{"id":11724,"date":"2018-03-13T15:47:05","date_gmt":"2018-03-13T23:47:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/03\/13\/news-5494\/"},"modified":"2018-03-13T15:47:05","modified_gmt":"2018-03-13T23:47:05","slug":"news-5494","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/03\/13\/news-5494\/","title":{"rendered":"Hancitor: fileless attack with a DLL copy trick"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Tue, 13 Mar 2018 16:00:00 +0000<\/strong><\/p>\n<p><em>This article was authored by David S\u00e1nchez, Micka\u00ebl Roger, and J\u00e9r\u00f4me Segura<\/em><\/p>\n<p>During the past few years, malicious spam campaigns have proven to be one of the most efficient infection vectors, in part due to a combination of social engineering and a regular number of Office vulnerabilities.<\/p>\n<p>The interesting aspect about social engineering is that it capitalizes on the user\u2019s poor decision to execute code that would have been much harder to inject, or that could have been caught by security solutions otherwise. In other words, letting victims do the work remains an effective means for attackers to compromise endpoints.<\/p>\n<p>We recently came across an interesting attack vector brought to us courtesy of a fresh Hancitor (a payload delivery piece of malware) spam run where users are tricked to download a fake Paypal invoice laced with malicious code.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/Paypal_malspam.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22226\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/hancitor-fileless-attack-with-a-copy-trick\/attachment\/paypal_malspam\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/Paypal_malspam.png\" data-orig-size=\"2526,1443\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Paypal_malspam\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/Paypal_malspam-300x171.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/Paypal_malspam-600x343.png\" class=\"size-full wp-image-22226 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/Paypal_malspam.png\" alt=\"\" width=\"2526\" height=\"1443\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/Paypal_malspam.png 2526w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/Paypal_malspam-300x171.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/Paypal_malspam-600x343.png 600w\" sizes=\"auto, (max-width: 2526px) 100vw, 2526px\" \/><\/a><\/p>\n<p>Hancitor has had a clever delivery mechanism that allows for fileless infections. A blog post from <a href=\"http:\/\/blog.morphisec.com\/hancitor-macro-malware-with-process-hollowing\">Morphisec<\/a> in 2016 already detailed a technique via process hollowing that allowed it to bypass security products.<\/p>\n<p>While this latest attack also shares the same process hollowing technique, it performs different actions to subvert hook protections, and ultimately results in infections that are harder to detect.<\/p>\n<h3>Overview<\/h3>\n<p>The attack involves making a copy of the kernel32.dll library, which exposes some of the most important Windows APIs, in order to create a new malicious process via this innocuous copy. As we will see, this simple trick bypasses Ring 3 hook protections.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/process_view.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22218\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/hancitor-fileless-attack-with-a-copy-trick\/attachment\/process_view-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/process_view.png\" data-orig-size=\"1178,273\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"process_view\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/process_view-300x70.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/process_view-600x139.png\" class=\"size-full wp-image-22218 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/process_view.png\" alt=\"\" width=\"1178\" height=\"273\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/process_view.png 1178w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/process_view-300x70.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/process_view-600x139.png 600w\" sizes=\"auto, (max-width: 1178px) 100vw, 1178px\" \/><\/a><\/p>\n<h3>Technical analysis<\/h3>\n<p>The Word macro decodes the first stage of the payload and then calls the <strong>NtAllocateVirtualMemory<\/strong> API to copy the decoded code to a newly allocated memory area. Then, the macro takes the pointer to that code and calls the <strong>CreateTimerQueueTimer<\/strong> API so that the malicious code will be executed directly in memory.<\/p>\n<p>By setting a breakpoint there, we can catch the payload before it executes:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/PEB_Shellcode.png\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22219\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/hancitor-fileless-attack-with-a-copy-trick\/attachment\/peb_shellcode\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/PEB_Shellcode.png\" data-orig-size=\"1068,398\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"PEB_Shellcode\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/PEB_Shellcode-300x112.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/PEB_Shellcode-600x224.png\" class=\"size-full wp-image-22219 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/PEB_Shellcode.png\" alt=\"\" width=\"1068\" height=\"398\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/PEB_Shellcode.png 1068w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/PEB_Shellcode-300x112.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/PEB_Shellcode-600x224.png 600w\" sizes=\"auto, (max-width: 1068px) 100vw, 1068px\" \/><\/a><\/p>\n<p>The payload then gets the address of the <strong>ntdll.ldrLoadDll<\/strong> API and calls it to get the handle of the <strong>kernel32.dll<\/strong> and <strong>psapi.dll<\/strong> libraries, the latter being used to obtain information on the status of processes and drivers.