Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
submitted
12/03/2024, 09:50
Static task
static1
Behavioral task
behavioral1
Sample
3b63ea8b6f9b2aa847faa11f6cd3eb281abd9b9cceedb570713c4d78a47de567.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3b63ea8b6f9b2aa847faa11f6cd3eb281abd9b9cceedb570713c4d78a47de567.dll
Resource
win10v2004-20240226-en
General
-
Target
3b63ea8b6f9b2aa847faa11f6cd3eb281abd9b9cceedb570713c4d78a47de567.dll
Malware Config
Extracted
latrodectus
https://scifimond.com/live/
https://drifajizo.fun/live/
Signatures
-
Latrodectus family
-
Latrodectus loader
Latrodectus is a loader written in C++.
-
Detect larodectus Loader variant 2 5 IoCs
resource yara_rule behavioral2/memory/1660-0-0x000001941B240000-0x000001941B254000-memory.dmp family_latrodectus_v2 behavioral2/memory/4076-1-0x000002B066700000-0x000002B066714000-memory.dmp family_latrodectus_v2 behavioral2/memory/4076-5-0x000002B066700000-0x000002B066714000-memory.dmp family_latrodectus_v2 behavioral2/memory/4148-8-0x00000222D7C80000-0x00000222D7C94000-memory.dmp family_latrodectus_v2 behavioral2/memory/4148-7-0x00000222D7C80000-0x00000222D7C94000-memory.dmp family_latrodectus_v2 -
Deletes itself 1 IoCs
pid Process 4076 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 4148 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4076 rundll32.exe 4076 rundll32.exe 4076 rundll32.exe 4076 rundll32.exe 4148 rundll32.exe 4148 rundll32.exe 4148 rundll32.exe 4148 rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4076 rundll32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1372 wrote to memory of 4076 1372 cmd.exe 115 PID 1372 wrote to memory of 4076 1372 cmd.exe 115 PID 4076 wrote to memory of 4148 4076 rundll32.exe 116 PID 4076 wrote to memory of 4148 4076 rundll32.exe 116 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3b63ea8b6f9b2aa847faa11f6cd3eb281abd9b9cceedb570713c4d78a47de567.dll,#11⤵PID:1660
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2696
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\system32\rundll32.exerundll32 3b63ea8b6f9b2aa847faa11f6cd3eb281abd9b9cceedb570713c4d78a47de567.dll, vgml2⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\Custom_update\Update_33b0dade.dll", vgml3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4148
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
469KB
MD5e27c6586dba78d5d302589f3b231be40
SHA1305031a6d93a744cf61552ab673ddb27843ee845
SHA2563b63ea8b6f9b2aa847faa11f6cd3eb281abd9b9cceedb570713c4d78a47de567
SHA5121f0c126e38eed21ee51e04ebe4717fcbb3545d9ccdcc24ba0125f82c5f9b94d1406cbf3ba9f58958e4f180bdd6931bc3a3cb5390de990f8265baabfd414f89c2