[SANS ISC] Hancitor tries XLL as initial malware file, (Fri, Jul 9th)


On Thursday 2021-07-08, for a short while when Hancitor was initially active, if any victims clicked on a malicious link from the malspam, they would receive a XLL file instead of a malicious Word doc.  I tried one of the email links in my lab and received the malicious XLL file.  After other researchers reported they were receiving Word documents, I tried a few hours later and received a Word document instead.

Shown above:  Flow chart for my first Hancitor infection on 2021-07-08.

Since November 2020, Hancitor has consistently followed specific patterns of infection activity, and my previous diary from January 2021 is typical of what I’ve seen.  Only one change has happened recently.  Since June 8th 2021, malicious spam (malspam) pushing Hancitor switched from docs.google.com links in their messages to using feedproxy.google.com URLs, which was initially reported by @James_inthe_box, @mesa_matt, and @executemalware.

Shown above:  Flow chart for my second Hancitor infection on 2021-07-08 (what I normally see).

I’ve also seen these Google feedproxy URLs used for Hancitor infections, but I had not seen the XLL files until now.

What is an XLL file?

XLL files are Excel add-in files.  They’re DLL files specifically designed to be run by Microsoft Excel.  Think of an XLL file as an “Excel DLL.”

The emails

As usual, emails for this wave of Hancitor used a DocuSign theme, and they spoofed cabanga[.]com as the sending domain.  Just like in recent weeks, links went to a Google feedproxy URL.

Shown above:  Example of malspam pushing Hancitor from 2021-07-08.

The Google feedproxy URL leads to a malicious page on a compromised webite designed to send the initial malicious file and redirect the browser to DocuSign’s website.  I’ve described the process here and here.  This process makes it appear as if the file was offered by DocuSign, when it was actually sent through a malicious web page.

Shown above:  The website for DocuSign appears in a victim’s browser immediately after a malicious file is offered for download.

Remember, this malicious activity is not caused by DocuSign.  DocuSIgn is one of many companies that cybercriminals impersonate when distributing malware like Hancitor.  DocuSign is aware of this long-running effort by the criminals behind Hancitor, and the company has guidelines for dealing with this sort of malicious activity.

Running the XLL

When opening the XLL file, Excel asks if you want to enable the add-in as shown below.

Shown above:  Opening the malicious XLL file in Excel.

The default option was to leave the add-in disabled.  But when I opened the XLL file in my lab enviornment, I enabled all code for the add-in.  Excel immediately ran the add-in and closed.  I didn’t see any sort of fake template like we usually see when Hancitor uses a Word document as the initial file.

Infection traffic

During my first infection run with the XLL file, most of the traffic followed known patterns for Hancitor and Cobalt Strike, I saw two additional URLs as noted below.

Shown above: Traffic from my first Hancitor infection filtered in Wireshark, with the two unusual URLs noted.

Thes two URLs returned files that were saved to my Windows client in the C:UsersPublic directory.  The first URL returned an HTML file that was saved as res32.hta.  That .hta file retrieved an EXE for Hancitor which was saved as snd32sys.exe.

Shown above:  HTML (.hta) and EXE files saved the Windows host.

Hancitor showed a build number of 0707in2_wvcr in C2 traffic caused by the EXE.  During my second infection run with a Hancitor DLL, I saw a build number of 0707_wvcr,

Shown above:  C2 traffic from Hancitor EXE during my first infection.

Shown above:  C2 traffic from Hancitor DLL during my second infection.

Indicators of Compromise (IOCs)

This Github page contains 35 Google feedproxy URLs and 35 associated URLs used to send the initial malicious file.  Other indicators follow.

