WINWORD.EXE (PID: 2760)
    • Checks for external IP

      • rundll32.exe (PID: 2840)
  • INFO

    • Reads the computer name

      • WINWORD.EXE (PID: 3020)
      • WINWORD.EXE (PID: 2760)
      • rundll32.exe (PID: 2840)
    • Checks supported languages

      • WINWORD.EXE (PID: 3020)
      • WINWORD.EXE (PID: 2760)
      • rundll32.exe (PID: 2840)
    • Manual execution by user

      • WINWORD.EXE (PID: 3020)
      • WinRAR.exe (PID: 2712)
      • WINWORD.EXE (PID: 2760)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 3020)
      • WINWORD.EXE (PID: 2760)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 3020)
      • WINWORD.EXE (PID: 2760)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 788
ZipBitFlag: 0x0001
ZipCompression: Deflated
ZipModifyDate: 2021:10:13 12:28:16
ZipCRC: 0x155795ba
ZipCompressedSize: 185403
ZipUncompressedSize: 189952
ZipFileName: zoro.doc
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
45
Monitored processes
5
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs winword.exe no specs winrar.exe no specs winword.exe #HANCITOR rundll32.exe

Process information

PID
CMD
Path
Indicators
Parent process
680"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\zoro.doc.zip"C:\Program Files\WinRAR\WinRAR.exeExplorer.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
c:\windows\system32\comdlg32.dll
2712"C:\Program Files\WinRAR\WinRAR.exe" x -iext -ow -ver -- "C:\Users\admin\Desktop\zoro.doc.zip" "?\"C:\Program Files\WinRAR\WinRAR.exeExplorer.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2760"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\zoro.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\comctl32.dll
2840rundll32.exe c:\users\admin\appdata\roaming\microsoft\templates\gelforr.dap,BNJAFSRSQIXC:\Windows\system32\rundll32.exe
WINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
3020"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\zoro.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEExplorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\comctl32.dll
Total events
6 027
Read events
4 729
Write events
746
Delete events
552

Modification events

(PID) Process:(680) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(680) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(680) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(680) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(680) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\zoro.doc.zip
(PID) Process:(680) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(680) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(680) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(680) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(680) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\DialogEditHistory\ExtrPath
Operation:writeName:0
Value:
C:\Users\admin\Desktop
Executable files
2
Suspicious files
10
Text files
2
Unknown types
17

Dropped files

PID
Process
Filename
Type
3020WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRFCC8.tmp.cvr
MD5:
SHA256:
2760WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR9EE4.tmp.cvr
MD5:
SHA256:
3020WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~DF75C17B192DF1E36E.TMPbinary
MD5:75FD0E273B0A955BA224523BC951326B
SHA256:214F2C79568BEB80B2476525003D3C880E5DB7140074B9D6DAA53C7F5B5DE7E5
3020WINWORD.EXEC:\Users\admin\Desktop\~$zoro.docpgc
MD5:B148E5670022AD1896C90413A5EB9B1B
SHA256:9E6888680FC74CCA83DD940B2D4F9A9F842B7D7CB3CCE0C4495A0C196596D115
3020WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~DF277AB7401790CFB8.TMPbinary
MD5:75FD0E273B0A955BA224523BC951326B
SHA256:214F2C79568BEB80B2476525003D3C880E5DB7140074B9D6DAA53C7F5B5DE7E5
2760WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:24E45FD3A62C74E9CBFE7CD5F930987C
SHA256:7930ABF579F26841C66B5AC2223BE8DEDC332766C26C2B87067FEF02BE840288
2760WINWORD.EXEC:\Users\admin\Desktop\~$zoro.docpgc
MD5:9CD2BBF25EB4A03A09CDAE400903DF3B
SHA256:00948202552D0622F83B4E14599E8EDD55EF9CF98A980147710E0AC7F8D55E88
2712WinRAR.exeC:\Users\admin\Desktop\zoro.docbinary
MD5:75FD0E273B0A955BA224523BC951326B
SHA256:214F2C79568BEB80B2476525003D3C880E5DB7140074B9D6DAA53C7F5B5DE7E5
2760WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8F23763F.emfemf
MD5:F35EF57BAFF236924BF5A14CA282B3F5
SHA256:6B6024CDC7F5436EBCBF4BFC2138FB93CC2D5D8950A73EF50392A37FA089CAEA
2760WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~DFC8EF237A3F6313F5.TMPbinary
MD5:75FD0E273B0A955BA224523BC951326B
SHA256:214F2C79568BEB80B2476525003D3C880E5DB7140074B9D6DAA53C7F5B5DE7E5
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
2
DNS requests
7
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2840
rundll32.exe
POST
194.147.115.132:80
http://forkineler.com/8/forum.php
unknown
malicious
2840
rundll32.exe
GET
200
54.243.29.214:80
http://api.ipify.org/
US
text
12 b
shared
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2840
rundll32.exe
54.243.29.214:80
api.ipify.org
Amazon.com, Inc.
US
suspicious
2840
rundll32.exe
194.147.115.132:80
forkineler.com
malicious

DNS requests

Domain
IP
Reputation
api.ipify.org
  • 54.243.29.214
  • 50.17.200.19
  • 50.16.216.118
  • 23.23.138.107
  • 23.21.76.7
  • 54.243.250.193
  • 54.243.253.71
  • 50.19.104.221
shared
forkineler.com
  • 194.147.115.132
malicious
yemodene.ru
unknown
fordecits.ru
unknown

Threats

PID
Process
Class
Message
2840
rundll32.exe
Potential Corporate Privacy Violation
ET POLICY External IP Lookup api.ipify.org
2840
rundll32.exe
A Network Trojan was detected
ET TROJAN Tordal/Hancitor/Chanitor Checkin
No debug info