Analysis
-
max time kernel
91s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
submitted
13-02-2024 16:39
Static task
static1
Behavioral task
behavioral1
Sample
launcher.bat
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
launcher.bat
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
setordinal.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
setordinal.dll
Resource
win10v2004-20231215-en
General
-
Target
launcher.bat
Malware Config
Extracted
latrodectus
https://plwskoret.top/live/
https://miistoria.com/live/
Signatures
-
Latrodectus family
-
Latrodectus loader
Latrodectus is a loader written in C++.
-
Detect larodectus Loader variant 1 4 IoCs
resource yara_rule behavioral2/memory/212-0-0x000001A11C800000-0x000001A11C813000-memory.dmp family_latrodectus_v1 behavioral2/memory/212-6-0x000001A11C800000-0x000001A11C813000-memory.dmp family_latrodectus_v1 behavioral2/memory/4236-5-0x000001D7D2E20000-0x000001D7D2E33000-memory.dmp family_latrodectus_v1 behavioral2/memory/4236-7-0x000001D7D2E20000-0x000001D7D2E33000-memory.dmp family_latrodectus_v1 -
Loads dropped DLL 1 IoCs
pid Process 4236 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 4236 rundll32.exe 4236 rundll32.exe 4236 rundll32.exe 4236 rundll32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 836 wrote to memory of 212 836 cmd.exe 86 PID 836 wrote to memory of 212 836 cmd.exe 86 PID 212 wrote to memory of 4236 212 rundll32.exe 87 PID 212 wrote to memory of 4236 212 rundll32.exe 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\launcher.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\system32\rundll32.exerundll32.exe setordinal.dll,bhuf2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\Custom_update\Update_b8487055.dll", bhuf3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4236
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD550a91559fab7869d51c0a7727c47a783
SHA1a232ec9f822c82d72f5c2b6e0e240680d18ef6ff
SHA256378d220bc863a527c2bca204daba36f10358e058df49ef088f8b1045604d9d05
SHA512878cd8c05a28117be8036cc0631fffc1b3407dd76cacb0d48e44e6f925b08237148f69e136d8fbb6d760bc6b29f537156e0ca10e23f405cd9dcc53bdca88eeb3