Analysis
-
max time kernel
478s -
max time network
433s -
platform
windows11-21h2_x64 -
resource
win11-20240730-en -
resource tags
arch:x64arch:x86image:win11-20240730-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-08-2024 15:09
Behavioral task
behavioral1
Sample
140000000.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral2
Sample
140000000.exe
Resource
win11-20240730-en
General
-
Target
140000000.exe
-
Size
80KB
-
MD5
ccb39b9783cf86f042a7a0695da16471
-
SHA1
3a63736753ed562387a4d8e6a78dd1c28fbcfff3
-
SHA256
4401f0b73c59c23e52b34e871c38b0c24d4fffd4ad064f796db3ecfebbb5584d
-
SHA512
3c43cf4aa67a103d5f171c55776b5a57cd84b956fc257610155d93560609a9d8a6019090e74b0c0520d9de11853dd7cecbd1f816fcce7d2235b4532282245ee1
-
SSDEEP
1536:k9OiJYVQ/9k3H9Xyuszwf8egKKUnaC6P:kLk3HBmwkegKKUnaNP
Malware Config
Extracted
latrodectus
https://spikeliftall.com/live/
https://godfaetret.com/live/
Signatures
-
Latrodectus loader
Latrodectus is a loader written in C++.
-
Deletes itself 1 IoCs
pid Process 764 140000000.exe -
Executes dropped EXE 2 IoCs
pid Process 4444 confrontation_e32f2f0.exe 2960 confrontation_e32f2f0.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 764 140000000.exe 764 140000000.exe 764 140000000.exe 764 140000000.exe 4444 confrontation_e32f2f0.exe 4444 confrontation_e32f2f0.exe 4444 confrontation_e32f2f0.exe 4444 confrontation_e32f2f0.exe 2960 confrontation_e32f2f0.exe 2960 confrontation_e32f2f0.exe 2960 confrontation_e32f2f0.exe 2960 confrontation_e32f2f0.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 764 140000000.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 764 wrote to memory of 4444 764 140000000.exe 80 PID 764 wrote to memory of 4444 764 140000000.exe 80 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\140000000.exe"C:\Users\Admin\AppData\Local\Temp\140000000.exe"1⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Roaming\falsify_steward\confrontation_e32f2f0.exe"C:\Users\Admin\AppData\Roaming\falsify_steward\confrontation_e32f2f0.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4444
-
-
C:\Users\Admin\AppData\Roaming\falsify_steward\confrontation_e32f2f0.exeC:\Users\Admin\AppData\Roaming\falsify_steward\confrontation_e32f2f0.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5ccb39b9783cf86f042a7a0695da16471
SHA13a63736753ed562387a4d8e6a78dd1c28fbcfff3
SHA2564401f0b73c59c23e52b34e871c38b0c24d4fffd4ad064f796db3ecfebbb5584d
SHA5123c43cf4aa67a103d5f171c55776b5a57cd84b956fc257610155d93560609a9d8a6019090e74b0c0520d9de11853dd7cecbd1f816fcce7d2235b4532282245ee1