Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-04-2024 20:47
Static task
static1
Behavioral task
behavioral1
Sample
UPDATE-HSYEYDBB.html.lnk
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
UPDATE-HSYEYDBB.html.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
version1.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
version1.dll
Resource
win10v2004-20231215-en
General
-
Target
UPDATE-HSYEYDBB.html.lnk
-
Size
1KB
-
MD5
564896c159f0d7c086d0d5bc966959d3
-
SHA1
b63dadc4d961995a77a9c183c809321e5564da60
-
SHA256
db03a34684feab7475862080f59d4d99b32c74d3a152a53b257fd1a443e8ee77
-
SHA512
fb9ca2821f15f9946770fb29dfcd3724a868af27b998cd0191135ef11e38b7d5a1c8214fb37e178b1ed68fe6d3ae828acf43d9f5243d753ba58f5361f6c8398f
Malware Config
Extracted
latrodectus
https://mazdakrichest.com/live/
https://riverhasus.com/live/
Signatures
-
Latrodectus loader
Latrodectus is a loader written in C++.
-
Detect larodectus Loader variant 1 3 IoCs
resource yara_rule behavioral2/memory/3472-1-0x000001B9908B0000-0x000001B9908C3000-memory.dmp family_latrodectus_v1 behavioral2/memory/3892-11-0x0000027E5F120000-0x0000027E5F133000-memory.dmp family_latrodectus_v1 behavioral2/memory/3892-16-0x0000027E5F120000-0x0000027E5F133000-memory.dmp family_latrodectus_v1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 3892 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3472 rundll32.exe 3472 rundll32.exe 3472 rundll32.exe 3472 rundll32.exe 3892 rundll32.exe 3892 rundll32.exe 3892 rundll32.exe 3892 rundll32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 3472 3048 cmd.exe 87 PID 3048 wrote to memory of 3472 3048 cmd.exe 87 PID 3472 wrote to memory of 3892 3472 rundll32.exe 90 PID 3472 wrote to memory of 3892 3472 rundll32.exe 90 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\UPDATE-HSYEYDBB.html.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" version1.dll, scab2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\Custom_update\Update_33b0dade.dll", scab3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3892
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5f834dfc1861cd6361f34496c3bbafe66
SHA1a983e82d009901310c8a3255c4b4e3a02d556fa7
SHA256e99f3517a36a9f7a55335699cfb4d84d08b042d47146119156f7f3bab580b4d7
SHA512088a6170c948ddb2c2b0cf2431ae61688201ef5bc3f1af217a58bf18b26dd9e0ab7ee082f822e736d0467f62e33bf71b806127eb998bed8e739c1e441ac05e00