Analysis
-
max time kernel
598s -
max time network
608s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-uk -
resource tags
arch:x64arch:x86image:win10v2004-20240226-uklocale:uk-uaos:windows10-2004-x64systemwindows -
submitted
08-04-2024 21:40
Static task
static1
Behavioral task
behavioral1
Sample
UPDATE-HSYEYDBB.html.lnk
Resource
win10v2004-20240226-uk
Behavioral task
behavioral2
Sample
version1.dll
Resource
win10v2004-20240226-uk
General
-
Target
UPDATE-HSYEYDBB.html.lnk
-
Size
1KB
-
MD5
564896c159f0d7c086d0d5bc966959d3
-
SHA1
b63dadc4d961995a77a9c183c809321e5564da60
-
SHA256
db03a34684feab7475862080f59d4d99b32c74d3a152a53b257fd1a443e8ee77
-
SHA512
fb9ca2821f15f9946770fb29dfcd3724a868af27b998cd0191135ef11e38b7d5a1c8214fb37e178b1ed68fe6d3ae828acf43d9f5243d753ba58f5361f6c8398f
Malware Config
Extracted
latrodectus
https://mazdakrichest.com/live/
https://riverhasus.com/live/
Signatures
-
Latrodectus loader
Latrodectus is a loader written in C++.
-
Detect larodectus Loader variant 1 3 IoCs
resource yara_rule behavioral1/memory/3612-1-0x0000021B9D760000-0x0000021B9D773000-memory.dmp family_latrodectus_v1 behavioral1/memory/1840-11-0x00000253B28D0000-0x00000253B28E3000-memory.dmp family_latrodectus_v1 behavioral1/memory/1840-16-0x00000253B28D0000-0x00000253B28E3000-memory.dmp family_latrodectus_v1 -
Blocklisted process makes network request 64 IoCs
flow pid Process 50 1840 rundll32.exe 52 1840 rundll32.exe 53 1840 rundll32.exe 54 1840 rundll32.exe 55 1840 rundll32.exe 56 1840 rundll32.exe 57 1840 rundll32.exe 58 1840 rundll32.exe 59 1840 rundll32.exe 60 1840 rundll32.exe 61 1840 rundll32.exe 62 1840 rundll32.exe 63 1840 rundll32.exe 64 1840 rundll32.exe 65 1840 rundll32.exe 66 1840 rundll32.exe 67 1840 rundll32.exe 68 1840 rundll32.exe 69 1840 rundll32.exe 70 1840 rundll32.exe 71 1840 rundll32.exe 72 1840 rundll32.exe 73 1840 rundll32.exe 74 1840 rundll32.exe 75 1840 rundll32.exe 76 1840 rundll32.exe 77 1840 rundll32.exe 78 1840 rundll32.exe 79 1840 rundll32.exe 80 1840 rundll32.exe 81 1840 rundll32.exe 82 1840 rundll32.exe 83 1840 rundll32.exe 84 1840 rundll32.exe 85 1840 rundll32.exe 86 1840 rundll32.exe 87 1840 rundll32.exe 88 1840 rundll32.exe 89 1840 rundll32.exe 90 1840 rundll32.exe 91 1840 rundll32.exe 92 1840 rundll32.exe 93 1840 rundll32.exe 94 1840 rundll32.exe 95 1840 rundll32.exe 96 1840 rundll32.exe 97 1840 rundll32.exe 98 1840 rundll32.exe 99 1840 rundll32.exe 100 1840 rundll32.exe 101 1840 rundll32.exe 102 1840 rundll32.exe 103 1840 rundll32.exe 104 1840 rundll32.exe 105 1840 rundll32.exe 106 1840 rundll32.exe 107 1840 rundll32.exe 108 1840 rundll32.exe 109 1840 rundll32.exe 110 1840 rundll32.exe 111 1840 rundll32.exe 112 1840 rundll32.exe 113 1840 rundll32.exe 114 1840 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1840 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3612 rundll32.exe 3612 rundll32.exe 3612 rundll32.exe 3612 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe 1840 rundll32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1772 wrote to memory of 3612 1772 cmd.exe 85 PID 1772 wrote to memory of 3612 1772 cmd.exe 85 PID 3612 wrote to memory of 1840 3612 rundll32.exe 89 PID 3612 wrote to memory of 1840 3612 rundll32.exe 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\UPDATE-HSYEYDBB.html.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" version1.dll, scab2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\Custom_update\Update_660c9e20.dll", scab3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1840
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5f834dfc1861cd6361f34496c3bbafe66
SHA1a983e82d009901310c8a3255c4b4e3a02d556fa7
SHA256e99f3517a36a9f7a55335699cfb4d84d08b042d47146119156f7f3bab580b4d7
SHA512088a6170c948ddb2c2b0cf2431ae61688201ef5bc3f1af217a58bf18b26dd9e0ab7ee082f822e736d0467f62e33bf71b806127eb998bed8e739c1e441ac05e00