Analysis
-
max time kernel
1065s -
max time network
1156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
submitted
26-08-2024 16:45
Behavioral task
behavioral1
Sample
0740e3f0b5c9a067e865dec4a692c0823f0b0ad567c6e8c33b4b7fdbef9de1f4.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
0740e3f0b5c9a067e865dec4a692c0823f0b0ad567c6e8c33b4b7fdbef9de1f4.exe
Resource
win11-20240802-en
General
-
Target
0740e3f0b5c9a067e865dec4a692c0823f0b0ad567c6e8c33b4b7fdbef9de1f4.exe
-
Size
74KB
-
MD5
c7bb14dc13b0b26d89f35e42ba1f49da
-
SHA1
6bb30886c4c43d87099ec853ea885eabd9d3ab34
-
SHA256
0740e3f0b5c9a067e865dec4a692c0823f0b0ad567c6e8c33b4b7fdbef9de1f4
-
SHA512
12ca825f96cc109be7f6d1d465559e1ec401b021d08c61341dde3217343345102a34ccdc1948304e8abd900d2a243006ab9208eebaa82d79c596a2e4c97cff36
-
SSDEEP
768:3RKz7vRTYSRKrm4mODOJWFgG5nB07XiuwUKdq3kz40sKjTiqFf8mjop4EejV:3RKzhgrVmOikFz8Xiq3mniOf8mjo8
Malware Config
Extracted
latrodectus
https://pomaspoteraka.com/test/
https://finilamedima.com/test/
Signatures
-
Detects Latrodectus 2 IoCs
Detects Latrodectus v1.4.
resource yara_rule behavioral1/files/0x0008000000023434-2.dat family_latrodectus_1_4 behavioral1/memory/4156-3-0x0000000000FA0000-0x0000000000FB500C-memory.dmp family_latrodectus_1_4 -
Latrodectus family
-
Latrodectus loader
Latrodectus is a loader written in C++.
-
Deletes itself 1 IoCs
pid Process 4156 0740e3f0b5c9a067e865dec4a692c0823f0b0ad567c6e8c33b4b7fdbef9de1f4.exe -
Executes dropped EXE 3 IoCs
pid Process 4836 Update_2bba8ec5.exe 3620 Update_2bba8ec5.exe 2360 Update_2bba8ec5.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4156 0740e3f0b5c9a067e865dec4a692c0823f0b0ad567c6e8c33b4b7fdbef9de1f4.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4156 wrote to memory of 4836 4156 0740e3f0b5c9a067e865dec4a692c0823f0b0ad567c6e8c33b4b7fdbef9de1f4.exe 84 PID 4156 wrote to memory of 4836 4156 0740e3f0b5c9a067e865dec4a692c0823f0b0ad567c6e8c33b4b7fdbef9de1f4.exe 84 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0740e3f0b5c9a067e865dec4a692c0823f0b0ad567c6e8c33b4b7fdbef9de1f4.exe"C:\Users\Admin\AppData\Local\Temp\0740e3f0b5c9a067e865dec4a692c0823f0b0ad567c6e8c33b4b7fdbef9de1f4.exe"1⤵
- Deletes itself
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Roaming\Custom_update\Update_2bba8ec5.exe"C:\Users\Admin\AppData\Roaming\Custom_update\Update_2bba8ec5.exe"2⤵
- Executes dropped EXE
PID:4836
-
-
C:\Users\Admin\AppData\Roaming\Custom_update\Update_2bba8ec5.exeC:\Users\Admin\AppData\Roaming\Custom_update\Update_2bba8ec5.exe1⤵
- Executes dropped EXE
PID:3620
-
C:\Users\Admin\AppData\Roaming\Custom_update\Update_2bba8ec5.exeC:\Users\Admin\AppData\Roaming\Custom_update\Update_2bba8ec5.exe1⤵
- Executes dropped EXE
PID:2360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD5c7bb14dc13b0b26d89f35e42ba1f49da
SHA16bb30886c4c43d87099ec853ea885eabd9d3ab34
SHA2560740e3f0b5c9a067e865dec4a692c0823f0b0ad567c6e8c33b4b7fdbef9de1f4
SHA51212ca825f96cc109be7f6d1d465559e1ec401b021d08c61341dde3217343345102a34ccdc1948304e8abd900d2a243006ab9208eebaa82d79c596a2e4c97cff36