Analysis
-
max time kernel
1199s -
max time network
1200s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-08-2024 00:48
Static task
static1
Behavioral task
behavioral1
Sample
UPDATE-HSYEYDBB.html.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
UPDATE-HSYEYDBB.html.lnk
Resource
win11-20240802-en
General
-
Target
UPDATE-HSYEYDBB.html.lnk
-
Size
1KB
-
MD5
ae64124a57d7f5de780f85b7456d90a2
-
SHA1
ab9a153c0da841ed0cbdd70664a48ba0959eb8a9
-
SHA256
119f0a88b3366805f6a592742b7ced190010eb98c81f32e251bd42d968b68471
-
SHA512
0e9ad80748d97e55708bf4939bbe0179d558d643679065c101fa52f861e4d4527cc7bd86795388892f5fd466d2ac959e11f0b89f3c84c673a86d3a62e35ae910
Malware Config
Extracted
latrodectus
https://mazdakrichest.com/live/
https://riverhasus.com/live/
Signatures
-
Latrodectus loader
Latrodectus is a loader written in C++.
-
Detect larodectus Loader variant 1 3 IoCs
resource yara_rule behavioral1/memory/3228-1-0x00000187B2190000-0x00000187B21A3000-memory.dmp family_latrodectus_v1 behavioral1/memory/3224-11-0x000001CDA1E50000-0x000001CDA1E63000-memory.dmp family_latrodectus_v1 behavioral1/memory/3224-16-0x000001CDA1E50000-0x000001CDA1E63000-memory.dmp family_latrodectus_v1 -
Blocklisted process makes network request 64 IoCs
flow pid Process 69 3224 rundll32.exe 70 3224 rundll32.exe 72 3224 rundll32.exe 74 3224 rundll32.exe 75 3224 rundll32.exe 76 3224 rundll32.exe 77 3224 rundll32.exe 78 3224 rundll32.exe 79 3224 rundll32.exe 80 3224 rundll32.exe 81 3224 rundll32.exe 82 3224 rundll32.exe 83 3224 rundll32.exe 84 3224 rundll32.exe 85 3224 rundll32.exe 86 3224 rundll32.exe 87 3224 rundll32.exe 88 3224 rundll32.exe 89 3224 rundll32.exe 90 3224 rundll32.exe 91 3224 rundll32.exe 92 3224 rundll32.exe 93 3224 rundll32.exe 94 3224 rundll32.exe 95 3224 rundll32.exe 96 3224 rundll32.exe 97 3224 rundll32.exe 98 3224 rundll32.exe 99 3224 rundll32.exe 100 3224 rundll32.exe 101 3224 rundll32.exe 102 3224 rundll32.exe 103 3224 rundll32.exe 104 3224 rundll32.exe 105 3224 rundll32.exe 106 3224 rundll32.exe 107 3224 rundll32.exe 108 3224 rundll32.exe 109 3224 rundll32.exe 110 3224 rundll32.exe 111 3224 rundll32.exe 112 3224 rundll32.exe 113 3224 rundll32.exe 114 3224 rundll32.exe 115 3224 rundll32.exe 116 3224 rundll32.exe 117 3224 rundll32.exe 118 3224 rundll32.exe 119 3224 rundll32.exe 120 3224 rundll32.exe 121 3224 rundll32.exe 122 3224 rundll32.exe 123 3224 rundll32.exe 124 3224 rundll32.exe 125 3224 rundll32.exe 126 3224 rundll32.exe 127 3224 rundll32.exe 128 3224 rundll32.exe 129 3224 rundll32.exe 130 3224 rundll32.exe 131 3224 rundll32.exe 132 3224 rundll32.exe 133 3224 rundll32.exe 134 3224 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 3224 rundll32.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3228 rundll32.exe 3228 rundll32.exe 3228 rundll32.exe 3228 rundll32.exe 3224 rundll32.exe 3224 rundll32.exe 3224 rundll32.exe 3224 rundll32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4980 wrote to memory of 3228 4980 cmd.exe 87 PID 4980 wrote to memory of 3228 4980 cmd.exe 87 PID 3228 wrote to memory of 3224 3228 rundll32.exe 89 PID 3228 wrote to memory of 3224 3228 rundll32.exe 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\UPDATE-HSYEYDBB.html.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" version1.dll, scab2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\Custom_update\Update_7c5d6f1.dll", scab3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3224
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5f834dfc1861cd6361f34496c3bbafe66
SHA1a983e82d009901310c8a3255c4b4e3a02d556fa7
SHA256e99f3517a36a9f7a55335699cfb4d84d08b042d47146119156f7f3bab580b4d7
SHA512088a6170c948ddb2c2b0cf2431ae61688201ef5bc3f1af217a58bf18b26dd9e0ab7ee082f822e736d0467f62e33bf71b806127eb998bed8e739c1e441ac05e00