Resubmissions

15-07-2024 19:38

240715-ycsreawclm 10

25-01-2024 13:41

240125-qy6ldshegm 7

08-10-2023 17:09

231008-vn4fhaef3x 7

Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    15-07-2024 19:38

General

  • Target

    6ae543b0a3380779b65bff8c3ca0267f741173aed0d35265d6c92c0298fb924c.exe

  • Size

    244KB

  • MD5

    f93f91aca8e20bb97f94c05e5dd839e7

  • SHA1

    c11d361560b3a397e98334b4bed7d787b46f3e2e

  • SHA256

    6ae543b0a3380779b65bff8c3ca0267f741173aed0d35265d6c92c0298fb924c

  • SHA512

    fdfe968a6df01a5a25e112159a131c105dbf87424c7f621b013ffe0e03ea27ad233e5cc6464dd19bcf6be1cf3b9657400b4f2fdd65a2067d7de493ec0bee7791

  • SSDEEP

    3072:SQ6ZYZTzp+cavEcNQe9GQM/HhdFlQuq0/1fvZDqf6tHFzSfV91puBYYJCslb:n6s8ca7DGQM/HHFlQuTYZpylb

Score
10/10

Malware Config

Extracted

Family

latrodectus

C2

https://aplihartom.com/live/

https://fasestarkalim.com/live/

Signatures

  • Latrodectus loader

    Latrodectus is a loader written in C++.

  • Detect larodectus Loader variant 1 4 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ae543b0a3380779b65bff8c3ca0267f741173aed0d35265d6c92c0298fb924c.exe
    "C:\Users\Admin\AppData\Local\Temp\6ae543b0a3380779b65bff8c3ca0267f741173aed0d35265d6c92c0298fb924c.exe"
    1⤵
    • Deletes itself
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Users\Admin\AppData\Roaming\Custom_update\Update_df8fb55d.exe
      \??\C:\Users\Admin\AppData\Roaming\Custom_update\Update_df8fb55d.exe
      2⤵
      • Executes dropped EXE
      PID:2200

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\Custom_update\Update_df8fb55d.exe

    Filesize

    244KB

    MD5

    f93f91aca8e20bb97f94c05e5dd839e7

    SHA1

    c11d361560b3a397e98334b4bed7d787b46f3e2e

    SHA256

    6ae543b0a3380779b65bff8c3ca0267f741173aed0d35265d6c92c0298fb924c

    SHA512

    fdfe968a6df01a5a25e112159a131c105dbf87424c7f621b013ffe0e03ea27ad233e5cc6464dd19bcf6be1cf3b9657400b4f2fdd65a2067d7de493ec0bee7791

  • memory/2200-8-0x0000000000050000-0x0000000000062000-memory.dmp

    Filesize

    72KB

  • memory/2200-10-0x0000000000050000-0x0000000000062000-memory.dmp

    Filesize

    72KB

  • memory/2924-0-0x00000000000C0000-0x00000000000E5000-memory.dmp

    Filesize

    148KB

  • memory/2924-1-0x00000000000F0000-0x0000000000102000-memory.dmp

    Filesize

    72KB

  • memory/2924-7-0x00000000000F0000-0x0000000000102000-memory.dmp

    Filesize

    72KB

  • memory/2924-6-0x000000013FD90000-0x000000013FDD4000-memory.dmp

    Filesize

    272KB