Analysis

  • max time kernel
    136s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-07-2024 14:21

General

  • Target

    140000000.exe

  • Size

    80KB

  • MD5

    0d1c013939f390023fb0a98f006171a4

  • SHA1

    30553889a1e4d8d180afa5adacfde37b5d78488a

  • SHA256

    b8ff05612476e6f6ce429419adfc38fe71da319bafb3ba39bd72ccde95ab2dab

  • SHA512

    184884f77c8a6e94a4c106f745977f8810f2a9d286cfb1010f6a015956ee8c1be37c66d9fbea8570533d691c7d3d9214440d5169aa6d973a4c345233d8917e46

  • SSDEEP

    768:k3KIOWOiLVYVHSXgspu/aMxuyr3HT+WVXjS6c54GzzNUTf8egoKU:k9OiJYVQ/9k3H9Xyuszwf8egoKU

Score
10/10

Malware Config

Extracted

Family

latrodectus

C2

https://spikeliftall.com/live/

https://godfaetret.com/live/

Signatures

  • Latrodectus loader

    Latrodectus is a loader written in C++.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\140000000.exe
    "C:\Users\Admin\AppData\Local\Temp\140000000.exe"
    1⤵
    • Deletes itself
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Users\Admin\AppData\Roaming\falsify_steward\confrontation_393820d1.exe
      "C:\Users\Admin\AppData\Roaming\falsify_steward\confrontation_393820d1.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:4852
  • C:\Users\Admin\AppData\Roaming\falsify_steward\confrontation_393820d1.exe
    C:\Users\Admin\AppData\Roaming\falsify_steward\confrontation_393820d1.exe
    1⤵
    • Executes dropped EXE
    • Suspicious behavior: EnumeratesProcesses
    PID:1032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\falsify_steward\confrontation_393820d1.exe

    Filesize

    80KB

    MD5

    0d1c013939f390023fb0a98f006171a4

    SHA1

    30553889a1e4d8d180afa5adacfde37b5d78488a

    SHA256

    b8ff05612476e6f6ce429419adfc38fe71da319bafb3ba39bd72ccde95ab2dab

    SHA512

    184884f77c8a6e94a4c106f745977f8810f2a9d286cfb1010f6a015956ee8c1be37c66d9fbea8570533d691c7d3d9214440d5169aa6d973a4c345233d8917e46

  • memory/2104-3-0x00007FF768EC0000-0x00007FF768ED4000-memory.dmp

    Filesize

    80KB