Resubmissions

15-07-2024 19:38

240715-ycsreawclm 10

25-01-2024 13:41

240125-qy6ldshegm 7

08-10-2023 17:09

231008-vn4fhaef3x 7

Analysis

  • max time kernel
    130s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-07-2024 19:38

General

  • Target

    6ae543b0a3380779b65bff8c3ca0267f741173aed0d35265d6c92c0298fb924c.exe

  • Size

    244KB

  • MD5

    f93f91aca8e20bb97f94c05e5dd839e7

  • SHA1

    c11d361560b3a397e98334b4bed7d787b46f3e2e

  • SHA256

    6ae543b0a3380779b65bff8c3ca0267f741173aed0d35265d6c92c0298fb924c

  • SHA512

    fdfe968a6df01a5a25e112159a131c105dbf87424c7f621b013ffe0e03ea27ad233e5cc6464dd19bcf6be1cf3b9657400b4f2fdd65a2067d7de493ec0bee7791

  • SSDEEP

    3072:SQ6ZYZTzp+cavEcNQe9GQM/HhdFlQuq0/1fvZDqf6tHFzSfV91puBYYJCslb:n6s8ca7DGQM/HHFlQuTYZpylb

Score
10/10

Malware Config

Extracted

Family

latrodectus

C2

https://aplihartom.com/live/

https://fasestarkalim.com/live/

Signatures

  • Latrodectus loader

    Latrodectus is a loader written in C++.

  • Detect larodectus Loader variant 1 5 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ae543b0a3380779b65bff8c3ca0267f741173aed0d35265d6c92c0298fb924c.exe
    "C:\Users\Admin\AppData\Local\Temp\6ae543b0a3380779b65bff8c3ca0267f741173aed0d35265d6c92c0298fb924c.exe"
    1⤵
    • Deletes itself
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:5040
    • C:\Users\Admin\AppData\Roaming\Custom_update\Update_ec356b9e.exe
      \??\C:\Users\Admin\AppData\Roaming\Custom_update\Update_ec356b9e.exe
      2⤵
      • Executes dropped EXE
      PID:3660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Custom_update\Update_ec356b9e.exe

    Filesize

    244KB

    MD5

    f93f91aca8e20bb97f94c05e5dd839e7

    SHA1

    c11d361560b3a397e98334b4bed7d787b46f3e2e

    SHA256

    6ae543b0a3380779b65bff8c3ca0267f741173aed0d35265d6c92c0298fb924c

    SHA512

    fdfe968a6df01a5a25e112159a131c105dbf87424c7f621b013ffe0e03ea27ad233e5cc6464dd19bcf6be1cf3b9657400b4f2fdd65a2067d7de493ec0bee7791

  • memory/3660-7-0x000001739D5C0000-0x000001739D5D2000-memory.dmp

    Filesize

    72KB

  • memory/3660-9-0x000001739D5C0000-0x000001739D5D2000-memory.dmp

    Filesize

    72KB

  • memory/3660-10-0x000001739D5C0000-0x000001739D5D2000-memory.dmp

    Filesize

    72KB

  • memory/5040-1-0x00000248264D0000-0x00000248264E2000-memory.dmp

    Filesize

    72KB

  • memory/5040-0-0x00000248264A0000-0x00000248264C5000-memory.dmp

    Filesize

    148KB

  • memory/5040-6-0x00000248264D0000-0x00000248264E2000-memory.dmp

    Filesize

    72KB

  • memory/5040-5-0x00007FF676B90000-0x00007FF676BD4000-memory.dmp

    Filesize

    272KB