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/ldrLoadDLL.png\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22220\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/hancitor-fileless-attack-with-a-copy-trick\/attachment\/ldrloaddll\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/ldrLoadDLL.png\" data-orig-size=\"1254,270\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"ldrLoadDLL\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/ldrLoadDLL-300x65.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/ldrLoadDLL-600x129.png\" class=\"size-full wp-image-22220 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/ldrLoadDLL.png\" alt=\"\" width=\"1254\" height=\"270\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/ldrLoadDLL.png 1254w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/ldrLoadDLL-300x65.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/ldrLoadDLL-600x129.png 600w\" sizes=\"auto, (max-width: 1254px) 100vw, 1254px\" \/><\/a><\/p>\n<p>It then finds the addresses of the following APIs:<\/p>\n<ul>\n<li>dll-&gt;ExpandEnvironmentStrings<\/li>\n<li>dll-&gt;GetMappedFileNameA<\/li>\n<li>kernel32!VirtualQuery<\/li>\n<li>kernel32!lstrcmpA<\/li>\n<li>kernel32!VirtualAlloc<\/li>\n<\/ul>\n<p><strong>kernel32!VirtualAlloc<\/strong> is used to allocate a new area in memory; after some decoding operations, we can see that the payload is indeed a PE file residing in memory:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/PE_IN_MEMORY.png\" data-rel=\"lightbox-4\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22221\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/hancitor-fileless-attack-with-a-copy-trick\/attachment\/pe_in_memory\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/PE_IN_MEMORY.png\" data-orig-size=\"1434,400\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"PE_IN_MEMORY\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/PE_IN_MEMORY-300x84.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/PE_IN_MEMORY-600x167.png\" class=\"size-full wp-image-22221 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/PE_IN_MEMORY.png\" alt=\"\" width=\"1434\" height=\"400\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/PE_IN_MEMORY.png 1434w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/PE_IN_MEMORY-300x84.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/PE_IN_MEMORY-600x167.png 600w\" sizes=\"auto, (max-width: 1434px) 100vw, 1434px\" \/><\/a><\/p>\n<p>Now, the payload looks for other APIs:<\/p>\n<ul>\n<li>ntdll!ZwUnMapViewOfSection<\/li>\n<li>kernel32!VirtualAllocEx<\/li>\n<li>kernel32!ResumeThread<\/li>\n<li>kernel32!WriteProcessMemory<\/li>\n<li>kernel32!Wow64SetThreadContext<\/li>\n<li>kernel32!Wow64GetThreadContext<\/li>\n<li>kernel32!IsWow64Process<\/li>\n<\/ul>\n<p>After some operating system checks, it calls the <strong>kernel32! ExandEnvironmentStringsW<\/strong> API to get the path of the svchost.exe process.<\/p>\n<p>This is followed by a lookup of these APIs:<\/p>\n<ul>\n<li>CreateProcessW<\/li>\n<li>CopyFileExW<\/li>\n<li>LoadLibaryW<\/li>\n<li>GetModuleFileNameW<\/li>\n<\/ul>\n<p>After finding those API functions it calls the <strong>kernel32!ExandEnvironmentStringsW<\/strong> API to get the path of the <em>%temp%krnl32.dll<\/em> string. This is used to call the <strong>kernel32.CopyFileExW<\/strong> API so that a copy of the original kernel32.dll file can be made in the current user\u2019s temporary folder.<\/p>\n<p>This operation is key to understanding the user-land monitoring evasion attempt that the malware authors planned. krnl32.dll is loaded into memory by calling <strong>kernel32.LoadLibraryW<\/strong>. Then the payload uses the <strong>krnl32.CreateProcessW<\/strong> API instead of calling kernel32.dll as one would have expected.<\/p>\n<p>The payload creates a suspended svchost.exe process as shown below:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/suspended_process.png\" data-rel=\"lightbox-5\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22222\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/hancitor-fileless-attack-with-a-copy-trick\/attachment\/suspended_process\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/suspended_process.png\" data-orig-size=\"1818,518\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"suspended_process\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/suspended_process-300x85.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/suspended_process-600x171.png\" class=\"size-full wp-image-22222 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/suspended_process.png\" alt=\"\" width=\"1818\" height=\"518\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/suspended_process.png 1818w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/suspended_process-300x85.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/suspended_process-600x171.png 600w\" sizes=\"auto, (max-width: 1818px) 100vw, 1818px\" \/><\/a><\/p>\n<p>Eventually, it calls the <strong>ntll.ZwUnmapViewOfSection <\/strong>API to unmap the view of a section from the suspended svchost.exe process\u2019 virtual address at <strong>0x400000<\/strong>. Then it calls <strong>WriteProcessMemory<\/strong> of the real kernel32.dll library to copy the content of the malware into the real svchost.exe process\u2019 memory.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/WPM1.png\" data-rel=\"lightbox-6\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22223\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/hancitor-fileless-attack-with-a-copy-trick\/attachment\/wpm1\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/WPM1.png\" data-orig-size=\"2004,1072\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"WPM1\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/WPM1-300x160.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/WPM1-600x321.png\" class=\"size-full wp-image-22223 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/WPM1.png\" alt=\"\" width=\"2004\" height=\"1072\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/WPM1.png 2004w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/WPM1-300x160.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/WPM1-600x321.png 600w\" sizes=\"auto, (max-width: 2004px) 100vw, 2004px\" \/><\/a><\/p>\n<p>Finally, it calls to the <strong>WriteProcessMemory<\/strong> API to overwrite other areas of the suspended svchost process and eventually resumes the process (process hollowing trick). At this point, the malware is running and the system has been fully compromised.