Analysis
-
max time kernel
829s -
max time network
1159s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
submitted
26-08-2024 16:45
Behavioral task
behavioral1
Sample
0740e3f0b5c9a067e865dec4a692c0823f0b0ad567c6e8c33b4b7fdbef9de1f4.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
0740e3f0b5c9a067e865dec4a692c0823f0b0ad567c6e8c33b4b7fdbef9de1f4.exe
Resource
win11-20240802-en
General
-
Target
0740e3f0b5c9a067e865dec4a692c0823f0b0ad567c6e8c33b4b7fdbef9de1f4.exe
-
Size
74KB
-
MD5
c7bb14dc13b0b26d89f35e42ba1f49da
-
SHA1
6bb30886c4c43d87099ec853ea885eabd9d3ab34
-
SHA256
0740e3f0b5c9a067e865dec4a692c0823f0b0ad567c6e8c33b4b7fdbef9de1f4
-
SHA512
12ca825f96cc109be7f6d1d465559e1ec401b021d08c61341dde3217343345102a34ccdc1948304e8abd900d2a243006ab9208eebaa82d79c596a2e4c97cff36
-
SSDEEP
768:3RKz7vRTYSRKrm4mODOJWFgG5nB07XiuwUKdq3kz40sKjTiqFf8mjop4EejV:3RKzhgrVmOikFz8Xiq3mniOf8mjo8
Malware Config
Extracted
latrodectus
https://pomaspoteraka.com/test/
https://finilamedima.com/test/
Signatures
-
Detects Latrodectus 2 IoCs
Detects Latrodectus v1.4.
resource yara_rule behavioral2/files/0x000700000002aa27-4.dat family_latrodectus_1_4 behavioral2/memory/1600-3-0x0000000000D10000-0x0000000000D2500C-memory.dmp family_latrodectus_1_4 -
Latrodectus family
-
Latrodectus loader
Latrodectus is a loader written in C++.
-
Deletes itself 1 IoCs
pid Process 1600 0740e3f0b5c9a067e865dec4a692c0823f0b0ad567c6e8c33b4b7fdbef9de1f4.exe -
Executes dropped EXE 3 IoCs
pid Process 1152 Update_590539eb.exe 3944 Update_590539eb.exe 1336 Update_590539eb.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1600 0740e3f0b5c9a067e865dec4a692c0823f0b0ad567c6e8c33b4b7fdbef9de1f4.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1600 wrote to memory of 1152 1600 0740e3f0b5c9a067e865dec4a692c0823f0b0ad567c6e8c33b4b7fdbef9de1f4.exe 80 PID 1600 wrote to memory of 1152 1600 0740e3f0b5c9a067e865dec4a692c0823f0b0ad567c6e8c33b4b7fdbef9de1f4.exe 80 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0740e3f0b5c9a067e865dec4a692c0823f0b0ad567c6e8c33b4b7fdbef9de1f4.exe"C:\Users\Admin\AppData\Local\Temp\0740e3f0b5c9a067e865dec4a692c0823f0b0ad567c6e8c33b4b7fdbef9de1f4.exe"1⤵
- Deletes itself
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Roaming\Custom_update\Update_590539eb.exe"C:\Users\Admin\AppData\Roaming\Custom_update\Update_590539eb.exe"2⤵
- Executes dropped EXE
PID:1152
-
-
C:\Users\Admin\AppData\Roaming\Custom_update\Update_590539eb.exeC:\Users\Admin\AppData\Roaming\Custom_update\Update_590539eb.exe1⤵
- Executes dropped EXE
PID:3944
-
C:\Users\Admin\AppData\Roaming\Custom_update\Update_590539eb.exeC:\Users\Admin\AppData\Roaming\Custom_update\Update_590539eb.exe1⤵
- Executes dropped EXE
PID:1336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD5c7bb14dc13b0b26d89f35e42ba1f49da
SHA16bb30886c4c43d87099ec853ea885eabd9d3ab34
SHA2560740e3f0b5c9a067e865dec4a692c0823f0b0ad567c6e8c33b4b7fdbef9de1f4
SHA51212ca825f96cc109be7f6d1d465559e1ec401b021d08c61341dde3217343345102a34ccdc1948304e8abd900d2a243006ab9208eebaa82d79c596a2e4c97cff36