Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-08-2024 18:24
Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v2004-20240802-en
General
-
Target
1.exe
-
Size
2.3MB
-
MD5
1f3d6134710193f7d4d1e864d5e6b362
-
SHA1
538a93f3103e461906f783210c08cb1a4708a438
-
SHA256
2114aefe4d9460c04028d45b0f41ca9c65cea365727fda0fd2a885222c87db3c
-
SHA512
85a9d0906d57b276ae8eedc6f7a3a8b109c7c68e1e7805f5ab3a5fa26c09e80cdf786e71e1e6f7d03479d7510393aa8710ae969847285900e7b5fbd44343fffc
-
SSDEEP
49152:YMLtHPldWWLafLAUCweyFI0ZBAFCGLcRe2xTIYLEJL:jLaMUzRe2M
Malware Config
Signatures
-
Detects Latrodectus 7 IoCs
Detects Latrodectus v1.4.
resource yara_rule behavioral1/memory/1848-2-0x0000000000200000-0x0000000000216000-memory.dmp family_latrodectus_1_4 behavioral1/memory/1848-1-0x0000000000200000-0x0000000000216000-memory.dmp family_latrodectus_1_4 behavioral1/memory/1848-0-0x0000000000200000-0x0000000000216000-memory.dmp family_latrodectus_1_4 behavioral1/memory/1848-8-0x0000000000200000-0x0000000000216000-memory.dmp family_latrodectus_1_4 behavioral1/memory/2308-12-0x0000000001B40000-0x0000000001B56000-memory.dmp family_latrodectus_1_4 behavioral1/memory/2308-10-0x0000000001B40000-0x0000000001B56000-memory.dmp family_latrodectus_1_4 behavioral1/memory/2308-9-0x0000000001B40000-0x0000000001B56000-memory.dmp family_latrodectus_1_4 -
Latrodectus loader
Latrodectus is a loader written in C++.
-
Deletes itself 1 IoCs
pid Process 1848 1.exe -
Executes dropped EXE 1 IoCs
pid Process 2308 Update_283e7fcd.exe -
Loads dropped DLL 1 IoCs
pid Process 1848 1.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1848 1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1848 wrote to memory of 2308 1848 1.exe 30 PID 1848 wrote to memory of 2308 1848 1.exe 30 PID 1848 wrote to memory of 2308 1848 1.exe 30 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"1⤵
- Deletes itself
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Roaming\Custom_update\Update_283e7fcd.exe"C:\Users\Admin\AppData\Roaming\Custom_update\Update_283e7fcd.exe"2⤵
- Executes dropped EXE
PID:2308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD51f3d6134710193f7d4d1e864d5e6b362
SHA1538a93f3103e461906f783210c08cb1a4708a438
SHA2562114aefe4d9460c04028d45b0f41ca9c65cea365727fda0fd2a885222c87db3c
SHA51285a9d0906d57b276ae8eedc6f7a3a8b109c7c68e1e7805f5ab3a5fa26c09e80cdf786e71e1e6f7d03479d7510393aa8710ae969847285900e7b5fbd44343fffc