Analysis
-
max time kernel
93s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05-04-2024 15:25
Static task
static1
Behavioral task
behavioral1
Sample
launcher.bat
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
launcher.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
setordinal.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
setordinal.dll
Resource
win10v2004-20240319-en
General
-
Target
launcher.bat
-
Size
63B
-
MD5
b066c4ebb5f39accd5a6eb80ccee2f25
-
SHA1
5ff88f73cad56d8661d6f4a47beb5a16da6b4427
-
SHA256
f3ed0a55060a4f97226595d97930985fa34f013b559687914b2ad951a722d7ff
-
SHA512
9a0324717582363e8525d40cae44554baed37feb34022e19b68a2538f29c13c1dd8b206b52f70ce649d847029dd78a9c0192c54cf2c48b3e45efcb57cf69249d
Malware Config
Extracted
latrodectus
https://plwskoret.top/live/
https://miistoria.com/live/
Signatures
-
Latrodectus loader
Latrodectus is a loader written in C++.
-
Detect larodectus Loader variant 1 4 IoCs
resource yara_rule behavioral2/memory/2312-0-0x000001BC4AD90000-0x000001BC4ADA3000-memory.dmp family_latrodectus_v1 behavioral2/memory/3952-6-0x000001D97E2D0000-0x000001D97E2E3000-memory.dmp family_latrodectus_v1 behavioral2/memory/2312-5-0x000001BC4AD90000-0x000001BC4ADA3000-memory.dmp family_latrodectus_v1 behavioral2/memory/3952-7-0x000001D97E2D0000-0x000001D97E2E3000-memory.dmp family_latrodectus_v1 -
Loads dropped DLL 1 IoCs
pid Process 3952 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2312 rundll32.exe 2312 rundll32.exe 2312 rundll32.exe 2312 rundll32.exe 3952 rundll32.exe 3952 rundll32.exe 3952 rundll32.exe 3952 rundll32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4524 wrote to memory of 2312 4524 cmd.exe 87 PID 4524 wrote to memory of 2312 4524 cmd.exe 87 PID 2312 wrote to memory of 3952 2312 rundll32.exe 88 PID 2312 wrote to memory of 3952 2312 rundll32.exe 88 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\launcher.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\system32\rundll32.exerundll32.exe setordinal.dll,bhuf2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\Custom_update\Update_9729806f.dll", bhuf3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3952
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD550a91559fab7869d51c0a7727c47a783
SHA1a232ec9f822c82d72f5c2b6e0e240680d18ef6ff
SHA256378d220bc863a527c2bca204daba36f10358e058df49ef088f8b1045604d9d05
SHA512878cd8c05a28117be8036cc0631fffc1b3407dd76cacb0d48e44e6f925b08237148f69e136d8fbb6d760bc6b29f537156e0ca10e23f405cd9dcc53bdca88eeb3