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/resume_thread.png\" data-rel=\"lightbox-7\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22224\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/hancitor-fileless-attack-with-a-copy-trick\/attachment\/resume_thread-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/resume_thread.png\" data-orig-size=\"1280,194\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"resume_thread\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/resume_thread-300x45.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/resume_thread-600x91.png\" class=\"size-full wp-image-22224 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/resume_thread.png\" alt=\"\" width=\"1280\" height=\"194\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/resume_thread.png 1280w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/resume_thread-300x45.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/resume_thread-600x91.png 600w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/a><\/p>\n<h3>Mitigation<\/h3>\n<p><a href=\"http:\/\/www.malwarebytes.com\/pricing\" target=\"_blank\" rel=\"noopener\">Malwarebytes<\/a> protects users running the latest versions of the Windows operating system and Microsoft Office from this new technique via its signature-less anti-exploit engine.\u00a0We are working on releasing a patch to cover particular scenarios on older systems where only our web protection module would currently mitigate this attack.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/Hancintor_all_doc.png\" data-rel=\"lightbox-8\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"22275\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/hancitor-fileless-attack-with-a-copy-trick\/attachment\/hancintor_all_doc\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/Hancintor_all_doc.png\" data-orig-size=\"2996,1729\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Hancintor_all_doc\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/Hancintor_all_doc-300x173.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/Hancintor_all_doc-600x346.png\" class=\"size-full wp-image-22275 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/Hancintor_all_doc.png\" alt=\"\" width=\"2996\" height=\"1729\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/Hancintor_all_doc.png 2996w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/Hancintor_all_doc-300x173.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/03\/Hancintor_all_doc-600x346.png 600w\" sizes=\"auto, (max-width: 2996px) 100vw, 2996px\" \/><\/a><\/p>\n<h3><strong>Conclusion<\/strong><\/h3>\n<p>This is another fileless attack that uses a neat trick to create a new process from a copy of the legitimate kernel32.dll library. It does this to avoid user-land hooking technologies, followed by a process hollowing technique to run the malware code.<\/p>\n<p>It&#8217;s interesting to note that this technique still relies on user interaction to begin with, as most malspam attacks do these days. Once the attack has been initiated, the malware authors are in full control and can throw a variety of methods at the system to attempt to bypass its defenses.<\/p>\n<h3>Indicators of compromise<\/h3>\n<p>Hancitor payloads:<\/p>\n<pre>1D63CFE0C0B6C80212AAFEF737FC63F63415634C74AC3159966F63C31C1A08D4  60149ABF042392E352795C4BB2D731A75332E4BCEB0DAF83164BAA0DCFA0DCD3  DB020A0D727A43FA018AA530630A9B186222F85C9AF50D4B5720FC180551C277  <\/pre>\n<p>Domains and IPs:<\/p>\n<pre>batcommunications[.]com  cirewandbut[.]com  mypartnerforever[.]me  euforia-piekna[.]pl  tebabretof[.]com  dinglebetna[.]ru  etranutha[.]ru  babronwronot[.]ru  romfinothad[.]ru  herttannarit[.]com  sarattatit[.]ru  uldminyran[.]ru    95.213.200[.]176  93.189.40[.]107  192.254.185[.]27  185.204.219[.]210<\/pre>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/hancitor-fileless-attack-with-a-copy-trick\/\">Hancitor: fileless attack with a DLL copy trick<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/hancitor-fileless-attack-with-a-copy-trick\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Tue, 13 Mar 2018 16:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/hancitor-fileless-attack-with-a-copy-trick\/' title='Hancitor: fileless attack with a DLL copy trick'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2015\/11\/photodune-6673197-spam-email-m-965x395.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Evading detection when distributing payloads is a key part of an effective malware campaign. Hancitor shows that it has yet another trick up its sleeve for that.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/malware-threat-analysis\/\" rel=\"category tag\">Malware<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/fileless\/\" rel=\"tag\">fileless<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hancitor\/\" rel=\"tag\">Hancitor<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/macro\/\" rel=\"tag\">macro<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware\/\" rel=\"tag\">malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/payloads\/\" rel=\"tag\">payloads<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/hancitor-fileless-attack-with-a-copy-trick\/' title='Hancitor: fileless attack with a DLL copy trick'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/hancitor-fileless-attack-with-a-copy-trick\/\">Hancitor: fileless attack with a DLL copy trick<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[12843,17772,10515,3764,17773,10494],"class_list":["post-11724","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-fileless","tag-hancitor","tag-macro","tag-malware","tag-payloads","tag-threat-analysis"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11724","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11724"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11724\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11724"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11724"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11724"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}