Thursday, April 30, 2026
HomeCyber SecurityHANCITOR DOC drops through CLIPBOARD

HANCITOR DOC drops through CLIPBOARD

[ad_1]

By Sriram P & Lakshya Mathur 

Hancitor, a loader that gives Malware as a Service, has been noticed distributing malware akin to FickerStealer, Pony, CobaltStrike, Cuba Ransomware, and lots of extra. Just lately at McAfee Labs, we noticed Hancitor Doc VBA (Visible Primary for Purposes) samples dropping the payload utilizing the Home windows clipboard by way of Choice.Copy technique. 

This weblog focuses on the effectiveness of this newly noticed approach and the way it provides an additional layer of obfuscation to evade detection. 

Under (Determine 1) is the Geolocation based mostly stats of Hancitor Malicious Doc noticed by McAfee since September 2021 

Figure 1 – Geo stats of Hancitor MalDoc
Determine 1 – Geo stats of Hancitor MalDoc

INFECTION CHAIN

  1. The sufferer will obtain a Docusign-based phishing electronic mail.
  2. On clicking on the hyperlink (hxxp://mettlybothe.com/8/discussion board[.]php), a Phrase Doc file is downloaded.
  3. On Enabling the macro content material in Microsoft Phrase, the macro drops an embedded OLE, a password-protected macro-infected doc file and launches it.
  4. This second Doc file drops the principle Hancitor DLL (Dynamic Hyperlink Library) payload.
  5. The DLL payload is then executed through rundll32.exe.
Figure 2 – Infection Chain
Determine 2 – An infection Chain

TECHNICAL ANALYSIS

Malware authors ship the victims a phishing electronic mail containing a hyperlink as proven within the under screenshot (Determine 3). The standard Docusign theme is used on this latest Hancitor wave. This phishing electronic mail comprises a hyperlink to the unique malicious phrase doc. On clicking the hyperlink, the Malicious Doc file is downloaded.

Figure 3 – Phishing mail pretending to be DocuSign
Determine 3 – Phishing mail pretending to be DocuSign

For the reason that macros are disabled by default configuration, malware authors attempt to lure victims into believing that the file is from official organizations or people and can ask victims to allow enhancing and content material to start out the execution of macros. The screenshot under (Determine 4) is the lure approach that was noticed on this present wave.

Figure 4 – Document Face
Determine 4 – Doc Face

As quickly because the sufferer permits enhancing, malicious macros are executed through the Document_Open operate.

There may be an OLE object embedded within the Doc file. The screenshot under (Determine 5) highlights the item as an icon.

Figure 5 – OLE embedded object marked inside red circle
Determine 5 – OLE embedded object marked contained in the crimson circle

The loader VBA operate, invoked by document_open, calls this random operate (Determine 6), which strikes the choice cursor to the precise location of the OLE object utilizing the choice strategies (.MoveDown, .MoveRight, .MoveTypeBackspace). Utilizing the Choice.Copy technique, it can copy the chosen OLE object to the clipboard. As soon as it’s copied within the clipboard it will likely be dropped below %temp% folder.

Figure 6 – VBA Function to Copy content to Clipboard
Determine 6 – VBA Operate to Copy content material to Clipboard

When an embedded object is being copied to the clipboard, it will get written to the temp listing as a file. This technique is utilized by the malware writer to drop a malicious phrase doc as a substitute of explicitly writing the file to disk utilizing macro features just like the traditional FileSystemObject.

On this case, the file was saved to the %temp% location with filename title “zoro.kl” as proven within the under screenshot (Fig 8). Fig 7 exhibits the corresponding procmon log involving the file write occasion.

Figure 7 – ProcMon log for the creation and WriteFile of “zoro.kl” in %temp% folder
Determine 7 – ProcMon log for the creation and WriteFile of “zoro.kl” in %temp% folder
Figure 8 – “zoro.kl” in %temp% location
Determine 8 – “zoro.kl” in %temp% location

Utilizing the CreateObject(“Scripting.FileSystemObject”) technique, the malware strikes the file to a brand new location AppdataRoamingMicrosoftTemplates and renames it to “zoro.doc”.

Figure 9– VBA Function to rename and move the dropped Doc file
Determine 9– VBA Operate to rename and transfer the dropped Doc file

This file is then opened with the built-in doc technique, Paperwork.open. This moved file, zoro.doc, is password-protected. On this case, the password used was “doyouknowthatthegodsofdeathonlyeatapples?”. We now have additionally seen the utilization of passwords likedonttouchme”, and so on.

Figure 10 – VBA Function to password protect the Doc file
Determine 10 – VBA Operate to password defend the Doc file

This newly dropped doc is executed utilizing the Paperwork.Open operate (Determine 11).

Figure 11 – VBA methods present inside “zoro.doc”
Determine 11 – VBA strategies current inside “zoro.doc”

Zoro.doc makes use of the identical methods to repeat and drop the subsequent payload as we noticed earlier. The one distinction is that it has a DLL because the embedded OLE object.

It drops the file within the %temp% folder utilizing clipboard with the title “gelforr.dap”. Once more, it strikes gelforr.dap DLL file to AppdataRoamingMicrosoftTemplates (Determine 12).

Figure 12 - Files dropped under the AppdataRoamingMicrosoftTemplate folder
Determine 12 – Recordsdata dropped below the AppdataRoamingMicrosoftTemplate folder

Lastly, after shifting DLL to the templates folder, it’s executed utilizing Rundll32.exe by one other VBA name.

MITRE ATT&CK

Approach ID Tactic Approach particulars
T1566.002 Preliminary Entry Spam mail with hyperlinks
T1204.001 Execution Person Execution by opening the hyperlink.
T1204.002 Execution Executing downloaded doc
T1218 Protection Evasion Signed Binary Execution Rundll32
T1071 C&C (Command & Management) HTTP (Hypertext Switch Protocol) protocol for communication

 

IOC (Indicators Of Compromise)

Kind SHA-256 Scanner Detection Title
Most important Doc 915ea807cdf10ea4a4912377d7c688a527d0e91c7777d811b171d2960b75c65c WSS W97M/Dropper.im
Dropped Doc c1c89e5eef403532b5330710c9fe1348ebd055d0fe4e3ebbe9821555e36d408e WSS W97M/Dropper.im

 

Dropped DLL d83fbc9534957dd464cbc7cd2797d3041bd0d1a72b213b1ab7bccaec34359dbb WSS RDN/Hancitor
URLs (Uniform Useful resource Locator) hxxp://mettlybothe.com/8/discussion board[.]php WebAdvisor Blocked

 



[ad_2]

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments