Resubmissions

05/04/2024, 15:15

240405-snc77sfh55 10

12/03/2024, 09:50

240312-lveahsfh28 7

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • submitted
    12/03/2024, 09:50

General

  • Target

    3b63ea8b6f9b2aa847faa11f6cd3eb281abd9b9cceedb570713c4d78a47de567.dll

Score
10/10

Malware Config

Extracted

Family

latrodectus

C2

https://scifimond.com/live/

https://drifajizo.fun/live/

Signatures

  • Latrodectus family
  • Latrodectus loader

    Latrodectus is a loader written in C++.

  • Detect larodectus Loader variant 2 5 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\3b63ea8b6f9b2aa847faa11f6cd3eb281abd9b9cceedb570713c4d78a47de567.dll,#1
    1⤵
      PID:1660
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:2696
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe"
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:1372
        • C:\Windows\system32\rundll32.exe
          rundll32 3b63ea8b6f9b2aa847faa11f6cd3eb281abd9b9cceedb570713c4d78a47de567.dll, vgml
          2⤵
          • Deletes itself
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: RenamesItself
          • Suspicious use of WriteProcessMemory
          PID:4076
          • C:\Windows\system32\rundll32.exe
            rundll32.exe "C:\Users\Admin\AppData\Roaming\Custom_update\Update_33b0dade.dll", vgml
            3⤵
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            PID:4148

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Custom_update\Update_33b0dade.dll

        Filesize

        469KB

        MD5

        e27c6586dba78d5d302589f3b231be40

        SHA1

        305031a6d93a744cf61552ab673ddb27843ee845

        SHA256

        3b63ea8b6f9b2aa847faa11f6cd3eb281abd9b9cceedb570713c4d78a47de567

        SHA512

        1f0c126e38eed21ee51e04ebe4717fcbb3545d9ccdcc24ba0125f82c5f9b94d1406cbf3ba9f58958e4f180bdd6931bc3a3cb5390de990f8265baabfd414f89c2

      • memory/1660-0-0x000001941B240000-0x000001941B254000-memory.dmp

        Filesize

        80KB

      • memory/4076-1-0x000002B066700000-0x000002B066714000-memory.dmp

        Filesize

        80KB

      • memory/4076-3-0x0000000180000000-0x000000018007B000-memory.dmp

        Filesize

        492KB

      • memory/4076-5-0x000002B066700000-0x000002B066714000-memory.dmp

        Filesize

        80KB

      • memory/4148-8-0x00000222D7C80000-0x00000222D7C94000-memory.dmp

        Filesize

        80KB

      • memory/4148-7-0x00000222D7C80000-0x00000222D7C94000-memory.dmp

        Filesize

        80KB