SHA256 hash: 73b8c566d8cdf3200daa0b698b9d32a49b1ea8284a1e6aa6408eb9c9daaacb71

File size: 24,488 bytes
File name: 0708_0112181856.xll
File description: Excel add-in (an “Excel DLL”)

SHA256 hash: da92436d2bbcdef52b11ace6e2e063e9971cefc074d194550bd425305c97cdd5

File size: 8,419 bytes
File location: hxxp://srand04rf[.]ru/92375234.xml
File location: C:UsersPublicres32.hta
File description: HTML file used to retrieve Hancitor EXE

SHA256 hash: 3db14214a9eb98b3b5abffcb314c808a25ed82456ce01251d31e8ea960f6e4e6

File size: 763,392 bytes
File location: hxxp://srand04rf[.]ru/08.jpg
File location: C:UsersPublicsnd32sys.exe
File description: Hancitor EXE

SHA256 hash: b4d402b4ab3b5a5568f35562955d5d05357a589ccda55fde5a2c166ef5f15699

File size: 898,048 bytes
File name: 0708_3355614568218.doc
File description: Word doc with macros for Hancitor

SHA256 hash: 4dc9d5ee1debdba0388fbb112d4bbbc01bb782f015e798cced3fc2edb17ac557

File size: 274,432 bytes
File location: C:Users[username]AppDataRoamingMicrosoftTemplateniberius.dll
File description: Hancitor DLL
Run method: rundll32.exe [filename],ONOQWPYIEIR

SHA256 hash: dee4bb7d46bbbec6c01dc41349cb8826b27be9a0dcf39816ca8bd6e0a39c2019

File size: 272,910 bytes
File location: hxxp://srand04rf[.]ru/7hfjsdfjks.exe
File description: EXE for Ficker Stealer malware
Note: This file was first submitted to VirusTotal on 2021-06-09.

Traffic related to Hancitor:

8.211.241[.]0 port 80 – srand04rf[.]ru – GET /92375234.xml
8.211.241[.]0 port 80 – srand04rf[.]ru – GET /08.jpg
port 80 – api.ipify.org – GET /  [not inherently malicious]
77.222.42[.]67 port 80 – sudepallon[.]com – POST /8/forum.php
194.147.78[.]155 port 80 – anspossthrly[.]ru – POST /8/forum.php
194.147.115[.]74 port 80 – thentabecon[.]ru – POST/8/forum.php

Traffic related to Ficker Stealer:

8.211.241[.]0 port 80 – srand04rf[.]ru – GET /7hfjsdfjks.exe
port 80 – api.ipify.org – GET /?format=xml  [not inherently malicious]
95.213.179[.]67 port 80 – pospvisis[.]com – TCP traffic

Traffic related to Cobalt Strike:

8.211.241[.]0 port 80 – srand04rf[.]ru – GET /0707s.bin
8.211.241[.]0 port 80 – srand04rf[.]ru – GET /0707.bin
191.101.17[.]21 port 443 – HTTPS traffic
191.101.17[.]21 port 80 – 191.101.17[.]21 – GET /5lyB
191.101.17[.]21 port 80 – 191.101.17[.]21 – GET /IE9CompatViewList.xml
191.101.17[.]21 port 80 – 191.101.17[.]21 – POST /submit.php?id=[9-digit number]

Final words

A pcap of the infection traffic from my first infection run (with the XLL file) can be found here.

Brad Duncan
brad [at] malware-traffic-analysis.net

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

Source: Read More (SANS Internet Storm Center, InfoCON: green)

You might be interested in …

[SecurityWeek] US Drops Trump Order Targeting TikTok, Plans Its Own Review

All posts, Security Week

The White House dropped Trump-era executive orders intended to ban the popular apps TikTok and WeChat and will conduct its own review aimed at identifying national security risks with software applications tied to China, officials said Wednesday. read more Source: Read More (SecurityWeek RSS Feed)

Read More

[ThreatPost] Europol Breaks Open Extensive Mafia Cybercrime Ring

All posts, ThreatPost

Organized crime ring thrived on violence, intimidation and $12 million in online fraud profits. Source: Read More (Threatpost)

Read More

[TheRecord] Microsoft adds novel feature to Exchange servers to allow it to deploy emergency temporary fixes

Microsoft will roll out tomorrow a new security feature for its Exchange email servers, which have been at the center of several hacking campaigns over the past two years. Called the Microsoft Exchange Emergency Mitigation (EM) service, the new feature works by automatically installing temporary mitigations that block active exploitation of security flaws until Microsoft is […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.