Analysis
-
max time kernel
638s -
max time network
617s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 15:00
Static task
static1
Behavioral task
behavioral1
Sample
check.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
check.exe
Resource
win10-20240611-en
Behavioral task
behavioral3
Sample
check.exe
Resource
win10v2004-20240802-en
General
-
Target
check.exe
-
Size
2.3MB
-
MD5
1f3d6134710193f7d4d1e864d5e6b362
-
SHA1
538a93f3103e461906f783210c08cb1a4708a438
-
SHA256
2114aefe4d9460c04028d45b0f41ca9c65cea365727fda0fd2a885222c87db3c
-
SHA512
85a9d0906d57b276ae8eedc6f7a3a8b109c7c68e1e7805f5ab3a5fa26c09e80cdf786e71e1e6f7d03479d7510393aa8710ae969847285900e7b5fbd44343fffc
-
SSDEEP
49152:YMLtHPldWWLafLAUCweyFI0ZBAFCGLcRe2xTIYLEJL:jLaMUzRe2M
Malware Config
Signatures
-
Detects Latrodectus 7 IoCs
Detects Latrodectus v1.4.
resource yara_rule behavioral1/memory/2764-0-0x0000000001B40000-0x0000000001B56000-memory.dmp family_latrodectus_1_4 behavioral1/memory/2764-2-0x0000000001B40000-0x0000000001B56000-memory.dmp family_latrodectus_1_4 behavioral1/memory/2764-1-0x0000000001B40000-0x0000000001B56000-memory.dmp family_latrodectus_1_4 behavioral1/memory/2764-8-0x0000000001B40000-0x0000000001B56000-memory.dmp family_latrodectus_1_4 behavioral1/memory/2904-9-0x0000000000190000-0x00000000001A6000-memory.dmp family_latrodectus_1_4 behavioral1/memory/2904-10-0x0000000000190000-0x00000000001A6000-memory.dmp family_latrodectus_1_4 behavioral1/memory/2904-12-0x0000000000190000-0x00000000001A6000-memory.dmp family_latrodectus_1_4 -
Latrodectus loader
Latrodectus is a loader written in C++.
-
Deletes itself 1 IoCs
pid Process 2764 check.exe -
Executes dropped EXE 2 IoCs
pid Process 2904 Update_2b4d1064.exe 1520 Update_2b4d1064.exe -
Loads dropped DLL 1 IoCs
pid Process 2764 check.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2764 check.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2904 2764 check.exe 31 PID 2764 wrote to memory of 2904 2764 check.exe 31 PID 2764 wrote to memory of 2904 2764 check.exe 31 PID 2112 wrote to memory of 1520 2112 taskeng.exe 34 PID 2112 wrote to memory of 1520 2112 taskeng.exe 34 PID 2112 wrote to memory of 1520 2112 taskeng.exe 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\check.exe"C:\Users\Admin\AppData\Local\Temp\check.exe"1⤵
- Deletes itself
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Roaming\Custom_update\Update_2b4d1064.exe"C:\Users\Admin\AppData\Roaming\Custom_update\Update_2b4d1064.exe"2⤵
- Executes dropped EXE
PID:2904
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {1BE6F175-5400-48FA-AF36-BB3652801EFC} S-1-5-21-3450744190-3404161390-554719085-1000:PDIZKVQX\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Roaming\Custom_update\Update_2b4d1064.exeC:\Users\Admin\AppData\Roaming\Custom_update\Update_2b4d1064.exe2⤵
- Executes dropped EXE
PID:1520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD51f3d6134710193f7d4d1e864d5e6b362
SHA1538a93f3103e461906f783210c08cb1a4708a438
SHA2562114aefe4d9460c04028d45b0f41ca9c65cea365727fda0fd2a885222c87db3c
SHA51285a9d0906d57b276ae8eedc6f7a3a8b109c7c68e1e7805f5ab3a5fa26c09e80cdf786e71e1e6f7d03479d7510393aa8710ae969847285900e7b5fbd44343fffc