Analysis
-
max time kernel
145s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2024 10:33
Behavioral task
behavioral1
Sample
9fad77b6c9968ccf160a20fee17c3ea0d944e91eda9a3ea937027618e2f9e54e.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9fad77b6c9968ccf160a20fee17c3ea0d944e91eda9a3ea937027618e2f9e54e.dll
Resource
win10v2004-20240226-en
General
-
Target
9fad77b6c9968ccf160a20fee17c3ea0d944e91eda9a3ea937027618e2f9e54e.dll
-
Size
76KB
-
MD5
80a0b619884a185d0abdffda3918cb33
-
SHA1
b2edde7d7cd7b01d9cec7644e45ec3246afda077
-
SHA256
9fad77b6c9968ccf160a20fee17c3ea0d944e91eda9a3ea937027618e2f9e54e
-
SHA512
9f6e546060cab0de8450027f1a8d471d483f1e60bd13b3ed4224210abdbcce9e2d0c628617abca9eb0e5bf6a1a6b5682a47b419a0858bf4dcfb90ca45b92341d
-
SSDEEP
768:8xO+qDlWGT9NVu48up+g5KFNhhlJwb9LfpwThs1GSy:8k+qD4Ud/5KFhrmVfOhs1GSy
Malware Config
Extracted
latrodectus
https://mazdakrichest.com/live/
https://riverhasus.com/live/
Signatures
-
Latrodectus loader
Latrodectus is a loader written in C++.
-
Detect larodectus Loader variant 1 2 IoCs
resource yara_rule behavioral2/memory/1680-1-0x00007FFCDC810000-0x00007FFCDC823000-memory.dmp family_latrodectus_v1 behavioral2/files/0x00080000000231e6-2.dat family_latrodectus_v1 -
Deletes itself 1 IoCs
pid Process 1680 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 1132 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1680 rundll32.exe 1680 rundll32.exe 1680 rundll32.exe 1680 rundll32.exe 1132 rundll32.exe 1132 rundll32.exe 1132 rundll32.exe 1132 rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1680 rundll32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1680 wrote to memory of 1132 1680 rundll32.exe 86 PID 1680 wrote to memory of 1132 1680 rundll32.exe 86 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9fad77b6c9968ccf160a20fee17c3ea0d944e91eda9a3ea937027618e2f9e54e.dll,#11⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\Custom_update\Update_660c9e20.dll", #12⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD580a0b619884a185d0abdffda3918cb33
SHA1b2edde7d7cd7b01d9cec7644e45ec3246afda077
SHA2569fad77b6c9968ccf160a20fee17c3ea0d944e91eda9a3ea937027618e2f9e54e
SHA5129f6e546060cab0de8450027f1a8d471d483f1e60bd13b3ed4224210abdbcce9e2d0c628617abca9eb0e5bf6a1a6b5682a47b419a0858bf4dcfb90ca45b92341d